Using data aggregation to prevent traffic analysis in wireless sensor networks

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

When communication in sensor networks occurs over wireless links, confidential information about the communication patterns between sensor nodes could be leaked even when encryption is used to protect the actual contents of the messages. The communication patterns, which often reveal higher volumes of traffic near the sink, could allow an attacker to identify the vicinity of the sink node. With this information, an attacker could potentially disable the network by destroying the sink. In this paper, we present the decoy sink protocol, which protects the location of the sink in target tracking sensor network applications by forwarding data to a decoy sink for aggregation before the aggregated data is forwarded to the real sink from the decoy sink. Combining indirection and data aggregation in our protocol creates more traffic away from the sink and reduces the amount of traffic near the sink, which makes traffic analysis more difficult for attackers.

Original languageEnglish (US)
Title of host publicationDistributed Computing in Sensor Systems - Second IEEE International Conference, DCOSS 2006, Proceedings
PublisherSpringer
Pages202-217
Number of pages16
ISBN (Print)3540352279, 9783540352273
DOIs
StatePublished - 2006
Event2nd IEEE International Conference - Distributed Computing in Sensor Systems, DCOSS 2006 - San Francisco, CA, United States
Duration: Jun 18 2006Jun 20 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4026 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other2nd IEEE International Conference - Distributed Computing in Sensor Systems, DCOSS 2006
Country/TerritoryUnited States
CitySan Francisco, CA
Period6/18/066/20/06

Keywords

  • Data aggregation
  • Sensor networks
  • Traffic analysis prevention

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Using data aggregation to prevent traffic analysis in wireless sensor networks'. Together they form a unique fingerprint.

Cite this