Traffic Decorrelation Techniques for Countering a Global Eavesdropper in WSNs

Alejandro Proano, Loukas Lazos, Marwan Krunz

Research output: Contribution to journalArticlepeer-review

23 Scopus citations

Abstract

We address the problem of preventing the inference of contextual information in event-driven wireless sensor networks (WSNs). The problem is considered under a global eavesdropper who analyzes low-level RF transmission attributes, such as the number of transmitted packets, inter-packet times, and traffic directionality, to infer event location, its occurrence time, and the sink location. We devise a general traffic analysis method for inferring contextual information by correlating transmission times with eavesdropping locations. Our analysis shows that most existing countermeasures either fail to provide adequate protection, or incur high communication and delay overheads. To mitigate the impact of eavesdropping, we propose resource-efficient traffic normalization schemes. In comparison to the state-of-The-Art, our methods reduce the communication overhead by more than 50 percent, and the end-To-end delay by more than 30 percent. To do so, we partition the WSN to minimum connected dominating sets that operate in a round-robin fashion. This allows us to reduce the number of traffic sources active at a given time, while providing routing paths to any node in the WSN. We further reduce packet delay by loosely coordinating packet relaying, without revealing the traffic directionality.

Original languageEnglish (US)
Article number7479541
Pages (from-to)857-871
Number of pages15
JournalIEEE Transactions on Mobile Computing
Volume16
Issue number3
DOIs
StatePublished - Mar 1 2017

Keywords

  • Wireless sensor networks (WSN)
  • anonymity
  • contextual information
  • eavesdropping
  • graph theory
  • privacy

ASJC Scopus subject areas

  • Software
  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Fingerprint Dive into the research topics of 'Traffic Decorrelation Techniques for Countering a Global Eavesdropper in WSNs'. Together they form a unique fingerprint.

Cite this