Tracking anonymous sinks in wireless sensor networks

Elhadi M. Shakshuki, Tarek R. Sheltami, Nan Kang, Xinyu Xing

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Scopus citations

Abstract

Nowadays, wireless sensor networks are deployed in a wide range of applications such as military. To enable sinks to avoid physical attacks from adversaries, most of WSNs adopt sink-location privacy mechanisms. By utilizing these mechanisms, an adversary cannot analyze packet traffic and perform hop-byhop trace-back, and thus deduce the location of a sink. In this paper, we propose an attack approach to track anonymous sinks. It utilizes a Pseudo-Noise (PN) code to mark a data flow in an invisible manner. An adversary is able to interfere with a source node's traffic by embedding a secure signal into the node's traffic. The signal is carried along with the traffic from the source node to the sink. Therefore, the attacker can recognize the location of a sink node by tracking the invisible secure signal. Through our simulation experiments, we conclude that the proposed attack approach is able to track an anonymous sink without additional traffic overhead.

Original languageEnglish (US)
Title of host publicationProceedings - 2009 International Conference on Advanced Information Networking and Applications, AINA 2009
Pages510-516
Number of pages7
DOIs
StatePublished - 2009
Externally publishedYes
Event2009 International Conference on Advanced Information Networking and Applications, AINA 2009 - Bradford, United Kingdom
Duration: May 26 2009May 29 2009

Publication series

NameProceedings - International Conference on Advanced Information Networking and Applications, AINA
ISSN (Print)1550-445X

Conference

Conference2009 International Conference on Advanced Information Networking and Applications, AINA 2009
Country/TerritoryUnited Kingdom
CityBradford
Period5/26/095/29/09

Keywords

  • Anonymous
  • Low-pass filter
  • Sensor networks

ASJC Scopus subject areas

  • General Engineering

Fingerprint

Dive into the research topics of 'Tracking anonymous sinks in wireless sensor networks'. Together they form a unique fingerprint.

Cite this