DocumentCode :
3391257
Title :
Effective probabilistic approach protecting sensor traffic
Author :
Hong, Xiaoyan ; Wang, Pu ; Kong, Jiejun ; Zheng, Qunwei ; Liu, Jun
Author_Institution :
Dept. of Comput. Sci., Alabama Univ., Tuscaloosa, AL
fYear :
2005
fDate :
17-20 Oct. 2005
Firstpage :
169
Abstract :
Sensor networks are often deployed in environments where malicious nodes present. Among all possible forms of the attacks threatening the sensor networks, in this work, we focus on traffic analysis attacks. Typically, in performing traffic analysis, an attacker will eavesdrop on-going wireless transmission and analyze contents and timing instances of the transmissions so to infer critical events or to trace valuable assets in the network (e.g. data sources or sinks). The paper presents a probabilistic approach to shape the sensor network traffic to decorrelate time instances in transmissions. The security properties of the approach are studied both analytically and empirically, showing strong protection in high probability
Keywords :
probability; telecommunication security; telecommunication traffic; wireless sensor networks; critical events; probabilistic approach; security properties; sensor networks; sensor traffic; strong protection; time instances decorrelation; traffic analysis attacks; wireless transmission; Communication system security; Computer science; Cryptography; Data security; Monitoring; Performance analysis; Protection; Telecommunication traffic; Timing; Wireless sensor networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Military Communications Conference, 2005. MILCOM 2005. IEEE
Conference_Location :
Atlantic City, NJ
Print_ISBN :
0-7803-9393-7
Type :
conf
DOI :
10.1109/MILCOM.2005.1605681
Filename :
1605681
Link To Document :
بازگشت