Title :
Effective probabilistic approach protecting sensor traffic
Author :
Hong, Xiaoyan ; Wang, Pu ; Kong, Jiejun ; Zheng, Qunwei ; Liu, Jun
Author_Institution :
Dept. of Comput. Sci., Alabama Univ., Tuscaloosa, AL
Abstract :
Sensor networks are often deployed in environments where malicious nodes present. Among all possible forms of the attacks threatening the sensor networks, in this work, we focus on traffic analysis attacks. Typically, in performing traffic analysis, an attacker will eavesdrop on-going wireless transmission and analyze contents and timing instances of the transmissions so to infer critical events or to trace valuable assets in the network (e.g. data sources or sinks). The paper presents a probabilistic approach to shape the sensor network traffic to decorrelate time instances in transmissions. The security properties of the approach are studied both analytically and empirically, showing strong protection in high probability
Keywords :
probability; telecommunication security; telecommunication traffic; wireless sensor networks; critical events; probabilistic approach; security properties; sensor networks; sensor traffic; strong protection; time instances decorrelation; traffic analysis attacks; wireless transmission; Communication system security; Computer science; Cryptography; Data security; Monitoring; Performance analysis; Protection; Telecommunication traffic; Timing; Wireless sensor networks;
Conference_Titel :
Military Communications Conference, 2005. MILCOM 2005. IEEE
Conference_Location :
Atlantic City, NJ
Print_ISBN :
0-7803-9393-7
DOI :
10.1109/MILCOM.2005.1605681