Using deceptive packets to increase base-station anonymity in wireless sensor network

Y Ebrahimi, M Younis - 2011 7th International Wireless …, 2011 - ieeexplore.ieee.org
In wireless sensor networks, nodes probe ambient conditions in their surrounding and report
back to the base-station via multi-hop routing. In a hostile environment the network may be …

Increasing transmission power for higher base-station anonymity in wireless sensor network

Y Ebrahimi, M Younis - 2011 IEEE International Conference on …, 2011 - ieeexplore.ieee.org
In a wireless sensor network nodes probe ambient conditions and send the measurements
over multi-hop routes to a base-station. The base-station aggregates the received reports …

Using fake sinks and deceptive relays to boost base-station anonymity in wireless sensor network

N Baroutis, M Younis - 2015 IEEE 40th Conference on Local …, 2015 - ieeexplore.ieee.org
In applications of wireless Sensor Networks (WSNs), the base-station (BS) acts as a sink for
all data traffic. The continuous flow of packets toward the BS enables the adversary to …

Forming a cluster-mesh topology to boost base-station anonymity in wireless sensor networks

S Alsemairi, M Younis - 2016 IEEE Wireless Communications …, 2016 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) may consist of a large number of resource-constrained
sensor nodes. These nodes probe their surroundings and transmit their measurements over …

A novel traffic analysis attack model and base‐station anonymity metrics for wireless sensor networks

N Baroutis, M Younis - Security and Communication Networks, 2016 - Wiley Online Library
In applications of wireless sensor networks (WSNs), all data packets are directed toward the
base‐station (BS) over multi‐hop routes. In addition to data processing, the BS can interface …

A hierarchical anonymous communication protocol for sensor networks

A Durresi, V Paruchuri, M Durresi, L Barolli - Embedded and Ubiquitous …, 2005 - Springer
Ensuring anonymity in sensor networks is a major security goal. Using traffic analysis, the
attacker can compromise the network functionality by correlating data flow patterns to event …

A cross-layer defense scheme for countering traffic analysis attacks in Wireless Sensor Networks

JR Ward, M Younis - MILCOM 2015-2015 IEEE Military …, 2015 - ieeexplore.ieee.org
In most Wireless Sensor Network (WSN) applications the sensors forward their readings to a
central sink or base station (BS). The unique role of the BS makes it a natural target for an …

Base-station location anonymity and security technique (BLAST) for wireless sensor networks

VPV Gottumukkala, V Pandit, H Li… - 2012 IEEE …, 2012 - ieeexplore.ieee.org
To ensure the uninterrupted usage in a Wireless Sensor Network (WSN), it is important to
preserve the location privacy of sensor nodes. In this paper, we propose a novel technique …

[PDF][PDF] Providing location anonymity in a multi-base station wireless sensor network.

R El-Badry, MF Younis - ICC, 2012 - academia.edu
Wireless Sensor Networks (WSNs) often operate in inhospitable environments to serve
mission-critical and securitysensitive applications that involve hostile adversaries. These …

Increasing base-station anonymity in wireless sensor networks

U Acharya, M Younis - Ad Hoc Networks, 2010 - Elsevier
Nodes in a wireless sensor network (WSN) probe their surroundings and report their
findings to a base-station over multi-hop paths. Given the important role of the base-station …