An Anonymity Technique for Base Stations Against Traffic Volume Analysis in Wireless Sensor Networks and Internet of Things

Uthman Baroudi, Farouq Aliyu, Essa Shahra, Ahmed Al Naser

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Wireless Sensor Network (WSN) and Internet of Things (IoT) can be deployed in many life-critical applications such as military reconnaissance, smart grid monitoring, health-monitoring systems, etc. However, a WSN is useless without being able to convey the collected data to the Base Station (BS), which is responsible for gathering information from the sensors and forwarding it to the user/administrator. Therefore, protecting the BS is of paramount importance. In this paper, we propose an approach that can hide the physical location of the BS against an attacker carrying out traffic volume attack in a cluster-based network. The proposed approach hides the BS by controlling the amount of traffic between the cluster head (CH) and its sensor nodes. The simulation results show the ability of the proposed approach to keep the BS hidden, minimize total exchanged traffic while maintaining the required network coverage.

Original languageEnglish
Title of host publication2019 6th International Conference on Internet of Things
Subtitle of host publicationSystems, Management and Security, IOTSMS 2019
EditorsMohammad Alsmirat, Yaser Jararweh
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages215-220
Number of pages6
ISBN (Electronic)9781728129495
DOIs
StatePublished - Oct 2019

Publication series

Name2019 6th International Conference on Internet of Things: Systems, Management and Security, IOTSMS 2019

Bibliographical note

Publisher Copyright:
© 2019 IEEE.

Keywords

  • Ad-hoc Networks
  • Anonymity
  • IoT
  • Network Security
  • Traffic Volume Attack
  • Wireless Sensor Networks

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Hardware and Architecture
  • Information Systems and Management
  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of 'An Anonymity Technique for Base Stations Against Traffic Volume Analysis in Wireless Sensor Networks and Internet of Things'. Together they form a unique fingerprint.

Cite this