Improving Base Station Anonymity using Data Funneling and PID Controlled Fake Packets

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

The Base Station (BS) is responsible for managing the network, it serves as a sink to all data and it serves a gateway to the outside world. Therefore, compromising the BS is the holy grail of Wireless Sensor Networks (WSN) hacking. One of the key techniques used in disabling a network is finding the physical location of the BS and destroying it. This can be achieved through traffic volume analysis. Since the sensor nodes usually send a small amount of data, the data can be cascaded into one Super-packet. This will reduce traffic as well as noise in the network. This technique is the underlying concept behind data funneling. However, data funneling can only reduce the traffic but the relative traffic of the BS compared to the other sensor nodes is still ginormous. Therefore, fake packets from the sensor nodes are needed to cloak the BS. In this paper, data funneling and Proportional Integral and Derivative (PID) controlled fake packets are used to reduce the number of packets sent to the BS and control fake packets generated by the sensor nodes to hide the BS respectively. The proposed system reduces the traffic of the system by a factor of K, where K is the ratio of 1 to the maximum number of packets that can be fused into one packet.

Original languageEnglish
Title of host publication2019 2nd IEEE Middle East and North Africa COMMunications Conference, MENACOMM 2019
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781728136875
DOIs
StatePublished - Nov 2019

Publication series

Name2019 2nd IEEE Middle East and North Africa COMMunications Conference, MENACOMM 2019

Bibliographical note

Publisher Copyright:
© 2019 IEEE.

ASJC Scopus subject areas

  • Information Systems and Management
  • Safety, Risk, Reliability and Quality
  • Signal Processing
  • Computer Networks and Communications
  • Hardware and Architecture

Fingerprint

Dive into the research topics of 'Improving Base Station Anonymity using Data Funneling and PID Controlled Fake Packets'. Together they form a unique fingerprint.

Cite this