Skip to main navigation Skip to search Skip to main content

Optimizing Base Station’s Anonymity with PID-Controlled Fake Packets and Data Aggregation

Research output: Contribution to journalArticlepeer-review

2 Scopus citations

Abstract

A Base Station (BS) is a gateway between a wireless sensor network (WSN) and the network administrator (NA). It is responsible for gathering information from the sensors and forwarding it to the NA while collecting instruction from him and communicating it to the WSN. Consequently, the BS has become the prime target of attackers. One form of attack on the BS is tempering. The attacker finds the physical location and destroys it. An adversary can easily find the BS since (in a typical WSN) it is the node with the highest traffic. In this paper, we hide the BS using proportional–integral–derivative (PID) controlled fake packet injection and data aggregation. The data aggregation strategy helps combine data from the sensor nodes into a super-packet, thus reducing the actual traffic. On the other hand, the PID-controlled fake packet injection technique compensates for the difference in traffic between the BS and other nodes in the network. The simulation results demonstrate that the proposed approach can protect the BS from packet-tracing and traffic analysis attacks.

Original languageEnglish
Pages (from-to)4139-4156
Number of pages18
JournalArabian Journal for Science and Engineering
Volume49
Issue number3
DOIs
StatePublished - Mar 2024

Bibliographical note

Publisher Copyright:
© King Fahd University of Petroleum & Minerals 2023.

UN SDGs

This output contributes to the following UN Sustainable Development Goals (SDGs)

  1. SDG 9 - Industry, Innovation, and Infrastructure
    SDG 9 Industry, Innovation, and Infrastructure

Keywords

  • Anonymity
  • Base station
  • Belief
  • Evidence theory
  • Industry 4.0
  • Internet of things (IoT)
  • Location privacy
  • Wireless sensor networks

ASJC Scopus subject areas

  • General

Fingerprint

Dive into the research topics of 'Optimizing Base Station’s Anonymity with PID-Controlled Fake Packets and Data Aggregation'. Together they form a unique fingerprint.

Cite this