Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks

  title={Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks},
  author={Jing Deng and Richard Han and Shivakant Mishra},
  journal={Pervasive and Mobile Computing},
Typical packet traffic in a sensor network reveals pronounce dpatterns that allow an adversary analyzing packet traffic to deduce the location of a base station. Once d is overed, the base station can be destroyed, rendering the entire sensor network inoperative, since a ba se station is a central point of data collection and hence failure. This paper investigates a suite of decorr lation countermeasures aimed at disguising the location of a base station against traffic analysis attac ks. A set… CONTINUE READING
Highly Influential
This paper has highly influenced 15 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 213 citations. REVIEW CITATIONS


Publications citing this paper.
Showing 1-10 of 84 extracted citations

Hiding contextual information in WSNs

2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM) • 2012
View 20 Excerpts
Highly Influenced

Source - destination obfuscation in wireless ad hocnetworks

Security and Communication Networks • 2011
View 11 Excerpts
Highly Influenced

SECLOUD: Source and Destination Seclusion Using Clouds for wireless ad hoc networks

2009 IEEE Symposium on Computers and Communications • 2009
View 11 Excerpts
Highly Influenced

Boosting anonymity in wireless sensor networks

2017 4th International Conference on Signal Processing, Computing and Control (ISPCC) • 2017
View 9 Excerpts
Highly Influenced

A cross-layer defense scheme for countering traffic analysis attacks in Wireless Sensor Networks

MILCOM 2015 - 2015 IEEE Military Communications Conference • 2015
View 5 Excerpts
Highly Influenced

Base station anonymity distributed self-assessment in Wireless Sensor Networks

2015 IEEE International Conference on Intelligence and Security Informatics (ISI) • 2015
View 5 Excerpts
Highly Influenced

214 Citations

Citations per Year
Semantic Scholar estimates that this publication has 214 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-10 of 26 references

A pairwise key predistribution scheme for wireless sensor networks

ACM Trans. Inf. Syst. Secur. • 2005
View 3 Excerpts

Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks

International Conference on Dependable Systems and Networks, 2004 • 2004
View 4 Excerpts

On providing anonymity in wireless sensor networks

Proceedings. Tenth International Conference on Parallel and Distributed Systems, 2004. ICPADS 2004. • 2004
View 1 Excerpt

Establishing pairwise keys in distributed sensor networks

ACM Conference on Computer and Communications Security • 2003
View 3 Excerpts

Similar Papers

Loading similar papers…