2016
DOI: 10.1002/sec.1744
|View full text |Cite
|
Sign up to set email alerts
|

A novel traffic analysis attack model and base‐station anonymity metrics for wireless sensor networks

Abstract: In applications of wireless sensor networks (WSNs), all data packets are directed toward the base-station (BS) over multihop routes. In addition to data processing, the BS can interface the WSN to remote centers. Therefore, the failure of the BS diminishes the network utility and makes the data inaccessible. An adversary would thus try to uncover the BS's location by analyzing the traffic patterns of the network in order to launch denial of service attacks. For that reason, various countermeasure techniques ha… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 22 publications
0
6
0
Order By: Relevance
“…Assessing the BS anonymity has been the focus of studies such as [8][12]- [24] [63] and is in general a byproduct of the traffic analysis model. In this paper, ET is pursued as the underlying traffic analysis model where each intercepted transmission is deemed as an evidence of direct communication between a sender-receiver pair; the sender is determined by localizing the transmitter, while the receiver could be any node in a set of potential candidates within the sender's reachable range.…”
Section: A Overview Of Evidence Theorymentioning
confidence: 99%
See 2 more Smart Citations
“…Assessing the BS anonymity has been the focus of studies such as [8][12]- [24] [63] and is in general a byproduct of the traffic analysis model. In this paper, ET is pursued as the underlying traffic analysis model where each intercepted transmission is deemed as an evidence of direct communication between a sender-receiver pair; the sender is determined by localizing the transmitter, while the receiver could be any node in a set of potential candidates within the sender's reachable range.…”
Section: A Overview Of Evidence Theorymentioning
confidence: 99%
“…Thus, we believe that any modification of ET and its Belief measure based on the length of a derived path might introduce error and falsify the statistical significance of said path. Therefore, in this paper we do not use the weighted Belief measure that has been adopted in recent work [17]- [23][27] [63].…”
Section: Illustrative Examplementioning
confidence: 99%
See 1 more Smart Citation
“…Since most web traffic is encrypted these days, most traffic analysis attacks often rely on side channel information and machine learning to be effective. Some side channel reliant traffic analysis attacks use only timing information [20,27] while others depend on different side channel information, such as presence or absence of communication information [28], delaying and analyzing HTTP requests [27], and standard side channel information, such as packet length, number of packets, and time [25]. Machine learning allows adversaries to analyze even encrypted traffic to steal user information [15,[29][30][31].…”
Section: Traffic Analysismentioning
confidence: 99%
“…On the other direction, Baroutis and Younis showed in their study [5] how the attackers perform traffic analysis using three kinds of attack models: GSAT Test, Entropy and Traffic Volume (TV) and Evidence Theory (ET). In the GSAT Test, the attackers follow a number of steps until they discover the SN location.…”
Section: Related Workmentioning
confidence: 99%