A wireless sensor network (WSN) principally is composed of many sensor nodes and a single in situ base station (BS), which are randomly distributed in a given area of interest. These sensor nodes transmit their measurements to the BS over multihop wireless paths. In addition to collecting and processing the sensed data, the BS performs network management operations. Because of the importance of the BS to the WSN, it is the most attractive target of attacks for an adversary. Basically, the adversary opts to locate the BS and target it with denial-of-service attack to temporarily or indefinitely disrupt the WSN operation. The adversary can intercept the data packet transmissions and use traffic analysis techniques such as evidence theory to uncover the routing topology. To counter such an attack, this paper presents a novel technique for boosting the BS anonymity by grouping nodes into clusters and creating multiple mesh-based routing topologies among the cluster heads (CHs). By applying the closed space-filling curves such as the Moore curve, for forming a mesh, the CHs are offered a number of choices for disseminating aggregated data to the BS through inter-CH paths. Then, the BS forwards the aggregated data as well so that it appears as one of the CHs. The simulation results confirm the effectiveness of the proposed technique in boosting the anonymity of the BS. KEYWORDS anonymity, location privacy, traffic analysis, wireless sensor network 1 | INTRODUCTIONRecent advances in microelectronics have made it possible to integrate sensing and communication capabilities in miniaturized devices that are often referred to in the literature as sensor nodes. Interconnecting a large set of these nodes forms a wireless sensor network (WSN) that can serve unattended in harsh environments. A typical WSN includes an in situ base station (BS) that gathers data from the sensor nodes. WSNs are deemed effective in serving applications such as a military surveillance and target tracking where continuous monitoring of an area of interest is critical and human presence is risky and/or prohibitively expensive. In most of these WSN applications, sensor nodes have limited capabilities, eg, limited communication range, energy (battery) supply, and processing capacity. To overcome communication range limitations and to save energy, we find that sensor nodes transmit their measurements to the BS over multihop wireless paths. 1,2 On the other hand, the BS is not resource constrained and can perform network management and process the collected data. Because of the importance of the BS to the WSN, it can be the focus of an adversary who attempts to inflict the most damage to the network operation. The goal of the adversary will be to locate the BS and target it with denial-of-service attack so that the utility of the WSN is nullified. 3,4 Contemporary security mechanisms, such as packet header encryption and anonymous routing mechanisms, are often applied to conceal the BS's identity. [5][6][7][8][9] However, these security mechanisms do not ...