Abdulrahman Abu Elkhail, U. Baroudi, Mohammed S. H. Younis
{"title":"WSN Routing Protocols: Anonymity Prospective Analysis","authors":"Abdulrahman Abu Elkhail, U. Baroudi, Mohammed S. H. Younis","doi":"10.1109/CICN56167.2022.10008348","DOIUrl":null,"url":null,"abstract":"A Wireless Sensor Network (WSN) is composed of a number of sensor nodes and a single Base-Station (BS), distributed randomly in an area of interest. WSNs have proven very beneficial in various applications in unattended setup in many domains such as scientific, civil, and military. In these applications, sensors send their measurements to the Base Station over multi-hop wireless routes where the Base Station is responsible for collecting and processing the sensed data. Given the importance of the BS, a potential attacker would look to locate the base station by examining network traffic patterns in order to launch specific attacks intended to interfere with network functionality. In this paper, we analyze traffic analysis attack models from the viewpoint of an adversary. Additionally, we examine the benefits and drawbacks of various routing protocols in terms of exposing the network to traffic analysis attacks. Our evaluation is supported by simulation results.","PeriodicalId":287589,"journal":{"name":"2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CICN56167.2022.10008348","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
A Wireless Sensor Network (WSN) is composed of a number of sensor nodes and a single Base-Station (BS), distributed randomly in an area of interest. WSNs have proven very beneficial in various applications in unattended setup in many domains such as scientific, civil, and military. In these applications, sensors send their measurements to the Base Station over multi-hop wireless routes where the Base Station is responsible for collecting and processing the sensed data. Given the importance of the BS, a potential attacker would look to locate the base station by examining network traffic patterns in order to launch specific attacks intended to interfere with network functionality. In this paper, we analyze traffic analysis attack models from the viewpoint of an adversary. Additionally, we examine the benefits and drawbacks of various routing protocols in terms of exposing the network to traffic analysis attacks. Our evaluation is supported by simulation results.