{"title":"AAiBA:吸引对手增加无线传感器网络中的基站匿名性","authors":"S. Alsemairi","doi":"10.1109/ITNAC55475.2022.9998341","DOIUrl":null,"url":null,"abstract":"Wireless sensor networks (WSNs) have become one of the most interesting research areas in recent years. A WSN is mainly composed of a set of homogeneous sensor nodes and an in-situ base-station (BS) that are randomly deployed within a delimited area of interest. These sensor nodes sense the area and transmit the sensed data to the BS through multiple wireless communication hops. In addition to data collection, the BS performs highly complex management functions and controls the entire network. The importance of the BS in a WSN makes the BS a high-value target for an adversary that wants to disable the network. To launch a denial-of-service attack on the BS, an adversary intercepts the data transmissions sent to the BS and uses evidence theory as a technique of traffic analysis to find the BS. This paper proposes a technique to counter the attack and increase the BS's anonymity by creating cells and choosing HoneyCells from the created cells; the HoneyCells mimic the BS cell and attract the adversary's attention. Simulation results show that the proposed technique provides better BS anonymity.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"AAiBA: Attracting an Adversary for Increasing Base-Station Anonymity in Wireless Sensor Networks\",\"authors\":\"S. Alsemairi\",\"doi\":\"10.1109/ITNAC55475.2022.9998341\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Wireless sensor networks (WSNs) have become one of the most interesting research areas in recent years. A WSN is mainly composed of a set of homogeneous sensor nodes and an in-situ base-station (BS) that are randomly deployed within a delimited area of interest. These sensor nodes sense the area and transmit the sensed data to the BS through multiple wireless communication hops. In addition to data collection, the BS performs highly complex management functions and controls the entire network. The importance of the BS in a WSN makes the BS a high-value target for an adversary that wants to disable the network. To launch a denial-of-service attack on the BS, an adversary intercepts the data transmissions sent to the BS and uses evidence theory as a technique of traffic analysis to find the BS. This paper proposes a technique to counter the attack and increase the BS's anonymity by creating cells and choosing HoneyCells from the created cells; the HoneyCells mimic the BS cell and attract the adversary's attention. Simulation results show that the proposed technique provides better BS anonymity.\",\"PeriodicalId\":205731,\"journal\":{\"name\":\"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)\",\"volume\":\"8 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-11-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ITNAC55475.2022.9998341\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITNAC55475.2022.9998341","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
AAiBA: Attracting an Adversary for Increasing Base-Station Anonymity in Wireless Sensor Networks
Wireless sensor networks (WSNs) have become one of the most interesting research areas in recent years. A WSN is mainly composed of a set of homogeneous sensor nodes and an in-situ base-station (BS) that are randomly deployed within a delimited area of interest. These sensor nodes sense the area and transmit the sensed data to the BS through multiple wireless communication hops. In addition to data collection, the BS performs highly complex management functions and controls the entire network. The importance of the BS in a WSN makes the BS a high-value target for an adversary that wants to disable the network. To launch a denial-of-service attack on the BS, an adversary intercepts the data transmissions sent to the BS and uses evidence theory as a technique of traffic analysis to find the BS. This paper proposes a technique to counter the attack and increase the BS's anonymity by creating cells and choosing HoneyCells from the created cells; the HoneyCells mimic the BS cell and attract the adversary's attention. Simulation results show that the proposed technique provides better BS anonymity.