Visible to the public Enhancing Sink Node Anonymity in Tactical Sensor Networks Using a Reactive Routing Protocol

TitleEnhancing Sink Node Anonymity in Tactical Sensor Networks Using a Reactive Routing Protocol
Publication TypeConference Paper
Year of Publication2017
AuthorsHaakensen, T., Thulasiraman, P.
Conference Name2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)
ISBN Number978-1-5386-1104-3
Keywords6LoWPAN, Ad hoc networks, composability, cyber physical systems security, enhancing sink node anonymity, IEEE 802.15 Standard, IEEE 802.15.4, k-anonymity, Lightweight Ad hoc On-Demand Next Generation reactive-routing protocol, military communication, modified LOADng protocol, privacy, pubcrawl, reactive routing protocol, remote sensing, resilience, Resiliency, Routing, Routing protocols, security, Sensor networks, sensor nodes, sink-node vulnerability, specific routing protocol, tactical sensor networks, tactical wireless sensor networks, tactical WSN, telecommunication security, Wireless sensor networks, WSN communication protocols

Tactical wireless sensor networks (WSNs) are deployed over a region of interest for mission centric operations. The sink node in a tactical WSN is the aggregation point of data processing. Due to its essential role in the network, the sink node is a high priority target for an attacker who wishes to disable a tactical WSN. This paper focuses on the mitigation of sink-node vulnerability in a tactical WSN. Specifically, we study the issue of protecting the sink node through a technique known as k-anonymity. To achieve k-anonymity, we use a specific routing protocol designed to work within the constraints of WSN communication protocols, specifically IEEE 802.15.4. We use and modify the Lightweight Ad hoc On-Demand Next Generation (LOADng) reactive-routing protocol to achieve anonymity. This modified LOADng protocol prevents an attacker from identifying the sink node without adding significant complexity to the regular sensor nodes. We simulate the modified LOADng protocol using a custom-designed simulator in MATLAB. We demonstrate the effectiveness of our protocol and also show some of the performance tradeoffs that come with this method.

Citation Keyhaakensen_enhancing_2017