Abstract
In this paper, a routing protocol is proposed that provides location privacy for the source and the destination as well as user anonymity and unlinkability in multihop wireless sensor networks. The sink is assumed to be computationally powerful and responsible for all routing decisions. It assigns incoming and outgoing labels to nodes in the uplink and downlink directions. Each node is only aware of its own labels and only forwards packets whose labels match either its downlink or uplink incoming label. Moreover, in order to prevent packet tracing by a global eavesdropper, layered cryptography is used in both directions to make a packet look randomly different on different links. However, due to the node capability limitations, only symmetric cryptography is used.
Chapter PDF
Similar content being viewed by others
References
Pandurang Kamat, Yanyong Zhang, Wade Trappe, Celal Ozturk, Enhancing Source-Location Privacy in Sensor Network Routing, in the proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICSCS’05), Vol. 00, pp. 599–608.
Xiaoyan Hong, Pu Wang, Jiejun Kong, Qunwei Zheng, Jun Liu, Effective Probabilistic Approach Protecting Sensor Traffic, IEEE Military Communication Conference (Milcom) 2005, Atlantic City, NJ, Oct 2005.
Shu Jiang, Nitin H. Vaidya, Wei Zhao, Routing in Packet Radio Networks to Prevent Traffic Analysis, in the proceedings of the IEEE Information Assurance and Security Workshop, West Point, NY, July 2000.
Jing Deng, Richard Han, Shivakant Mishra, Intrusion Tolerance and Anti-Traffic Analysis Strategies For Wireless Sensor Networks, in the proceedings of the IEEE International Conference on Dependable Systems and Networks (DSN 2004), 28 June-1 July 2004, Florence, Italy.
Jing Deng, Richard Han, Shivakant Mishra, Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM’05), Athens, Greece, pp. 113–126.
Stephan Olariu, Mohamed Eltoweissy, Mohamed Younis, ANSWER: Autonomous Wireless Sensor Network, Q2SWinet’O5, October 13, 2005, Montreal, Quebec, Canada.
Jamal N. Al-Karaki, Ahmed E. Kamal, Routing Techniques In Wireless Sensor Networks: A Survey, IEEE Wireless Communications, Vol. II,No. 6. (2004), pp. 6–28.
J. Kong, Anonymous and Untraceable Communications in Mobile Wireless Networks, PhD thesis, University of California, Los Angeles, June 2004.
Y. Zhang, W. Liu, and W. Lou, Anonymous Communications in Mobile Ad Hoc Networks, IEEE INFOCOM, Miami, FL, March 2005.
J. Al-Muhtadi, R. Campbell, A. Kapadia, M. Dennis Mickunas, Seung Yi, Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments, in the proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS’02), July 2002, Vienna, Austria, p74.
A. Pfitzmann and M. Kohntopp. Anonymity, Unobservability and Pseudonymity — A Proposal for Terminology, In Hannes Federath (Ed.), Designing Privacy Enhancing Technologies, Lecture Notes in Computer Science, LNCS 2009, pp. 1–9, Springer-Verlag, 2001.
D. L. Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms, Communications of the ACM, 24(2), pp. 84–88, 1981.
Alireza A. Nezhad, Dimitris Makrakis, Ali Miri, Anonymous Topology Discovery for Wireless Sensor Networks, submitted to the 3-rd ACM International Workshop on QoS and Security for Wireless and Mobile Networks, October 22–26, 2007, Chania, Crete Island, Greece.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 International Federation for Information Processing
About this paper
Cite this paper
Nezhad, A.A., Makrakis, D., Miri, A. (2007). Destination Controlled Anonymous Routing in Resource Constrained Multihop Wireless Sensor Networks. In: Orozco-Barbosa, L., Olivares, T., Casado, R., Bermúdez, A. (eds) Wireless Sensor and Actor Networks. WSAN 2007. IFIP International Federation for Information Processing, vol 248. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-74899-3_8
Download citation
DOI: https://doi.org/10.1007/978-0-387-74899-3_8
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-74898-6
Online ISBN: 978-0-387-74899-3
eBook Packages: Computer ScienceComputer Science (R0)