作者
Xiaoyan Hong, Pu Wang, Jiejun Kong, Qunwei Zheng
发表日期
2005/10/17
研讨会论文
MILCOM 2005-2005 IEEE Military Communications Conference
页码范围
169-175
出版商
IEEE
简介
Sensor networks are often deployed in environments where malicious nodes present. Among all possible forms of the attacks threatening the sensor networks, in this work, we focus on traffic analysis attacks. Typically, in performing traffic analysis, an attacker will eavesdrop on-going wireless transmission and analyze contents and timing instances of the transmissions so to infer critical events or to trace valuable assets in the network (e.g. data sources or sinks). The paper presents a probabilistic approach to shape the sensor network traffic to decorrelate time instances in transmissions. The security properties of the approach are studied both analytically and empirically, showing strong protection in high probability
引用总数
2006200720082009201020112012201320142015201620172018201920202021202220232554155577483241
学术搜索中的文章
X Hong, P Wang, J Kong, Q Zheng - MILCOM 2005-2005 IEEE Military Communications …, 2005