File:Achieving sink node anonymity in tactical wireless sensor networks using a reactive routing protocol (IA achievingsinknod1094555612).pdf
Original file (1,275 × 1,650 pixels, file size: 1.38 MB, MIME type: application/pdf, 96 pages)
Captions
Summary[edit]
Achieving sink node anonymity in tactical wireless sensor networks using a reactive routing protocol ( ) | |
---|---|
Author |
Haakensen, Thomas J. |
Title |
Achieving sink node anonymity in tactical wireless sensor networks using a reactive routing protocol |
Publisher |
Monterey, California: Naval Postgraduate School |
Description |
A wireless sensor network (WSN) collects and routes information from the environment to an aggregation point, known as a sink node. The sink node processes the information or acts as a gateway to forward information to another network. Due to its essential role in the network, the sink node is a high priority target for an attacker who wishes to disable a WSN. In this thesis, we focus on the mitigation of sink-node vulnerability in a WSN. Specifically, in this thesis we study the issue of protecting the sink node through anonymity techniques. In particular, we use a technique known as k-anonymity. To achieve k-anonymity, we use a specific routing protocol designed to work within the constraints of WSN communication protocols, specifically IEEE 802.15.4. We use and modify the Lightweight Ad hoc On-Demand – Next Generation (LOADng) reactive-routing protocol to achieve anonymity. This modified protocol prevents an attacker from identifying the sink node without adding significant complexity to the regular sensor nodes. We simulate the modified LOADng protocol using a custom-designed simulator in MATLAB. We demonstrate the effectiveness of our protocol and also show some of the performance tradeoffs that come with this method. Subjects: Sink node anonymity; base station anonymity; Wireless Sensor Networks (WSN); Mobile Ad hoc Network (MANET); Lightweight Ad hoc On-Demand – Next Generation (LOADng) |
Language | English |
Publication date | June 2017 |
Current location |
IA Collections: navalpostgraduateschoollibrary; fedlink |
Accession number |
achievingsinknod1094555612 |
Source | |
Permission (Reusing this file) |
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States. |
Licensing[edit]
Public domainPublic domainfalsefalse |
This work is in the public domain in the United States because it is a work prepared by an officer or employee of the United States Government as part of that person’s official duties under the terms of Title 17, Chapter 1, Section 105 of the US Code.
Note: This only applies to original works of the Federal Government and not to the work of any individual U.S. state, territory, commonwealth, county, municipality, or any other subdivision. This template also does not apply to postage stamp designs published by the United States Postal Service since 1978. (See § 313.6(C)(1) of Compendium of U.S. Copyright Office Practices). It also does not apply to certain US coins; see The US Mint Terms of Use.
|
||
This file has been identified as being free of known restrictions under copyright law, including all related and neighboring rights. |
https://creativecommons.org/publicdomain/mark/1.0/PDMCreative Commons Public Domain Mark 1.0falsefalse
File history
Click on a date/time to view the file as it appeared at that time.
Date/Time | Thumbnail | Dimensions | User | Comment | |
---|---|---|---|---|---|
current | 20:55, 13 July 2020 | 1,275 × 1,650, 96 pages (1.38 MB) | Fæ (talk | contribs) | FEDLINK - United States Federal Collection achievingsinknod1094555612 (User talk:Fæ/IA books#Fork8) (batch 1993-2020 #5135) |
You cannot overwrite this file.
File usage on Commons
The following page uses this file:
Metadata
This file contains additional information such as Exif metadata which may have been added by the digital camera, scanner, or software program used to create or digitize it. If the file has been modified from its original state, some details such as the timestamp may not fully reflect those of the original file. The timestamp is only as accurate as the clock in the camera, and it may be completely wrong.
Author | Janice R. Long |
---|---|
Short title |
|
Date and time of digitizing | 06:08, 11 June 2017 |
Software used | Microsoft® Word 2010 |
File change date and time | 03:32, 7 July 2017 |
Date metadata was last modified | 03:32, 7 July 2017 |
Conversion program | Microsoft® Word 2010 |
Encrypted | no |
Page size | 612 x 792 pts (letter) |
Version of PDF format | 1.4 |