Enhancing base station anonymity in WSNs: a security framework using ring routing, fake packet injection, and dynamic coverage

dc.contributor.authorAliyu, Farouq
dc.contributor.authorBaroudi, Uthman
dc.contributor.authorYounis, Mohammed
dc.date.accessioned2025-11-21T00:29:48Z
dc.date.issued2025-10-17
dc.description.abstractWireless Sensor Networks (WSNs) represent a computing network model where devices with limited resources are deployed for detailed, remote sensing tasks. Within a WSN, the Base Station (BS) plays a pivotal role in orchestrating and facilitating the communication between sensor nodes (SNs) and external platforms for data processing and application. Due to this central role, the BS becomes a key target for attacks. Attackers can deduce the BS’s physical position using Traffic Volume Analysis (TVA) or Packet Tracing Analysis (PTA). TVA is based on the concept that the BS has the highest traffic, as it acts as the main data aggregation point, whereas PTA capitalizes on the fact that the BS is the endpoint for WSN packets. Consequently, a TVA attacker (TVAA) seeks out the node with the most traffic, while a PTA attacker (PTAA) identifies the packet’s endpoint to pinpoint the BS location. In this study, we introduce a security framework designed to obscure the BS’s physical location from both TVAA and PTAA. Our approach integrates the ring routing method with Fake Packet Injection (FPI) to hide the BS. Additionally, it dynamically controls the SNs’ coverage by putting high-traffic clusters into sleep mode, thus conserving energy, while maintaining acceptable coverage. This system effectively conceals the BS from both attack methods, outperforming adding standalone techniques against PTA and TVA. Nonetheless, it results in an energy consumption increase of 78.95% (primarily due to FPI) compared to a non-secure network, but achieves up to 85.42% energy savings relative to systems using ring routing and FPI without dynamic coverage.
dc.description.sponsorshipThe Deanship of Scientific Research (DSR), KFUPM funded this research with the grant number IN171025, and the Deanship of Research Oversight and Coordination (DROC), KFUPM funded the APC.
dc.description.urihttps://link.springer.com/article/10.1007/s10586-025-05732-z
dc.format.extent54 pages
dc.genrejournal articles
dc.genrepostprints
dc.identifierdoi:10.13016/m2abm1-rqkt
dc.identifier.citationAliyu, Farouq, Uthman Baroudi, and Mohammed Younis. “Enhancing Base Station Anonymity in WSNs: A Security Framework Using Ring Routing, Fake Packet Injection, and Dynamic Coverage.” Cluster Computing 28, no. 16 (2025): 1020. https://doi.org/10.1007/s10586-025-05732-z.
dc.identifier.urihttps://doi.org/10.1007/s10586-025-05732-z
dc.identifier.urihttp://hdl.handle.net/11603/40799
dc.language.isoen
dc.publisherSpringer Nature
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Computer Science and Electrical Engineering Department
dc.relation.ispartofUMBC Faculty Collection
dc.rightsThis version of the article has been accepted for publication, after peer review (when applicable) and is subject to Springer Nature’s AM terms of use, but is not the Version of Record and does not reflect post-acceptance improvements, or any corrections. The Version of Record is available online at: https://doi.org/10.1007/s10586-025-05732-z
dc.subjectSensor Nodes Coverage
dc.subjectSecurity
dc.subjectFake Packet Injection
dc.subjectAnonymity
dc.subjectWireless Sensor Networks
dc.titleEnhancing base station anonymity in WSNs: a security framework using ring routing, fake packet injection, and dynamic coverage
dc.typeText
dcterms.creatorhttps://orcid.org/0000-0003-3865-9217

Files

Original bundle

Now showing 1 - 2 of 2
Loading...
Thumbnail Image
Name:
anonymityspringer.pdf
Size:
3.5 MB
Format:
Adobe Portable Document Format
Loading...
Thumbnail Image
Name:
EnhancingbasestationanonymityinWSNsSupplementaryinformation.zip
Size:
1.32 MB
Format:
Unknown data format