Network Working Group L. Zhou Internet-Draft J. Huang Expires: November 29, 2014 SouthEast University May 28, 2014 The Location Privacy of Wireless Sensor Networks: Attacks and Countermeasures draft-zhou-rrg-lp-wsn-00 Abstract With the related applications of wireless sensor networks getting into our lives quickly, the research of WSN is growing more and more necessary. The most significant problem which threatens the successful deployment of sensor systems is privacy, there are many protocols providing the security of news content for the WSNs. However, due to the open feature of sensor networks, context information is still in an exposed state, which makes the network be vulnerable to traffic analysis attack and hop by hop tracing back packet attack. Thus location privacy protection programs have been proposed. In this paper, we analyze and compare the existing major schemes comprehensively, meanwhile illustrate their theoretical models, principles and the advantages and disadvantages in detail. Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at http://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on November 29, 2014. Copyright Notice Copyright (c) 2014 IETF Trust and the persons identified as the document authors. All rights reserved. Zhou & Huang Expires November 29, 2014 [Page 1] Internet-Draft CTA May 2014 This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 2. The Attack Models . . . . . . . . . . . . . . . . . . . . . . 4 2.1. The Model of Source Attackers . . . . . . . . . . . . . . 4 2.2. The Model of Sink Attackers . . . . . . . . . . . . . . . 5 3. Location Privacy Protection Agreements . . . . . . . . . . . 5 3.1. Source Location Privacy Protection Protocols . . . . . . 5 3.1.1. Phantom Routing (PhR) . . . . . . . . . . . . . . . 6 3.1.2. Protocol Using Source-based Restricted Flooding (PUSBRF) . . . . . . . . . . . . . . . . . . . . . . 6 3.2. Sink Location Privacy Protection Protocols . . . . . . . 7 3.2.1. Location-privacy Routing Protocol (LPR) . . . . . . 8 3.2.2. Differential Enforced Fractal Propagation (DEFP) . . 8 3.3. Both Location Privacy Protection Protocols . . . . . . . 8 4. Performance Comparison . . . . . . . . . . . . . . . . . . . 9 5. Security Consideration . . . . . . . . . . . . . . . . . . . 13 6. IANA Consideration . . . . . . . . . . . . . . . . . . . . . 13 7. References . . . . . . . . . . . . . . . . . . . . . . . . . 13 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 14 1. Introduction With the rise of Internet of things, wireless sensor network (WSN) which is an integral part of Internet of things have a very broad application prospects. WSNs consist of a large number of micro sensor nodes, those nodes are capable of sensing information, computing and communicating. However, due to the low cost of these nodes, the storage capacity of battery is small, the computing capability of node processors is low, and the communication of wireless communication device is limited. Overall wireless sensor networks have the following characteristics: large-scale, self-organizing, multi-hop routing, dynamic, resource- constrained and applications related. These features make the wireless sensor networks have broad application prospects in military, environment, medical treatment, smart home. Zhou & Huang Expires November 29, 2014 [Page 2] Internet-Draft CTA May 2014 Wireless sensor networks could be used to collect sensitive information or deployed in hostile or unprotected environment, which make protecting the privacy of sensor nodes be crucial in the current WSNs, the privacy issues in WSNs are divided into two categories: content privacy and context privacy. In order to solve the problem of content privacy, for now, many encryption and authentication mechanisms[RFC4948][RFC4949]have been proposed and used, and can basically meet the corresponding requirements. But due to the open feature of WSNs, the exposure of context information can cause the user's secret leak to the attacker, especially attacker can locate the source node or destination node (base station) through traffic analysis and hop track packet stream. The location of source node and base station are very sensitive in many WSN applications such as in precious animals detection system, the position of animals (source node) can't be exposed to illegal hunters; in battlefield information collection system, the position of soldier (sink node) who accepts a variety of information can't be exposed to the enemy. Because of the importance and necessity of location privacy, this paper has a research on principles, advantages and disadvantages of current main location privacy protection agreement (PhR[PhR](GROW[GROW], PRLA [PRLA]), PUSBRF[PUSBRF], LPR [LPR], LPSS[LPSS], DEFP[DEFP]). Based on the property of object which needs to be protected, this paper divides the possible attackers into two categories: the attackers who attack source node and the attackers who attack sink node, and establishes corresponding models according to their individual features. According to the attacker models we propose appropriate protection agreements and discuss their advantages and disadvantages. The main contributions of this paper are as follows: (1) We divide possible attackers into two categories based on the property of object which needs to be protected for the first time, and establish the corresponding attack models; (2) We put forward the corresponding settlement agreements in accordance with attack models on the basis of scientific ideas that discovering problems then solving them, meanwhile we conduct comprehensive analyses and comparisons on the main location privacy protection agreements systematically for the first time; (3) We summarize the maximum intensity attacker that each privacy protection agreement can handle by analyzing and comparing, then conclude the respective applicable scenario of each agreement. Zhou & Huang Expires November 29, 2014 [Page 3] Internet-Draft CTA May 2014 2. The Attack Models The objects protected in WSNs are usually the source node (such as in precious animals detection system, the position of the node which has monitored animals can't be exposed to illegal hunters) and the sink node (such as in battlefield information collection system, the location of the last node which is responsible for transferring a variety of information to the soldiers can't be exposed to the enemy). According to the property of object which needs to be protected we divide possible attackers into two categories: the attackers who attack source node (source attackers) and the attackers who attack sink node (sink attackers). This article assumes that two types of attackers both have the following characteristics: ① attackers have excellent hardware, sufficient storage space and powerful computation ability; ② attackers can detect traffic only in one region, but are not capable of decrypting data packets [PRLA]; ③ attackers can only trace the nodes sending data packets but the nodes receiving data packets. 2.1. The Model of Source Attackers The process of attacker tracing back source node's location is described as follows: the attacker starts monitoring at the sink node, when monitored a message, he can deduce that the signal is issued by node A through wireless signal positioning device, then moves immediately to node A to continue to wait, when a new message received he determines that it was issued by node B and then quickly moves to node B, repeat this process can trace to the location of the source node. This paper divides the source attackers into two categories based on the sources attackers' tracking method: the patient source attacker and the careful source attacker. The model of patient source attacker is described as follows: the attacker follows a simple and natural attack strategy: he starts on the position of sink node (base station) to wait until a new message is heard, and then immediately move to the node that generated the message, repeat this process until the location of the source node is traced. The model of cautious source attacker is described as follows: because some privacy protection technology [3] could lead an attacker to strand at a location remote from the real source node, the strategy of cautious source attacker is limiting the eavesdropping time in one position, if he has not received any new messages within a specified time interval, he thinks that he was misled to current Zhou & Huang Expires November 29, 2014 [Page 4] Internet-Draft CTA May 2014 position, and then hops back to the previous position to continue listening. 2.2. The Model of Sink Attackers Sink attackers determine which nodes are on the transmission path according to the time sequence of date packet transmission, then mobile hop by hop, and finally get to the sink node. The process of attacker tracking sink node's position is described as follows: assuming the attacker listening for message transmitting within the range of one hop at node C, he monitors that node C sends a data packet at first, then node B transmits a data packet subsequently, the attacker moves to the node B immediately and infers that the transmission path at this time is C to B, according to this method, the attacker tracks the location of the nodes which are one hop from the base station as having captured the sink node. Similarly sink attackers are also divided into two categories: the patient sink attacker and the cautious sink attacker. The principle of their attacker model is similar to the principle of corresponding source attacker model, not repeat them. 3. Location Privacy Protection Agreements In order to prevent these attackers from destroying the location privacy security of wireless sensor networks, a series of security protocols are proposed, such as: phantom routing (PhR), source location privacy preservation protocol in wireless sensor networks using source-based restricted flooding (PUSBRF), location-privacy routing protocol (LPR), location privacy support scheme (LPSS), differential enforced fractal propagation (DEFP). This section will classify these main protocols and describe the principle of each protocol in detail. In this paper, we divide the main privacy and security protocols which are mentioned above into three categories: source location privacy protection protocols, sink location privacy protection protocols and both location privacy protection protocol. Source location privacy protection protocols include: PhR, PUSBRF; sink location privacy protection protocols include: LPR, DEFP; and both location privacy protection protocol includes LPSS. 3.1. Source Location Privacy Protection Protocols Zhou & Huang Expires November 29, 2014 [Page 5] Internet-Draft CTA May 2014 3.1.1. Phantom Routing (PhR) Take the panda-hunter model[PhR] for example, the description of phantom routing is decribed as follows: in PhR , the transmission of each information goes through two phases:① the random walk phase , may be a pure random walk or a directional walk (based on sector or hop count between the node and the sink node[PhR]);② subsequent flooding/single-path routing phase, which will send the information to the sink. When the source node sends a message, the message is unicasted Hwalk hops randomly, then pass it to the base station based on the baseline (probability) flooding[SECH]or single- path routing[PhR]. Because of PhR, after an attacker intercepted messages i he will wait a long time before receiving the next message i+1, when he finally receives the message i+1, the instant sender of this message may lead the attacker to the position which is away from the true source node. On the basis of phantom routing (PhR) also proposed the phantom routing with location angle (PRLA)[SECE], PRLA is consist of three phases:① the sink node floods a query message in the whole network, so that each node can creates the shortest path to the sink and divides its neighboring nodes into two direction collections according to the distance between neighboring nodes and the sink;② the source node produces a limited flooding with the range of random walk, this process makes each node can get the inclination angle of respective neighboring nodes and calculate the transmitting messages possibility of each neighboring node;③ the source node sends date packets to the sink node, each data packet will be transmitted Hw hops in a random walk way based on the inclination angle, then along the shortest route path goes to the sink node from the phantom source node. PRLA is essentially an improvement of PhR's random walk phase, to a degree it avoids the generation of the offset path[PUSBRF], on the basis of PhR it further improves the safety time. Greedy random walk (GROW) is essentially an improvement of PhR's random walk phase too, in GROW, the sensor node each time selects a neighboring node from those who did not participate in the random walk phase, in this way, random walking is always trying to cover a area where hasn't accessed to by greedy strategy[GROW], thereby improving the ability of sensor networks against attackers. 3.1.2. Protocol Using Source-based Restricted Flooding (PUSBRF) PUSBRF protocol is consist of four phases:① network security initialization phase;② source node h hops limited flooding phase;③ h hops directional routing phase, the direction of each Zhou & Huang Expires November 29, 2014 [Page 6] Internet-Draft CTA May 2014 hop is selected by the current node based on the minimum hop value that its neighboring apart from the source node;④ the shortest path routing phase. The process of network initialization phase is described as follows: complete the establishment of the key, discover the neighboring nodes to achieve the information of minimum hop value that each ordinary nodes apart from the base station, and each node pre-loads the following parameters: the public key (Kpub) used for message encryption, the list of neighboring nodes (Tu), hop value h, then generate a base-station broadcast in the whole network, the base station broadcasts the initialization message BM={BRO_BASE,ID,hop_bs} in the entire network, in which BRO_BASE indicates the type of messages, ID indicates the identity of the node that sent the message, hop_bs indicates the hop count of the message which is initially 0., PRLA is consist of three phases:① the sink node floods a query message in the whole network, so that each node can creates the shortest path to the sink and divides its neighboring nodes into two direction collections according to the distance between neighboring nodes and the sink;② the source node produces a limited flooding with the range of random walk, this process makes each node can get the inclination angle of respective neighboring nodes and calculate the transmitting messages possibility of each neighboring node;③ the source node sends date packets to the sink node, each data packet will be transmitted Hw hops in a random walk way based on the inclination angle, then along the shortest route path goes to the sink node from the phantom source node. The process of the source node h hops limited flooding phase is described as follows: it makes the source node realize the broadcast in whole network within h hops, each node which is in the rage of h hops from the source node gets the minimal distance between itself and the source, then in list Tu adds the minimal hop value that the neighboring nodes away from the source node and records the value. The phantom source nodes generated in h hops directional routing phase are far enough away from the real source node and their location is diverse. The shortest path routing achieves transmitting packets from the phantom source node to the base station in a shortest period of time. 3.2. Sink Location Privacy Protection Protocols Zhou & Huang Expires November 29, 2014 [Page 7] Internet-Draft CTA May 2014 3.2.1. Location-privacy Routing Protocol (LPR) Because the goal of routing protocols is to transmit a packet along the shortest possible path to the destination, the packets' forwarding direction is always pointing to the receiver. Then the attacker will determine the wright node which the real package goes to according to the general trend of path. In order to resist this kind of problem LPR protocol has been proposed. LPR randomizes routing path, so that the forward direction of packages does not always point to the receiver. The route consists of two phases: ① each sensor node divides his neighboring nodes into two lists: a closer list which is consist of the neighboring nodes whose distance to the destination is shorter than its own; a further list which is consist of the neighboring nodes whose distance to the destination is longer than equal to its own, the specific classification criteria refer to the literature [LPR]. ②When a sensor node forwards a date packet, he chooses a neighbor node in one of the two lists randomly as the next hop node of the package, and the selection probability from the further list as the next hop node is Pf, so the selection probability from the closer list as the next hop node is 1-Pf. 3.2.2. Differential Enforced Fractal Propagation (DEFP) DEFP is a simple distributed algorithm based on DFP[DEFP]. The key idea of the program is to leave early packet forwarding nodes have a higher chance of false packet transmission in the next phase, at the beginning DEFP allocates one vote to every neighboring node. When a node selects one of his neighboring nodes as the next node which is false packets forwarded to, the votes of the node increase k. According to this approach, after using lottery scheduling algorithm [SECH], when a node has forwarded a fake packet to one of its neighboring nodes, it will continue to forward other fake packets to the same neighboring node with rising probability. 3.3. Both Location Privacy Protection Protocols The program consists of two phases:① Each sensor node divides his neighboring nodes into three sets: a small gradient [SECT]set comprised of the neighboring nodes with smaller gradient value; an equivalent gradient set comprised of the neighboring nodes with the same gradient value; a large gradient comprised of the neighboring nodes with larger gradient value. ② When a neighboring node transmits a packet, he selects the next hop node from the equivalent gradient set with the probability Pi, or selects the next hop node from the small gradient set with the probability 1-Pi. LPSS also can be used combine with the fake package strategy. Zhou & Huang Expires November 29, 2014 [Page 8] Internet-Draft CTA May 2014 4. Performance Comparison This section compares the performance of the location privacy security protocols mainly by three parameters: security strength (safety time), transmission delay, communication overhead. (1) Safety time (privacy protection strength): the number of packages sent by the source node before the target node exposed to the enemy (before hunters capturing the panda or enemy discovering soldiers who receive information), the more of packages be sent the longer of safety period, conversely the shorter of safety period; (2) Energy loss (communication overhead): the average hop value through which the data packet sent by the source node eventually arrives at the sink node (base station), and the lager of the hop value the greeter of communication overhead, conversely the smaller of communication overhead; (3) Propagation delay (transmission delay): the period in which the data packet sent by the source node eventually arrives at the sink node (base station), obviously lager of the average hop value the longer of transmission delay, conversely the shorter of transmission delay. Combining with the consequence in (2) can easily conclude that the communication overhead is proportional to transmission delay. In order to facilitate the comparison, source location privacy protection protocols all use the same simulation configuration: in the OMNet[SECT]simulation environment, we distribute 10000 sensor nodes uniformly in the network with area of 6000*6000 m2, in which the communication radius of each node is 110m. So the average number of neighboring nodes of each node is 8.64, weakly connected nodes (node number of neighboring nodes is less than or equal to 3) account for only about 1%, the attackers begin tracking from the base station. The communication overhead is closely related to two parameters: the hop value of random walks and the distance between the source node and the base station. When research the changing trend with one parameter, we need to assume the other parameter as a fixed value. Assume that the distance between the source node and the base station are 60 hops, the relationship between communication overhead and hop count of random directional walks shows that:① With the number of random directional hops increasing, the communication overhead (average transmission delay) of PhR and PUSBRF both increase. This is because with the number of random directional hops increasing, date packets need forward more times during random routing phase to reach phantom source nodes, however, this phase doesn't make Zhou & Huang Expires November 29, 2014 [Page 9] Internet-Draft CTA May 2014 contribution to pass packets to the base station, thus their communication overhead improves.② When the random directed hop value is fixed, the communication overhead of PUSBRF is slightly higher, because the directed walk of PhR is based on the number of hops between the node to the base station, so PhR only need the base station broadcast in the whole network, but from the above mentioned phases of PUSBRF protocol we can see, PUSBRF requires not only the base station broadcast in the whole network but also needs the source node broadcast in the whole network within h hops. Make the value of random directional hops as h=15, then the trend of the two protocols between the communication overhead and hops from the source node to the base station shows that: ① the communication overhead (average transmission delay) of PhR and PUSBRF both increase with the distance between the source node and the base station increasing. This is because with increasing distance between the source node and the base station, the data needs to go through more hops to reach the base station.② when the hop value of two protocols between the source node and the base station are the same, the communication overhead of them are about the same. (3) The security period is closely related to two parameters: the value of random directional hops and the distance from the source node to the base station. Assume that the distance between the source node and the base station are 60 hops, then the trend of the security period and the random directional hop value shows that: ① The security period of PhR and PUSBRF both increase with h increasing. This is because the increasing h makes the distance between the phantom source nodes generated by two protocols and the real source node further, then generates more random paths which make the source attackers more difficult to trace. ② When the random directional hop value are the same, the security period of PUSBRF is much longer than PhR's, this indicates that the safety performance of PUSBRF is better than PhR's. This is because phantom source nodes generated by PUSBRF are more diverse geographically than which are generated by PhR[PRLA]. Make the value of random directional hops as h=15, the trend of the security period and the distance from the source node to the base station shows that: ① With the increasing of the hop count between the source node and the base station, the security period of PhR and PUSBRF also increases. This is because when the hop count is larger, the more hops that source attackers need to trace back to the real source node. ② When the hop count between the source node and the base station of two protocols are the same, the safety performance of PUSBRF is better than PhR's, indicating that the safety performance of PUSBRF better than PhR, the reason is the same as above. Zhou & Huang Expires November 29, 2014 [Page 10] Internet-Draft CTA May 2014 The performance comparison of above two protocols and LPSS used with fake packets shows that: the safety performance of pure LPSS is between PhR and PUSBRF, so are communication overhead and transmission delay, when LPSS is used with the false packet strategy, the safety time increased substantially and the communication overhead becomes larger, but the transmission delay is still close to pure LPSS protocol, which is because the transmission paths of true packets are the same with pure LPSS, fake packets just used to confuse attackers, and don't affect the transmission of true packets. In summary, compared to the pure flooding and single- path routing, PhR can resist the attacker's packet tracing attack to some extent, but the phantom source nodes generated by PhR concentrate in one area with high probability; PUSBRF protocol makes up this deficiency, it can generate phantom source nodes which are geographical diversity with equal probability, and enhance the security of the source node's location privacy effectively, however the improvement of security period at the cost of increasing of communication overhead, so the communication overhead of PUSBRF is more than PhR's, the transmission delay is longer too, and can't weigh between the security period and the communication overhead; gets the weigh between security period and transmission delay by adjusting the value of the parameters Pi. When LPSS is used combines with false packet strategy, it can achieve impressive safety performance, but at the cost of communication overhead increasing. The above three protocols can withstand source attackers (including patient source attackers and cautious source attackers), and are more resistant to cautious source attackers[SECW], their pros and cons make we should select the appropriate protocol according to specific application requirements. The simulation results of location privacy protocols which can protect the sink node (base station) are shown as follows: In order to facilitate the comparison, sink location privacy protection protocols all use the same simulation configuration: in the OMNet simulation environment, we distribute 2500 sensor nodes uniformly in a sensor network, make the average number of neighboring nodes of each node be 8, and attackers began tracking from the source node. (1) At the packet forwarding phase LPR protocol selects the next hop node from the further list with probability Pf, and get the trend between the transmission delay and hop count from the source node to the sink node of pure LPR when Pf is 0.0%, 25%, 37.5%, meanwhile compare with DEFP. The resulet showa that: ① with the increasing of distance between the source node and the base station, Zhou & Huang Expires November 29, 2014 [Page 11] Internet-Draft CTA May 2014 the transmission delay of two protocols both increase. This is because when the source node is far away from the base station, sink attackers at the source node need to track more hops to reach the base station;② when the distance from the source node to the base station are the same in LPR, the transmission delay increases with the increasing of Pf. This is because Pf is the probability with which we select the next hop from the further list, the larger of Pf the more likely to choose the next hop from the further list, which extends the transmission path;③ when the distance between the source node and the base station are the same, the transmission delay of LPR is longer than DEFP's. (2) The trend between security period and Pf of pure LPR protocol and compare with DEFP shows that: ① with the increasing of Pf, the security period of LPR increases. This is because Pf is the probability with which we select the next hop from the further list, the larger of Pf the more likely to choose the next hop from the further list, which extends the transmission path, so sink attackers need trace a longer time to reach the base station;② the security period of LPR is longer than DEFP's, and the larger of Pf, the higher amplitude of LPR's security period longer than DEFP's. The performance comparison of above two protocols with fake packets strategy, pure LPSS and LPSS with fake packets strategy indicates that: when DEFP, LPR, LPSS all used with fake packets strategy, the security period of three protocols all improving, the transmission delay remain constant, but the energy consumption increasing. In summary, LPR can get the balance between privacy protection strength (security period) and energy consumption by adjusting Pf, LPR with fake packets strategy can effectively improve the safety performance of the program compared with DEFP, but its transmission delay and communication overhead are far greater than DEFP's, LPSS get the trade-off between transmission delay and security period by adjusting Pi, and with the increasing of hop counts between the source node and the sink node, the safety strength (security period)of LPSS increases evidently dramatically than LPR, but LPSS can only play full advantage when it is used with fake packets strategy, otherwise it isn't superior than LPR and DEFP comprehensively. The above three protocols can resist sink attackers (including of patience sink attackers and cautious sink attackers), and they all have their pros and cons, we need select the appropriate protocol according to specific application requirements. Zhou & Huang Expires November 29, 2014 [Page 12] Internet-Draft CTA May 2014 5. Security Consideration This paper divides attackers into two types based on the properties of the objects which need be protected: source attackers and sink attackers, then establishes corresponding attack models, after that we propose appropriate protocol in accordance with attack models, including phantom routing (PhR), source location privacy preservation protocol in wireless sensor networks using source-based restricted flooding (PUSBRF), location-privacy routing protocol (LPR), location privacy support scheme (LPSS), differential enforced fractal propagation (DEFP). At last we have comprehensive analysis and comparison of these location privacy protection protocols systematically, mean while sum up the advantages and disadvantages of each protocol. 6. IANA Consideration To be completed. 7. References [RFC4948] Perring, A., Szewczyk, R., Tygar, D., Wen, V., and D. Culle, "Spins: security protocols for sensor networks", May 2007. [RFC4949] Eschenaur, L. and V. Gligor, "A key-management scheme for distributed sensor networks", August 2007. [PhR] Kamat, P., Zhang, Y., Trappe, W., and C. Ozturk, "Enhancing source location privacy in sensor network routing", August 2005. [GROW] Xi, Y., Shi, W., and L. Andersson, "Preserving source location privacy in monitoring-based wireless sensor networks", August 2006. [PRLA] W P, Wang., Chen, L., and Wang. J X, "A source--location privacy protocol in WSN based on locational angle", August 2008. [PUSBRF] Juan, C., Binxing, F., and Y. Lihua, "A Source--Location Privacy Preservation Protocol in Wireless Sensor Networks Using Source--Based Restricted Flooding", August 2010. [LPR] Jian, Y. and S. Chen, "Protecting Receiver-Location privacy in Wireless Sensor networks", August 2007. Zhou & Huang Expires November 29, 2014 [Page 13] Internet-Draft CTA May 2014 [LPSS] Kang, L., "Protecting location privacy in large--scale wireless sensor networks", August 2009. [DEFP] Deng, J., Han, R., and S. Mishra, "Countermeasures against traffic analysis attacks in wireless sensor networks", October 2005. [SECH] Cheng, Z. and W. Heinzelman, "Flooding Strategy for Target Discovery in Wireless Networks", April 2003. [SECE] Waldspurger, C. and W. Weihl, "Lottery scheduling: Flexible proportional-share resource management", November 1994. [SECW] Ouyang, Y., Le, Z., Chen, G., Ford, J., and F. Makedon, "Entrapping adversaries for source protection in sensor networks", Jone 2006. [SECT] Mallanda, C., "Simulating Wireless Sensor Networks with OMNeT++[EB/OL]", Jone 2000. Authors' Addresses Lin Zhou SouthEast University SouthEast University,Nanjing,210012 Email: 573823136@qq.com Jie Huang SouthEast University SouthEast University,Nanjing,210012 Email: jhuang@seu.edu.cn Zhou & Huang Expires November 29, 2014 [Page 14]