This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 2011 proceedings Increasing Transmissioon Power for Higher Base-staation Anonymity in Wireless W Sensor Network Y Yousef Ebrahimi, Mohamed Younis Department of Computer Science and Electrical Engineering U University of Maryland, Baltimore County Baltimore, Maryland, USA yousef2, younis@umbc.edu Abstract— In a wireless sensor network nod des probe ambient conditions and send the measurements over mu ulti-hop routes to a base-station. The base-station aggregates thee received reports, and based on the findings it orchestrates a response either autonomously or through consultation with a remote commend center. Thus, the role of the base-station is so crucial that the d if the base-station network can be non-functional and/or isolated breaks down or gets destroyed. No won nder in a hostile environment, an adversary will target the base-station to inflict hat the base-station the most damage to the network. The fact th acts as a sink of all data traffic makes it vulneerable to attacks by tracking packet transmission and detecting its location. This t analysis and paper investigates a novel strategy to counter traffic boosts the anonymity of the base-station. A sensor transmits at a higher power in order to increase its numberr of neighbors and confuse an adversary who is assessing the link kability of nodes in quest to identify the route to the base-station n. Both analytical and simulation results are provided to cap pture the effect of increased transmission power on the base-statiion anonymity. I. INTRODUCTION A growing list of applications has drawn innterest in wireless sensor networks (WSNs) in recent years [1]. Typically a WSN n deployed to is composed of a large number of sensor nodes monitor their surroundings and report their measurements m to a nearby base-station [2]. The base-statioon interfaces the network to remote users and often task the sensors and manage their operation. For example, senssors may detect a target and informs the base-station, which inn turn aggregate all data and assesses the fidelity of the deetection and even performs target identification. Figure 1 show ws example WSN architecture. Sensor nodes are battery-opperated and their lifetime is limited. Therefore, multi-hop traansmission of data is a very popular optimization strategy inn order to cut on energy consumption in communications and extend the lifespan of nodes [2]. Most notable among the WSN appliications are those serving in hostile environments, such as combat field reconnaissance, border protection, and secuurity surveillance, where the network may be subject to an addversary’s attacks. Given the role that the base-station playys, it is the most attractive target for an adversary who opts to t inflict the most damage to the operation of the WSN. Indeed, destroying the base-station may deem the network useless.. The fact that the base-station is the sink of all data traffic maakes it vulnerable. Popular anonymous routing protocols thaat hide the node identity would not be a sufficient counterrmeasure since an adversary can track the individual wireless transmission and employ traffic analysis techniques to follow the data paths [3]. Since all active routes ends at the base-station, the adversary may be able to determine the location of the base-station and launch targeted attacks in order to prevennt the base-station from functioning properly. b decoded, traffic Since the intercepted packets cannot be analysis would rely on correlating the radioo transmissions of sensors in order to identify active links between pairs of directly reachable nodes. Agggregating all knowledge about these links can lead the adverssary to associate communicating nodes, predict the data routingg paths, and identify the sink of all traffic. To detect the indiviidual links, an adversary would use angle-of-arrival (AOA)) and time-of-arrive (TOA) estimation technology in order to determine the location of the mission power. By knowing the source and estimate the transm power and location, the adveersary can then determine the range and guess where the next n hop is. To counter such potential threat, a number of techniques have been proposed in a of the base-station the literature to boost the anonymity [4][5][6]. Anonymity refers to the undelectability of the node’s attributes, namely, its location, ID, and role. Most of the published approaches rely on introducing changes in the routing topology and traffic paattern in order to complicate the adversary’s analysis and divergge it away from the base-station. Unlike prior schemes, this paper explores a novel strategy o the base-station. The idea is for boosting the anonymity of increase the transmission pow wer of nodes so that the traffic analysis applied by an adversarry becomes highly complex and the level of uncertainty about the t base-station location grows. Pursuing longer transmission ranges increases the node degree in the network, which represennts the cardinality of the set of possible next hops for eachh transmission. We show that increasing the node degree caauses an exponential growth in the complexity of correlatingg the links among neighboring nodes to determine the roouting path. In addition, we analytically formulate the anonnymity as a function of the radio range. Since boosting the transsmission power may impact the network lifetime and increase signal interference, the derived anonymity formulation can serrve in trading-off and guide the designer setting the most suittable configuration parameters. The simulation results furtther quantify the effect of transmission power and connfirm the effectiveness of the proposed strategy in protectingg the base-station. Figure 1: An articulation of a WSN N in a border protection setup The rest of the paper is organized o as follows. The next section describes the considerred system and threat models. Section III discusses related work. w Section IV analyzes the effect of the transmission range on the anonymity of the basestation. The validation results are discussed in Section V. 978-1-61284-233-2/11/$26.00 ©2011 IEEE This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 2011 proceedings Finally, Section VI concludes the paper. II. SYSTEM AND THREAT MODELS This paper considers a WSN with a single base-station (BS) node. Sensors send their readings periodically to the BS over multi-hop routes. In other words, the BS is an in-situ user of the network. An anonymous routing protocol is employed to achieve unlinkable data delivery [7]. For example, packets sent to BS are encrypted on a per-hop basis in order to protect the privacy and integrity of the data. In addition, packet headers are encrypted to hide the identity (achieve ID anonymity) of communicating nodes. It is assumed that contemporary techniques are employed to make the BS visually hard to identify. These techniques are very popular in some applications that involve military equipments and uniform. The BS also avoids exposing itself by long-haul transmissions and limits its involvement in control traffic, e.g., new route discovery or route extension, so that it does not become distinguishable from sensors. An adversary is assumed to be remotely located and tries to detect and destroy the reconnaissance capabilities provided by the WSN. The goal of the adversary is to identify the location and attack critical nodes in the sensor network; namely the BS. The adversary employs proxy antenna within and in the vicinity of the deployment area and eavesdrops on the radio transmissions in order to understand the network structure and identify the BS. Every transmission is assumed to be intercepted by at least three antennas so that the adversary can triangulate and find the location of the source node [8][9]. The adversary can detect and capture packets but cannot apply cryptanalysis to decrypt the contents of the packets. The adversary is basically a passive observer of the network and does not inject his packets into the network and is assumed to take sufficient precautions to avoid detection. III. RELATED WORK Since anonymity is a qualitative measure, some research efforts have been dedicated to defining means to quantify it and assess the effectiveness of anti-traffic analysis techniques. The adversary success depends on the insight provided by the collected information while observing the network. Therefore, information theoretic models have been deemed effective [6][10][11]. These models were mainly designed to fit the anonymity of the source and have been recently extended to suit the sink of data, i.e., the BS, in WSNs [12]. The GSAT model proposed in [3] is specifically designed for assessing the location anonymity of the BS. However, it does not converge without additional means, e.g., visual inspection. This shortcoming has been addressed in [12]. We employ the evidence theory models [6] in studying the impact of transmission power on the BS anonymity. Protecting the identity of the BS is usually achieved through anonymous routing mechanisms which encrypt the packets to cipher the routing information [7]. On the other hand, hiding the structure of the routing topology has been the main methodology for sustaining the anonymity of the BS against traffic analysis attacks. Since an adversary that pursues passive listening will eventually gather sufficient information to detect the location of the BS, a number of techniques have been proposed to keep the ambiguity of the structure of the topology in order to nullify the adversary analysis and boost the anonymity of the BS position. For example, Deng et al. [10] proposed a set of techniques that make the traffic pattern more disperse and introduce random fake paths starting from random positions in the WSN to confuse the adversary. On the other hand, the decoy sink protocol, proposed in [4], creates a dummy BS away from the real BS. All the data is first forwarded to the dummy BS and then re-routed to the real BS. Mehta [5] goes further to propose the creation of multiple fake sinks that are spread evenly throughout the network. In [12], the BS selectively forwards some of the received packets in random directions with varying time-to-live parameter in order to make the BS appear like a relay node rather than a sink. Furthermore, the BS is relocated in order to disturb the analysis and confuse the adversary. It is important to note that all approaches for increasing the BS anonymity impose significant overhead. The overhead includes the additional control traffic needed for topology management, the extra usage of energy and bandwidth in forwarding packets with useless or redundant payload, forced motion of assets, etc. In addition to its implementation simplicity, our proposed strategy limits the overhead to the increased power in the transmission and avoids changes in the routing topology and position of nodes. IV. INCREASING BASE-STATION ANONYMITY A. Approach Overview The availability of programmable range radio transceivers has made it attractive for designers to adjust the output power of a transmitter to the least level that would achieve sufficient signal-to-noise ratio at the receiver. Designers have relied on this feature to preserve the sensor’s onboard energy. Moreover, since the power loss is a quadratic function of the distance, disseminating the sensor data to the BS over multihop paths is very common in WSNs in order to further reduce the node’s energy consumed in communication and prolong the network lifetime [2]. However, such a practice makes it easier for the adversary to detect active links between nodes and correlate them to determine the route to the BS. Basically, the adversary will intercept a transmission by multiple antennas, locate the source and determine the transmission power and then guess where the receiver might be. Figure 2 explains how the adversary may analyze the intercepted transmission from node “A” to find out where the BS is positioned. The shaded area defines the boundary where the next hop may be located. When the transmission of “B” gets intercepted, the adversary can detect the existence of the link AÆB. Repeating this process reveals where the BS is located. The key factor for how quickly the adversary’s traffic analysis converges is the number of possible links that a transmission implies. For example, if the analysis reveals that node “A” has only one neighbor “B”, a transmission from “A” will be directed to “B”. Increasing the node degree makes the analysis more complicated. In other words, having high node force the adversary to analyze a general forest rather than a simple tree. Now, considering the fact that the BS is not transmitting to relay a data packet, determining the existence of a sink is easier when the transmitting node does have very few neighbors. To illustrate this point, let us consider Figure 1 again. If node “D” has only “C” as a neighbor and “D” transmits a packet soon after C transmits, an adversary would highly suspect that “D” is a neighbor of the sink node. By boosting the degree of node “D” the adversary would have low confidence in drawing such a conclusion. The above discussion explains the intuition for the proposed strategy. Basically, increasing the output power of would increase the distance that transmission will reach and De tra term th nsm ing e a is A ar ea dve sion 's lo to rsa ra ca be ry ng tio foc to i e e n a us de nab nd ed nti le on fy th e This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 2011 proceedings A BS F E C B Growing the range increases the node degree and grows the set of potential receivers BS E D C B's transmission may be correlated with that made earlier by of A and may lead the adversary to conclude that B is the next hop on the data path from A to the BS F A D B Increasing the trasmission range gives the impression that D is targeting E and makes it harder to detect that a packet is forwarded towards the BS Figure 2: Illustration of how an adversary can Figure 3: Increasing transmission range Figure 4: Illustration of the impact of varying analyze the traffic to detect the location of the introduces more communication links and the transmission range on the adversary’s BS. increases the level of uncertainty for analysis. adversary’s traffic analysis extend the list of possible recipients. Figure 3 shows the effect of using a long transmission range for the nodes in Figure 2. Now, node D and E can reach each other and thus the transmission of D may imply that E is the recipient and not the BS. The balance of this section provides detailed analysis to formulate the effect of the transmission power on anonymity. The next section summarizes the metric for assessing anonymity that the analysis uses. B. Anonymity Assessment A number of metrics have been proposed in [12] to quantitatively assess the anonymity of the BS. The most notable among these metrics is the evidence theoretical approach. Evidence theory is a branch of generalized information theory. The evidence theory model for traffic analysis considers each captured packet as an evidence of a communication link between a transmitter and a receiver. The probable set of destinations is determined based on the location of the packet source and the output power of the source radio, i.e., reachable range, while transmitting the packet. An adversary keeps on collecting and correlating evidences in order to draw a conclusion about the existence of end-to-end communication paths. Evidence for a path between two nodes is equal to the minimum evidence available on the individual links on the path. For example if S is the set of nodes in a network then the evidence E for any link relation L defined on S is given by: , | | 2, … 1 min The total evidence is equal to the number of packets observed by the adversary. The normalized value of evidences for link L is given by Enorm(L) = E(L)/Total Evidence. It expresses the proportion to which all relevant evidences support the claim that a particular element of S belongs to the link relation L. Dijiang Haung [11] further introduced a discord function, called Belief, for representing the anonymity of a node based on the collected evidences. The Belief denotes the adversary confidence that a node u is the end point of a path P and is defined as: … 2 The weighted belief of u refers to the sum of belief measures for all paths ending at u, each multiplied by the path length. To simplify the analysis, a square-shaped cell structure is considered for representing the deployment area. The size of a cell is related to the error that the adversary may experience when localizing the source of a radio transmission. Therefore, whenever a packet is transmitted by a sensor node the adversary can accurately determine the source cell from which the packet was transmitted. The adversary can then establish the probable area in which the recipient of the packet lies depending on the source position, transmission range and granularity of the cell. It is important to note that the number of cells has dramatic effect on the complexity of the traffic analysis as we show in the next section. C. Anonymity-Power Analysis An adversary intercepts each transmission, locates the source and estimates the output power of the operation amplifier of the radio transceiver. The output power is then used to identify the cells in which the receiver may be located. Now, the adversary has an evidence for the relationship between the transmitting cell and each reachable cell. As explained in [6][12], after collecting enough evidence, the adversary will correlated the links among neighbor cells in order to form aggregate paths that leads to the BS. In essence this process implies finding all paths that end to the location of BS and estimating the believe function Bel(P) for each path P. The paths with the highest Belief stand out as the most probably routes leading to the BS. To protect the BS, one would like to boost its anonymity by complicating the traffic analysis that an adversary may conduct and by making the BS hard to detect. The following discusses how increasing the transmission range contributes to these two goals. Complexity of Traffic analysis: To analyze the complexity of the evidence aggregation process, we model the cells as nodes in a graph G. Two cells ci and cj are connected in G if there was a transmission made by a sensor in ci with a range that covers cj. To determine the cell that most probably hosts the BS, one can apply depth first search from each cell (vertex) cm to determine all paths with non-zero Belief that lead to cm. The complexity of traversing a graph is O b , where b is the branching factor and d is the depth to search. For an N×N grid, this will be repeated for N2 cells which yields the overall execution time complexity of N O b . Since in WSNs, data are usually disseminated over the shortest multi-hop paths, an adversary may be able to limit the length of each path in the analysis to that of the shortest path, which for a grid, cannot exceed the diagonal of the grid. Thus, the complexity formula can be refined to be: ….. (3) O bN N The branching factor b depends on the degree of the vertices in G, which depends on the transmission range. Figure 4 shows how the transmission from region around the center, i.e., the black colored cell, with different range affects the analysis of the adversary. The recipient of the packet may lie in any of the grey colored region. Note that the transmitter and This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 2011 proceedings recipient may lie in the same cell, and hence the source cell is always included in the set of probable recipients. The number of probable recipient cells in the left and right configurations of Figure 4 is 25 and 9, respectively. From an adversary point of view, using a fine-grained grid gives a very much better understanding about the location of the BS. For example if we have an area of size 1000×1000 and the adversary assumes cell size of 250×250, there will be 16 cells. Thus, the execution time complexity will be 16 O b and the accuracy of the location of the BS will be 250×250, which is a low resolution. Obviously, using 100×100 grid boosts the accuracy of the location estimates, yet at a very excessive price in terms of an execution time . Increasing the transmission complexity of 100 O b power boosts the number of potential neighbors and pumps the value of b significantly higher which massively complicates the analysis for the adversary. If the transmission range of a sensor in cell “S” covers a neighboring cell in each direction: b = 2×3+ 2×1 = 2×(3+1) If it reaches two cells in each direction b = 2×5+2×3 + 2× 3+ 2×1 = 2× (5+3) + 2×(3+1) Generalizing, for a transmission range that covers up k cells away from S: 2 2 1 2 2 1 1 8 … 4 Combing (3) and (4), the complexity for the traffic analysis can be represented as a function of the transmission range as: Complexity 8 … 5 where / , L = Length of the monitored area, and / . Equation (5) can be employed for conducting power and anonymity tradeoff. The increase in the transmission power can be assessed based on how high the complexity of the traffic analysis ought to be boosted. For example, when the mission of the network is very critical, or few additional anti-traffic analysis measures are feasible, the price for increasing the power in terms of reduced node lifetime may be justified. BS undelectability: To demonstrate the positive impact on BS undelectability that an increased transmission range can achieve, let’s revisit how the evidences are used by the adversary. Equation (1) assigns a high evidence value for links between cells with large set of evidences. The Belief defined in Equation (2) depends on the collective evidences of the links that are part of the path. Thus, Equation (1) is in fact the key for highlighting the importance of a link and consequently the path. Having a gradient in the evidence values among the individual cells plays a major role in making some links to stand out and some to lose significance. Using the least power to communicate makes the impact of a transmission on the collected evidences more localized to the vicinity of the source. A network-wide view indicates that the localized impacts cause the overall variations in evidence values among the cells. Increasing the output power widens the scope and more cells grow their evidences. As the power gets increased, more cells are covered by the individual transmissions and the variations among the evidence values diminish. To illustrate this point, assume that a node has a range that covers the entire area. In that case, all cells will have the same evidence values and there will not any pattern that an adversary can notice. We validate this analysis through simulation in the next section. V. SIMULATION RESULTS A. Experiment Setup and Anonymity Metrics The effect of the transmission power and the above analysis were validated in a simulated environment. In the simulation experiments, 150 sensor nodes are uniformly spread over an area of 1000 × 1000 units. The BS is also randomly positioned within the area. Sensor nodes probe their surrounding and periodically report their values to the BS over least cost multihop paths that are set using the communication energy as link costs. Three configurations for the cell sizes are considered in the experiments; namely, 16 cells of size 250 × 250 units, 25 cells of size 200 × 200 units and 36 cells of 166 × 166 units. Naturally the cell size depends on the adversary’s capabilities. If the adversary can determine the source of signals with higher precision he often divides the deployment region into larger number of small sized cells. On the other hand, with only low precision tracking he would hope to find an approximate BS position by dividing the area into larger cells. Two traffic analysis strategies were considered for the adversary. In the first strategy, the adversary sets the cell size up front. This entails computation-intensive traffic analysis given the high complexity, as shown in Section V, and therefore only large cells are considered in the simulation experiments. The second involves a zooming strategy where the adversary applies course-grained analysis using large cells and then refine by decreasing the cell size as progress is made. For example, setting a 2×2 grid will lead to suspecting one cell that will be further probed by dividing it into smaller cells. Ultimately the network has to guess or estimate the adversary’s capabilities and make some assumption about the cell sizes. We have considered the above three different cell sizes to study the effect of the cell size on anonymity. Anonymity is measured using evidence theory, discussed in Section V. We report the evidence of the individual nodes to validate our earlier observation about difference among the cells under high transmission power. The number of data paths is also reported as indication of the execution time complexity. The results of the individual experiments are averaged over 30 runs. All results are subjected to 90% confidence interval analysis and found to stay within 10% of the sample mean. B. Simulation Results As discussed in section V, increasing the transmission range tends to even the evidence values among the individual cells. The simulation results in Figure 5 validate this effect. In this experiment the area has been divided into 36 cells (6×6 grid) and transmission range has been increased by the size of 1, 2, 3, 4, and 5 cells. Figure 5 clearly shows that increasing the transmission range has resulted in flattening the curve and reducing the variations among the evidence values of the cells. As argued earlier this increases the anonymity of the BS since there are fewer hints for the adversary to pursue. Recall that the Belief value reflects the adversary confidence that a certain node is indeed the end point of a path. Figure 6 shows the weighted belief for the cell that hosts the BS, which assess the BS anonymity. In Figure 6, boosting the transmission power increases the number of cells considered in the adversary’s analysis, which results in a drop of the belief values. Increasing the range by one cell in a 5x5 grid makes about 17% gain in anonymity (the belief value drops about 17% for adversary). Comparable gains are observed This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 2011 proceedings Figure 5: Effect of increasing transmission Figure 6: Effect of transmission power on Figure 7: Weighted Belief versus transmission range (measured in cell count) on the evidence Weighted Belief under normal adversary power for zooming adversary attack strategy. measure for individual cells (x-axis). strategy. when the adversary applies the zooming strategy, as indicated by Figure 7. This confirms the effectiveness of the transmission power increase on the BS anonymity, even when the adversary pursues advances traffic analysis strategies. Figure 8 shows the number of paths considered in the evidence calculation as we increase the transmission range, measured as a multiple of the cell size. Recall that link relations among directly reachable nodes are aggregated in order to detect end-to-end data routes. As mentioned in Section V, due to the high complexity, an adversary assumes that the shortest data routes are used in the network, meaning that the investigated paths cannot be longer than the diagonal of the grid. Even with this major simplification, Figure 8 shows that, the number of paths growing exponentially with the increase in transmission range, which in return requires major computational recourses for an adversary to perform the traffic analysis. The same observations can be made about Figure 9, when the adversary applies the zooming strategy. Although zooming achieves 2-order of magnitude reduction in the complexity, the analysis is still very complicated and exhaustive. Figure 8: Number of paths included in evidence deduction for zooming adversary model. Figure 9: number of paths considered in traffic analysis as transmission range measured in multiple of cell sizes, is increased. This plot reflects the complexity of the analysis when the adversary uses a pre-set grid size (normal strategy). VI. CONCLUSION The major role that the base-station (BS) plays in wireless sensor networks (WSNs) makes it a focal point of adversary's attack. An adversary can intercept the radio transmissions made by the sensor nodes and apply traffic analysis techniques to aggregate the collected information in order to identify the BS location. Increasing the anonymity of the BS is an effective countermeasure for the adversary's attempts. This paper has studied how increasing the transmission power of sensor nodes can be exploited as a means for boosting the BS anonymity. It has been shown that extending the range makes it harder for an adversary to detect patterns in the intercepted transmissions that can support his analysis. In addition, increasing the power boosts the network connectivity and causes a major growth in the complexity of the adversary’s analysis. The simulation results have confirmed the effectiveness of the proposed strategy. Future work includes extending the study to capture the effectiveness of selective and random power increase by subset of the nodes. Acknowledgement: This work is supported by the National Science Foundation, contract # 00002270 and 00005844. REFERENCES C-Y. Chong and S.P. Kumar, “Sensor networks: Evolution, opportunities, and challenges,” Proceedings of the IEEE, Vol. 91, No. 8, pp. 1247- 1256, August 2003. [2] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E Cayirci, “Wireless sensor networks: a survey,” Computer Networks, Vol. 38, No. 4, pp. 393-422, March 2002. [3] J. Deng, R. Han, and, S. Mishra, “Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks,” in the Proceedings of the 1st International Conference on Security and Privacy For Emerging Areas in Communications Networks , September 2005. [4] W. Conner, T. Abdelzaher, K. Nahrstedt, “Using Data Aggregation to Prevent Traffic Analysis in Wireless Sensor Networks,” Proc. of the International Conf. on Distributed Computing in Sensor Systems (DCOSS’06) Springer-Verlag, LNCS 4026, June 2006. [5] K. Mehta, D. Liu, and M. Wright, “Location Privacy in Sensor Networks Against a Global Eavesdropper,” Proc. of the IEEE Int’l Conference on Network Protocols (ICNP’07), Beijing, China October 2007. [6] D. Huang, “On Measuring Anonymity For Wireless Mobile Ad-hoc Networks,” Proc. of the 31st IEEE Conference on Local Computer Networks, Tampa, FL, November 2006. [7] S. Seys and B. Preneel, “ARM: Anonymous Routing Protocol for Mobile Ad hoc Networks,” Proc. of the 20th IEEE International Conference on Advanced Information Networking and Applications, Vienna, Austria, April 2006. [8] A. Savvides, C. Han, and M. Srivastava, “Dynamic Fine-grained Localization in Ad-hoc Networks of Sensors,” Proc. of the 7th Annual International ACM Conference on Mobile Computing and Networking (MobiCom’01), Rome, Italy July 2001. [9] D. Niculescu and B. Nath, “Ad hoc Positioning System (APS) Using AoA,” Proc. of IEEE INFOCOM, San Francisco, CA, April 2003. [10] C. D´iaz, S. Seys, J. Claessens, and B. Preneel, “Towards Measuring Anonymity,” in the Proceedings of the Privacy Enhancing Technologies Workshop (PET 2002), R. Dingledine and P. Syverson, editors, Springer-Verlag, LNCS 2482, April 2002. [11] A. Serjantov and G. Danezis, “Towards an Information Theoretic Metric for Anonymity,” Proceedings of the Privacy Enhancing Technologies Workshop (PET 2002). R. Dingledine and P. Syverson, editors, Springer-Verlag, LNCS 2482, April 2002. [12] U. Acharya and M. Younis, “Increasing Base-Station Anonymity in Wireless Sensor Networks,” Journal of Ad-hoc Network, Vol. 8, No. 8, pp. 791-809, November 2010. [1]