Source-Location Privacy through Dynamic Routing in Wireless Sensor Networks

被引:0
|
作者
Li, Yun [1 ]
Ren, Jian [1 ]
机构
[1] Michigan State Univ, Dept Elect & Comp Engn, E Lansing, MI 48824 USA
关键词
Source-location privacy; dynamic routing; intermediate node; simulation; wireless sensor networks (WSNs);
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks (WSNs) have the potential to be widely used in many areas for unattended event monitoring. Mainly due to lack of a protected physical boundary, wireless communications are vulnerable to unauthorized interception and detection. Privacy is becoming one of the major issues that jeopardize the successful deployment of wireless sensor networks. While confidentiality of the message can be ensured through content encryption, it is much more difficult to adequately address the source-location privacy. For WSNs, source-location privacy service is further complicated by the fact that the sensor nodes consist of low-cost and low-power radio devices, computationally intensive cryptographic algorithms and large scale broadcasting-based protocols are not suitable for WSNs. In this paper, we propose source-location privacy schemes through routing to randomly selected intermediate node(s) before the message is transmitted to the SINK node. We first describe routing through a single a single randomly selected intermediate node away from the source node. Our analysis shows that this scheme can provide great local source-location privacy. We also present routing through multiple randomly selected intermediate nodes based on angle and quadrant to further improve the global source location privacy. While providing source-location privacy for WSNs, our simulation results also demonstrate that the proposed schemes are very efficient in energy consumption, and have very low transmission latency and high message delivery ratio. Our protocols can be used for many practical applications.
引用
收藏
页数:9
相关论文
共 50 条
  • [41] A new 'Direction' for Source Location Privacy in Wireless Sensor Networks'
    Rana, Shehla S.
    Vaidya, Nitin H.
    [J]. 2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012, : 342 - 347
  • [42] Providing Source Location Privacy in Wireless Sensor Networks: A Survey
    Conti, Mauro
    Willemsen, Jeroen
    Crispo, Bruno
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (03): : 1238 - 1280
  • [43] Energy-Aware Location Privacy Routing for Wireless Sensor Networks
    Zhang, Jingjing
    Jin, Zhengping
    [J]. SECURITY, PRIVACY AND ANONYMITY IN COMPUTATION, COMMUNICATION AND STORAGE, (SPACCS 2016), 2016, 0067 : 26 - 32
  • [44] An Anonymous Routing Scheme for Preserving Location Privacy in Wireless Sensor Networks
    Zhou, Liming
    Shan, Yingzi
    Chen, Xiaopan
    [J]. PROCEEDINGS OF 2019 IEEE 3RD INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2019), 2019, : 262 - 265
  • [45] An Efficient Privacy Preserving Protocol for Source Location Privacy in Wireless Sensor Networks
    Roy, Pradecp Kumar
    Rijhim
    Singh, Jyoti Prakash
    Kumar, Prabhat
    [J]. PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2016, : 1093 - 1097
  • [46] Achieving Source Location Privacy and Network Lifetime Maximization Through Tree-Based Diversionary Routing in Wireless Sensor Networks
    Long, Jun
    Dong, Mianxiong
    Ota, Kaoru
    Liu, Anfeng
    [J]. IEEE ACCESS, 2014, 2 : 633 - 651
  • [47] A decision theoretic framework for selecting source location privacy aware routing protocols in wireless sensor networks
    Gu, Chen
    Bradbury, Matthew
    Kirton, Jack
    Jhumka, Arshad
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 87 : 514 - 526
  • [48] A Cloud-Based Scheme for Protecting Source-Location Privacy against Hotspot-Locating Attack in Wireless Sensor Networks
    Mahmoud, Mohamed M. E. A.
    Shen, Xuemin
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (10) : 1805 - 1818
  • [49] Fake source-based source location privacy in wireless sensor networks
    Jhumka, Arshad
    Bradbury, Matthew
    Leeke, Matthew
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (12): : 2999 - 3020
  • [50] Jellyfish dynamic routing protocol with mobile sink for location privacy and congestion avoidance in wireless sensor networks
    Christopher, V. Bibin
    Jasper, J.
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 112