Source-Location Privacy Protection Based on Anonymity Cloud in Wireless Sensor Networks

被引:36
|
作者
Wang, Na [1 ]
Fu, Junsong [2 ]
Li, Jian [1 ]
Bhargava, Bharat K. [3 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Comp Sci, Beijing 100876, Peoples R China
[2] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, Natl Engn Lab Mobile Network Technol, Beijing 100876, Peoples R China
[3] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47906 USA
基金
中国博士后科学基金;
关键词
Source-location privacy protection; data confidentiality; anonymity cloud; message sharing; wireless sensor networks; SCHEME;
D O I
10.1109/TIFS.2019.2919388
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
An adversary can deploy parasitic sensor nodes into wireless sensor networks to collect radio traffic distributions and trace back messages to their source nodes. Then, he can locate the monitored targets around the source nodes with a high probability. In this paper, a Source-location privacy Protection scheme based on Anonymity Cloud (SPAC) is proposed. We first design a light-weight (t, n)-threshold message sharing scheme and map the original message to a set of message shares which are shorter in length and can be processed and delivered with minimal energy consumption. Based on the shares, the source node constructs an anonymity cloud with an irregular shape around itself to protect its location privacy. Specifically, an anonymity cloud is a set of active nodes with similar radio actions and they are statistically indistinguishable from each other. The size of the cloud is controlled by the preset number of hops that the shares can walk in the cloud. At the border of the cloud, the fake source nodes independently send the shares to the sink node through proper routing algorithms. At last, the original message can be recovered by the sink node once at least t shares are received. The simulation results demonstrate that the SPAC can strongly protect the source-location privacy in an efficient manner. Moreover, the message sharing mechanism of SPAC increases the confidentiality of network data and it also brings high tolerance for the failures of sensor nodes to the data transmission process.
引用
收藏
页码:100 / 114
页数:15
相关论文
共 50 条
  • [1] Source-location privacy full protection in wireless sensor networks
    Wang, Na
    Fu, Junsong
    Zeng, Jiwen
    Bhargava, Bharat K.
    [J]. INFORMATION SCIENCES, 2018, 444 : 105 - 121
  • [2] Routing-Based Source-Location Privacy Protection in Wireless Sensor Networks
    Li, Yun
    Lightfoot, Leron
    Ren, Jian
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON ELECTRO/INFORMATION TECHNOLOGY, 2009, : 27 - 32
  • [3] Credit Routing for Source-location Privacy Protection in Wireless Sensor Networks
    Lu, Zongqing
    Wen, Yonggang
    [J]. 9TH IEEE INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS (MASS 2012), 2012, : 164 - 172
  • [4] Providing Source-Location Privacy in Wireless Sensor Networks
    Li, Yun
    Ren, Jian
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, 2009, 5682 : 338 - 347
  • [5] Preserving Source-Location Privacy in Wireless Sensor Networks
    Li, Yun
    Ren, Jian
    [J]. 2009 6TH ANNUAL IEEE COMMUNICATIONS SOCIETY CONFERENCE ON SENSOR, MESH AND AD HOC COMMUNICATIONS AND NETWORKS (SECON 2009), 2009, : 493 - 501
  • [6] Protecting source-location privacy based on multirings in wireless sensor networks
    Yao, Lin
    Kang, Lin
    Deng, Fangyu
    Deng, Jing
    Wu, Guowei
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (15): : 3863 - 3876
  • [7] Routing-Based Source-Location Privacy in Wireless Sensor Networks
    Ren, Jian
    Li, Yun
    Li, Tongtong
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, 2009, : 620 - 624
  • [8] Quantitative Analysis on Source-Location Privacy for Wireless Sensor Networks
    Tang, Di
    Gu, Jian
    Hang, Weijia
    Ma, Xiao
    [J]. IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2020, : 805 - 809
  • [9] A Protecting Source-Location Privacy Scheme for Wireless Sensor Networks
    Miao, Xu
    Han, Guangjie
    He, Yu
    Wang, Hao
    Jiang, Jinfang
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE AND STORAGE (NAS), 2018,
  • [10] Source-Location Privacy Based on Directed Greedy Walk in Wireless Sensor Networks
    Yao, Jianbo
    [J]. 2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,