Routing-Based Source-Location Privacy in Wireless Sensor Networks

被引:0
|
作者
Ren, Jian [1 ]
Li, Yun [1 ]
Li, Tongtong [1 ]
机构
[1] Michigan State Univ, Dept Elect & Comp Engn, E Lansing, MI 48824 USA
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless sensor networks (WSN) have the potential to be widely used in many areas for unattended event monitoring. Mainly due to lack of a protected physical boundary, wireless communications are vulnerable to unauthorized interception and detection. Privacy is becoming one of the major issues that jeopardize the successful deployment of wireless sensor networks. While confidentiality of the message can be ensured through content encryption, it is much more difficult to adequately address the source-location privacy. For WSN, source-location privacy service is further complicated by the fact that the sensor nodes consist of low-cost and low-power radio devices, computationally intensive cryptographic algorithms (such as public-key cryptosystems) and large scale broadcasting-based protocols are not suitable for WSN. In this paper, we propose a scheme to provide both content confidentiality and source-location privacy through routing to a randomly selected intermediate node (RRIN). While being able to provide source-location privacy for WSN, our simulation results also demonstrate that the proposed scheme is very efficient and can be used for practical applications.
引用
收藏
页码:620 / 624
页数:5
相关论文
共 50 条
  • [21] A Source-location Privacy Preservation Method Based on Hilbert-filling-curve Routing Protocol in Marine Wireless Sensor Networks
    Li Panpan
    Xie Zhengxia
    Zhou Zhigang
    Yue Guangxue
    Zheng Shilian
    Yang Xiaoniu
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2020, 42 (06) : 1510 - 1518
  • [22] Exploiting Context-Awareness to Enhance Source-Location Privacy in Wireless Sensor Networks
    Rios, Ruben
    Lopez, Javier
    COMPUTER JOURNAL, 2011, 54 (10): : 1603 - 1615
  • [23] A source-location privacy preservation protocol in wireless sensor networks using source-based restricted flooding
    Chen J.
    Fang B.-X.
    Yin L.-H.
    Su S.
    Jisuanji Xuebao/Chinese Journal of Computers, 2010, 33 (09): : 1736 - 1747
  • [24] Preserving Source-Location Privacy through Redundant Fog Loop for Wireless Sensor Networks
    Dong, Mianxiong
    Ota, Kaoru
    Liu, Anfeng
    CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 1836 - 1843
  • [25] Strategic Location-Based Random Routing for Source Location Privacy in Wireless Sensor Networks
    Mutalemwa, Lilian C.
    Shin, Seokjoo
    SENSORS, 2018, 18 (07)
  • [26] A Security Scheme for Source-Location Privacy Protection in Wireless Sensor Networks by Selecting Phantom Nodes
    Xiaoguang Wei
    Qian Zhang
    Automatic Control and Computer Sciences, 2024, 58 (06) : 656 - 662
  • [27] All-Direction Random Routing for Source-Location Privacy Protecting against Parasitic Sensor Networks
    Wang, Na
    Zeng, Jiwen
    SENSORS, 2017, 17 (03)
  • [28] A Novel Routing Strategy to Provide Source Location Privacy in Wireless Sensor Networks
    LI Shuming
    XIAO Yan
    LIN Qiaomin
    QI Zhuzhu
    WuhanUniversityJournalofNaturalSciences, 2016, 21 (04) : 298 - 306
  • [29] Dynamic routing approach for enhancing source location privacy in wireless sensor networks
    Gulshan Kumar
    Rajkumar Singh Rathore
    Kutub Thakur
    Ahmad Almadhor
    Sardar Asad Ali Biabani
    Subhash Chander
    Wireless Networks, 2023, 29 : 2591 - 2607
  • [30] A Routing Protocol for Source Location Privacy in Wireless Sensor Networks with Multiple Sources
    Berdibek, Asset
    Saginbekov, Sain
    Q2SWINET'19: PROCEEDINGS OF THE 15TH ACM INTERNATIONAL SYMPOSIUM ON QOS AND SECURITY FOR WIRELESS AND MOBILE NETWORKS, 2019, : 93 - 99