Abstract
In order to secure the source location privacy when information is sent back to the base station in wireless sensor network, we propose a novel routing strategy which routes the packets to the base station through three stages: directional random routing, h-hop routing in the annular region and the shortest path routing. These stages provide two fold protections to prevent the source location from being tracked down by the adversary. The analysis and simulation results show that proposed scheme, besides providing longer safety period, can significantly reduce energy consumption compared with two baseline schemes.
Article PDF
Similar content being viewed by others
Avoid common mistakes on your manuscript.
References
Hu R H, Dong X M, Wang D L. Protecting data source location privacy in wireless sensor networks against a global eavesdropper[EB/OL].[2014-08-13]. http: //downloads. hindawi. com/journals/ijdsn/2014/492802.pdf.
Ozturk C, Zhang Y, Trappe W. Source-location privacy in energy-constrained sensor network routing [C] // Proc 2nd ACM Work-shop on Security of Ad Hoc and Sensor Networks. New York: ACM Press, 2004: 88–93.
Braginsky D, Estrin D. Rumor routing algorithm for sensor networks [C] // Proc 1st ACM International Workshop on Wireless Sensor Networks and Applications. New York: ACM Press, 2002: 22–31.
Li Y, Ren J. Providing source-location privacy in wireless sensor networks [C] // Proc International Conference on Wireless Algorithms, Systems and Applications. Berlin: Springer-Verlag, 2009: 338–347.
Li Y, Lightfoot L, Ren J. Routing-based source-location privacy protection in wireless sensor networks [C] // Proc IEEE International Conference on Electro/Information Technology. Piscataway: IEEE Press, 2009: 29–34.
Kamat P, Zhang Y, Trappe W. Enhancing source-location privacy in sensor network routing [C] // Proc 25th IEEE International Conference on Distributed Computing Systems. Los Alamitos: IEEE Press, 2005: 599–608.
Zhang L. A self-adjusting directed random walk approach for enhancing source-location privacy in sensor network routing [C] // Proc 2006 International Conference on Wireless Communications and Mobile Computing. New York: ACM Press, 2006: 33–38.
Wang W P, Chen L, Wang J X. A source-location privacy protocol in WSN based on locational angle [C] // Proc IEEE International Conference on Communications. Piscataway: IEEE Press, 2008: 1630–1634.
Yao J, Wen G. Preserving source-location privacy in energy-constrained wireless sensor networks [C] // Proc 28th International Conference on Distributed Computing Systems. Los Alamitos: IEEE Press, 2008: 412–416.
Deng J, Han R, Mishra S. Counter measures against traffic analysis attacks in wireless sensor networks [C] // Proc First International Conference on Security and Privacy for Emerging Areas in Communications Networks. Washington D C: IEEE Press, 2005: 113–126.
Wang H, Hsiang T. Defending traffic analysis with communication cycles in wireless sensor networks [C] // Proc 10th International Symposium on Pervasive Systems, Algorithms, and Networks. Washington D C: IEEE Press, 2009: 166–171.
Xi Y, Schwiebert L, Shi W. Preserving source location privacy in monitoring-based wireless sensor networks [C] // Proc 20th International Parallel and Distributed Processing Symposium. Piscataway: IEEE Press, 2006: 425.
Lightfoot L, Li Y, Ren J. Preserving source-location privacy in wireless sensor network using star routing [C] // Proc 2010 IEEE Global Telecommunications Conference. Piscataway: IEEE Press, 2010: 1–5.
Luo X, Ji X, Park M. Location privacy against traffic analysis attacks in wireless sensor networks [C] // Proc International Conference on Information Science and Applications. Piscataway: IEEE Press, 2010: 1–6.
Mahmoud M, Shen X. A cloud-based scheme for protecting source-location privacy against hotspot-locating attack in wireless sensor networks [J]. IEEE Transactions on Parallel and Distributed Systems, 2012, 23(10): 1805–1818.
Lin Q M, Yang J W, et al. Distributed face recognition in wireless sensor networks[EB/OL]. [2014-05-19]. http: //downloads. hindawi.com/journals/ijdsn/2014/175864. pdf.
Lu Z, Wen Y. Credit routing for source-location privacy protection in wireless sensor networks [C] // Proc IEEE 9th International Conference on Mobile Adhoc and Sensor Systems. Las Vegas: IEEE Press, 2012: 164–172.
Abderrazak A, Tarek M. TOSSIM and distributed binary consensus algorithm in wireless sensor networks [J]. Journal of Network and Computer Applications, 2014, 41: 451–458.
Author information
Authors and Affiliations
Corresponding author
Additional information
Foundation item: Supported by the National Natural Science Foundation of China (61170065), the Natural Science Foundation of Jiangsu Province (BK20130882) and the Scientific Research Foundation of Nanjing University of Posts and Telecommunications (NY214118)
Biography: LI Shuming, male, Senior engineer, research direction: network communications and network security.
Rights and permissions
About this article
Cite this article
Li, S., Xiao, Y., Lin, Q. et al. A novel routing strategy to provide source location privacy in wireless sensor networks. Wuhan Univ. J. Nat. Sci. 21, 298–306 (2016). https://doi.org/10.1007/s11859-016-1174-5
Received:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11859-016-1174-5