scispace - formally typeset
Open AccessJournal ArticleDOI

Achieving Source Location Privacy and Network Lifetime Maximization Through Tree-Based Diversionary Routing in Wireless Sensor Networks

TLDR
A novel tree-based diversionary routing scheme for preserving source location privacy using hide and seek strategy to create diversionary or decoy routes along the path to the sink from the real source, where the end of each diversionary route is a decoy (fake source node), which periodically emits fake events.
Abstract
Wireless sensor networks (WSNs) have been proliferating due to their wide applications in both military and commercial use. However, one critical challenge to WSNs implementation is source location privacy. In this paper, we propose a novel tree-based diversionary routing scheme for preserving source location privacy using hide and seek strategy to create diversionary or decoy routes along the path to the sink from the real source, where the end of each diversionary route is a decoy (fake source node), which periodically emits fake events. Meanwhile, the proposed scheme is able to maximize the network lifetime of WSNs. The main idea is that the lifetime of WSNs depends on the nodes with high energy consumption or hotspot, and then the proposed scheme minimizes energy consumption in hotspot and creates redundancy diversionary routes in nonhotspot regions with abundant energy. Hence, it achieves not only privacy preservation, but also network lifetime maximization. Furthermore, we systematically analyze the energy consumption in WSNs, and provide guidance on the number of diversionary routes, which can be created in different regions away from the sink. In addition, we identify a novel attack against phantom routing, which is widely used for source location privacy preservation, namely, direction-oriented attack. We also perform a comprehensive analysis on how the direction-oriented attack can be defeated by the proposed scheme. Theoretical and experimental results show that our scheme is very effective to improve the privacy protection while maximizing the network lifetime.

read more

Citations
More filters
Journal ArticleDOI

Routing protocols for wireless sensor networks: What the literature says?

TL;DR: The routing problems are categorized and the routing-related optimization problems are examined and the optimization of the routing algorithms and the meta-heuristic study of routing optimization are explored.
Journal ArticleDOI

PTAS: Privacy-preserving Thin-client Authentication Scheme in blockchain-based PKI

TL;DR: A Privacy-preserving Thin-client Authentication Scheme (PTAS) employing the idea of private information retrieval (PIR) is presented, which enables thin-clients to run normally like full node users and protect their privacy simultaneously and a ( m -1)-private PTAS is proposed which means thin-client’s information can be protected against a collusion of at most at most full nodes users.
Journal ArticleDOI

A survey on location privacy protection in Wireless Sensor Networks

TL;DR: A detail survey of existing Location Privacy Protection techniques in WSNs is presented, which provides a review of the literature about location privacy protection, which is classified into the following three categories: 1) source nodes' location privacy preserving, 2) sink nodes' Location Privacy preserving, and 3) location Privacy preserving for both source and sink nodes.
Journal ArticleDOI

An energy-efficient and sink-location privacy enhanced scheme for WSNs through ring based routing

TL;DR: Both theoretical analysis and simulation results show that the proposed RBR scheme can protect location privacy of sinks effectively and can have high network lifetime, high network security and high energy efficiency.
Journal ArticleDOI

CPSLP: A Cloud-Based Scheme for Protecting Source Location Privacy in Wireless Sensor Networks Using Multi-Sinks

TL;DR: A scheme based on the cloud using multi-sinks (CPSLP) is proposed to address the issue of source location privacy and can prevent adversarial capture and maintain a high level of privacy protection at the same time.
References
More filters
Journal ArticleDOI

Wireless sensor networks: a survey

TL;DR: The concept of sensor networks which has been made viable by the convergence of micro-electro-mechanical systems technology, wireless communications and digital electronics is described.
Journal ArticleDOI

The Byzantine Generals Problem

TL;DR: The Albanian Generals Problem as mentioned in this paper is a generalization of Dijkstra's dining philosophers problem, where two generals have to come to a common agreement on whether to attack or retreat, but can communicate only by sending messengers who might never arrive.
Book ChapterDOI

The Byzantine generals problem

TL;DR: In this article, a group of generals of the Byzantine army camped with their troops around an enemy city are shown to agree upon a common battle plan using only oral messages, if and only if more than two-thirds of the generals are loyal; so a single traitor can confound two loyal generals.
Proceedings ArticleDOI

Enhancing Source-Location Privacy in Sensor Network Routing

TL;DR: This paper provides a formal model for the source-location privacy problem in sensor networks and examines the privacy characteristics of different sensor routing protocols, and devised new techniques to enhance source- location privacy that augment these routing protocols.
Proceedings ArticleDOI

Source-location privacy in energy-constrained sensor network routing

TL;DR: This paper focuses on protecting the source's location by introducing suitable modifications to sensor routing protocols to make it difficult for an adversary to backtrack to the origin of the sensor communication.
Related Papers (5)