An energy-efficient source-anonymity protocol in surveillance systems

Abstract Source-location privacy is a critical security property in event-surveillance systems. However, due to the characteristics of surveillance systems, e.g., resource constraints, diverse privacy requirements and large-scale network, the existing anonymity mechanisms cannot effectively deal with the problem of source-location privacy protection. There is an imbalance on network load and transmission latency for most of the existing anonymity schemes, which causes “funnel effect” and conflicts with anonymity. This paper proposes the dynamic optimal mix-ring-based source-location anonymity protocol, DORing. In this scheme, we first set the dynamic optimal mix-ring to collect and mix the network traffic, which can satisfy the diverse QoS requirements for all the packets. Secondly, we propose the sector-based anonymity assess to control the process of mixing in order to filter out the dummy packets and deliver the authentic packets to sink. Finally, the location of mix-ring is adjusted to balance network energy consumption, prolong the lifetime of the network and resist global attack. The simulation results demonstrate that DORing is very efficient in balancing energy consumption and transmission latency and can significantly prolong survival period of the network and ensure security as well as latency to satisfy the packets’ requirements.

[1]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[2]  Arshad Jhumka,et al.  Towards Understanding Source Location Privacy in Wireless Sensor Networks through Fake Sources , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[3]  Wade Trappe,et al.  Enhancing Source-Location Privacy in Sensor Network Routing , 2005, ICDCS.

[4]  Junsheng Zhang,et al.  Data Security and Privacy in Cloud Computing , 2014 .

[5]  Donggang Liu,et al.  Protecting Location Privacy in Sensor Networks against a Global Eavesdropper , 2012, IEEE Transactions on Mobile Computing.

[6]  Roberto Di Pietro,et al.  Events privacy in WSNs: A new model and its application , 2011, 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.

[7]  Jie Wu,et al.  Quantitative Measurement and Design of Source-Location Privacy Schemes for Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.

[8]  Honglong Chen,et al.  On protecting end-to-end location privacy against local eavesdropper in Wireless Sensor Networks , 2015, Pervasive Mob. Comput..

[9]  Jian Ren,et al.  Combining Source-Location Privacy and Routing Efficiency in Wireless Sensor Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[10]  Xuemin Shen,et al.  A Cloud-Based Scheme for Protecting Source-Location Privacy against Hotspot-Locating Attack in Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.

[11]  Sencun Zhu,et al.  Towards Statistically Strong Source Anonymity for Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[12]  Basel Alomair,et al.  Toward a Statistical Framework for Source Anonymity in Sensor Networks , 2013, IEEE Transactions on Mobile Computing.

[13]  Mianxiong Dong,et al.  An energy-efficient and sink-location privacy enhanced scheme for WSNs through ring based routing , 2015, J. Parallel Distributed Comput..

[14]  S. Sitharama Iyengar,et al.  In-Network Trajectory Privacy Preservation , 2015, ACM Comput. Surv..

[15]  Xuemin Shen,et al.  Secure and efficient source location privacy-preserving scheme for wireless sensor networks , 2012, 2012 IEEE International Conference on Communications (ICC).

[16]  Javier López,et al.  Exploiting Context-Awareness to Enhance Source-Location Privacy in Wireless Sensor Networks , 2011, Comput. J..

[17]  Prabhat Kumar,et al.  Source Location Privacy Using Fake Source and Phantom Routing (FSAPR) Technique in Wireless Sensor Networks , 2015 .

[18]  Arshad Jhumka,et al.  Evaluating the Impact of Broadcast Rates and Collisions on Fake Source Protocols for Source Location Privacy , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.

[19]  Mauro Conti,et al.  Providing Source Location Privacy in Wireless Sensor Networks: A Survey , 2013, IEEE Communications Surveys & Tutorials.

[20]  Yunchuan Sun,et al.  An extensible and active semantic model of information organizing for the Internet of Things , 2014, Personal and Ubiquitous Computing.

[21]  Lin Yao,et al.  Protecting source–location privacy based on multirings in wireless sensor networks , 2015, Concurr. Comput. Pract. Exp..

[22]  Guangjun Wen,et al.  Preserving Source-Location Privacy in Energy-Constrained Wireless Sensor Networks , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[23]  Bernhard Rinner,et al.  Security and Privacy Protection in Visual Sensor Networks , 2014, ACM Comput. Surv..

[24]  Jian Ren,et al.  Preserving Source-Location Privacy in Wireless Sensor Network Using STaR Routing , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[25]  Weisong Shi,et al.  Preserving source location privacy in monitoring-based wireless sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.

[26]  Hongyang Zhang,et al.  Square-root unscented Kalman filtering-based localization and tracking in the Internet of Things , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[27]  Heejo Lee,et al.  Achieving Network Level Privacy in Wireless Sensor Networks† , 2010, Sensors.

[28]  Yihua Zhang,et al.  All proxy scheme for event source anonymity in wireless sensor networks , 2010, 2010 Sixth International Conference on Intelligent Sensors, Sensor Networks and Information Processing.

[29]  Liang Zhang,et al.  Organizational memory: reducing source-sink distance , 1997, Proceedings of the Thirtieth Hawaii International Conference on System Sciences.

[30]  Houbing Song,et al.  Internet of Things and Big Data Analytics for Smart and Connected Communities , 2016, IEEE Access.