Energy Efficient Source Location Privacy Protecting Scheme in Wireless Sensor Networks Using Ant Colony Optimization

Wireless sensor networks consist of various sensors with limited power, which collect different useful and privately relevant information. We pay attention to some issues related to sensor's location privacy. Ant colony optimization provides a natural and intrinsic way of exploration of search space for preserving sensor's location privacy. In this paper, we focus on protecting the sensor's location by introducing suitable modifications to sensor routing to make it difficult for an eavesdropper to find the original location. And we propose an energy efficient preserving sensor's location privacy based on ant colony optimization scheme, which is a flexible routing strategy to protect the sensor's location. Simulation results show that our strategy can efficiently reduce the chance of packets being detected and prolong the network lifetime. And the adversary can find it difficult to find the exact location of the source node.

[1]  Xuemin Shen,et al.  An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding , 2009, IEEE INFOCOM 2009.

[2]  Bülent Tavli,et al.  Maximizing lifetime of event-unobservable wireless sensor networks , 2011, Comput. Stand. Interfaces.

[3]  Weisong Shi,et al.  Preserving source location privacy in monitoring-based wireless sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.

[4]  Wei Liang,et al.  An Efficient and Lightweight Source Privacy Protecting Scheme for Sensor Networks Using Group Knowledge , 2013, Int. J. Distributed Sens. Networks.

[5]  Kamin Whitehouse,et al.  Protecting your daily in-home activity information from a wireless snooping attack , 2008, UbiComp.

[6]  Srikanth V. Krishnamurthy,et al.  Cross-layer Enhanced Source Location Privacy in Sensor Networks , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[7]  Huagang Xiong,et al.  An Efficient Key Management Scheme for Wireless Sensor Networks , 2012, Int. J. Distributed Sens. Networks.

[8]  Xiaoyan Hong,et al.  Effective probabilistic approach protecting sensor traffic , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.

[9]  Luca Maria Gambardella,et al.  Ant colony system: a cooperative learning approach to the traveling salesman problem , 1997, IEEE Trans. Evol. Comput..

[10]  Wade Trappe,et al.  Enhancing Source-Location Privacy in Sensor Network Routing , 2005, ICDCS.

[11]  Stephen B. Wicker,et al.  Transactional Confidentiality in Sensor Networks , 2008, IEEE Security & Privacy.

[12]  Yuguang Fang,et al.  MASK: anonymous on-demand routing in mobile ad hoc networks , 2006, IEEE Transactions on Wireless Communications.

[13]  Marco Dorigo,et al.  Optimization, Learning and Natural Algorithms , 1992 .

[14]  Konstantinos Kalpakis,et al.  Efficient algorithms for maximum lifetime data gathering and aggregation in wireless sensor networks , 2003, Comput. Networks.

[15]  Bo Sheng,et al.  Privacy-aware routing in sensor networks , 2009, Comput. Networks.

[16]  Zhi Zhou,et al.  Anonymizing geographic ad hoc routing for preserving location privacy , 2005, 25th IEEE International Conference on Distributed Computing Systems Workshops.

[17]  David E. Culler,et al.  TOSSIM: accurate and scalable simulation of entire TinyOS applications , 2003, SenSys '03.

[18]  Deborah Estrin,et al.  Geography-informed energy conservation for Ad Hoc routing , 2001, MobiCom '01.

[19]  Xuemin Shen,et al.  A Cloud-Based Scheme for Protecting Source-Location Privacy against Hotspot-Locating Attack in Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.

[20]  Fernando Boavida,et al.  An Energy-Efficient Ant-Based Routing Algorithm for Wireless Sensor Networks , 2006, ANTS Workshop.

[21]  Eui-nam Huh,et al.  A beneficial analysis of deployment knowledge for key distribution in wireless sensor networks , 2012, Secur. Commun. Networks.

[22]  Ju Ren,et al.  An Energy-Efficient Cyclic Diversionary Routing Strategy against Global Eavesdroppers in Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.

[23]  Chun-Ta Li,et al.  A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks , 2011, Inf. Sci..

[24]  Tadayoshi Kohno,et al.  Devices That Tell on You: Privacy Trends in Consumer Ubiquitous Computing , 2007, USENIX Security Symposium.

[25]  Javier López,et al.  Analysis of location privacy solutions in wireless sensor networks , 2011, IET Commun..

[26]  Wendi Heinzelman,et al.  Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[27]  Sajal K. Das,et al.  Using Data Mules to Preserve Source Location Privacy in Wireless Sensor Networks , 2012, ICDCN.

[28]  Feng Xia,et al.  Energy Efficient Ant Colony Algorithms for Data Aggregation in Wireless Sensor Networks , 2011, J. Comput. Syst. Sci..

[29]  Brad Karp,et al.  GPSR : Greedy Perimeter Stateless Routing for Wireless , 2000, MobiCom 2000.

[30]  Xiaodong Lin,et al.  TESP2: Timed Efficient Source Privacy Preservation Scheme for Wireless Sensor Networks , 2010, 2010 IEEE International Conference on Communications.

[31]  Selcuk Okdem,et al.  Routing in Wireless Sensor Networks Using an Ant Colony Optimization (ACO) Router Chip , 2009, Sensors.

[32]  Riccardo Bettati,et al.  On Flow Marking Attacks in Wireless Anonymous Communication Networks , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).

[33]  Basel Alomair,et al.  Statistical Framework for Source Anonymity in Sensor Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[34]  Donggang Liu,et al.  Protecting Location Privacy in Sensor Networks against a Global Eavesdropper , 2012, IEEE Transactions on Mobile Computing.