Novel Scheme of Fuzzy based Concealing Sink Node with Fake Holes (F-CSH)

Abstract Due to the sink node crucial position, its location privacy is becoming one of the major issues in wireless sensor networks (WSNs) which requires ultimate protection. Particularly, the WSNs successfulness is endanger as the wireless transmission nodes are susceptive to illicit tracing and detection. While privacy of the message can be ensured through encryption content, this paper formalizes a novel efficient privacy preserving scheme to secure sink node location. The aim is to keep the location privacy of the sink node from being tracked using the traffic flow passive analysis. F-CSH is based on the concealing of the location of the main sink using fake sink holes been elected using fuzzy score function. In addition, comprehensive simulations proved that the proposed scheme significantly upgrades both delivery time and conservation energy cost compared with existing strategies.

[1]  H. Fahham,et al.  Design Chattering-Free Performance-Based Fuzzy Sliding Mode Controller for Bus Suspension , 2012 .

[2]  Leonidas J. Guibas,et al.  Wireless sensor networks - an information processing approach , 2004, The Morgan Kaufmann series in networking.

[3]  Liang Zhang,et al.  Protecting Receiver-Location Privacy in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[4]  Ananthram Swami,et al.  Wireless Sensor Networks: Signal Processing and Communications , 2007 .

[5]  Ming Gu,et al.  Enhanced Location Privacy Protection of Base Station in Wireless Sensor Networks , 2009, 2009 Fifth International Conference on Mobile Ad-hoc and Sensor Networks.

[6]  Shivakant Mishra,et al.  Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[7]  Peter Csaba Ölveczky,et al.  Formal modeling, performance estimation, and model checking of wireless sensor network algorithms in Real-Time Maude , 2009, Theor. Comput. Sci..

[8]  W. Chung,et al.  Enhanced Rssi-Based High Accuracy Real-Time User Location Tracking System For Indoor And Outdoor Environments , 2008 .

[9]  A. Boukerche,et al.  Selective Encryption Algorithm for Wireless Ad-hoc Networks , 2012 .

[10]  Wenyuan Xu,et al.  Determining sink location through Zeroing-In attackers in wireless sensor networks , 2012, Wirel. Networks.

[11]  Pragati Patil,et al.  Survey On Location Privacy Preserving Schemes In Wireless Sensor Network , 2012 .

[12]  Kamarulzaman Ab. Aziz,et al.  Coverage Strategies for Wireless SensorNetworks , 2009, Journal of Science and Technology.

[13]  Lin Yao,et al.  Protecting the sink location privacy in wireless sensor networks , 2012, Personal and Ubiquitous Computing.

[14]  I Manimozhi,et al.  Mitigating Hotspot Locating Attack in Wireless Sensor Network , 2013 .

[15]  Liang Liu,et al.  An Energy-Efficient and Scalable Secure Data Aggregation for Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.

[16]  Jian Ren,et al.  Routing-based source-location privacy protection in wireless sensor networks , 2009, 2009 IEEE International Conference on Electro/Information Technology.

[17]  Chee-Yee Chong,et al.  Sensor networks: evolution, opportunities, and challenges , 2003, Proc. IEEE.

[18]  Dimitrios Makrakis,et al.  Concealing of the Sink Location in WSNs by artificially homogenizing traffic intensity , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[19]  K. Janani,et al.  Securing the Location Privacy in wireless Sensor Networks , 2013 .

[20]  Azer Bestavros,et al.  SEP: A Stable Election Protocol for clustered heterogeneous wireless sensor networks , 2004 .