On protecting end-to-end location privacy against local eavesdropper in Wireless Sensor Networks

Wireless Sensor Networks (WSNs) are often deployed in hostile environments to detect and collect interested events such as the appearance of a rare animal, which is called event collection system. However, due to the open characteristic of wireless communications, an adversary can detect the location of a source or sink and eventually capture them by eavesdropping on the sensor nodes' transmissions and tracing the packets' trajectories in the networks. Thus the location privacy of both the source and sink becomes a critical issue in WSNs. Previous research only focuses on the location privacy of the source or sink independently. In this paper, we address the importance of location privacy of both the source and sink and propose four schemes called forward random walk (FRW), bidirectional tree (BT), dynamic bidirectional tree (DBT) and zigzag bidirectional tree (ZBT) respectively to deliver messages from source to sink, which can protect the end-to-end location privacy against local eavesdropper. Simulation results illustrate the effectiveness of the proposed location privacy protection schemes.

[1]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[2]  Wade Trappe,et al.  Enhancing Source-Location Privacy in Sensor Network Routing , 2005, ICDCS.

[3]  Honglong Chen,et al.  A Consistency-Based Secure Localization Scheme against Wormhole Attacks in WSNs , 2009, WASA.

[4]  Bo Sheng,et al.  Privacy-aware routing in sensor networks , 2009, Comput. Networks.

[5]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[6]  Fillia Makedon,et al.  Entrapping adversaries for source protection in sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).

[7]  D Estrin,et al.  In Vivo Characterization of a Wide area 802.11b Wireless Seismic Array , 2007 .

[8]  Shivakant Mishra,et al.  Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks , 2004, International Conference on Dependable Systems and Networks, 2004.

[9]  Miao Xu,et al.  Enhancing Sink-Location Privacy in Wireless Sensor Networks through k-Anonymity , 2012, Int. J. Distributed Sens. Networks.

[10]  Shivakant Mishra,et al.  Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[11]  Honglong Chen,et al.  Conflicting-Set-Based Wormhole Attack Resistant Localization in Wireless Sensor Networks , 2009, UIC.

[12]  Paolo Medagliani,et al.  Author's Personal Copy Pervasive and Mobile Computing Energy-efficient Mobile Target Detection in Wireless Sensor Networks with Random Node Deployment and Partial Coverage , 2022 .

[13]  Sencun Zhu,et al.  Towards event source unobservability with minimum network traffic in sensor networks , 2008, WiSec '08.

[14]  Edith C. H. Ngai,et al.  On providing location privacy for mobile sinks in wireless sensor networks , 2013, Wirel. Networks.

[15]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[16]  Liang Chen,et al.  A Source-Location Privacy Protocol in WSN Based on Locational Angle , 2008, International Conference on Intelligent Cloud Computing.

[17]  Weisong Shi,et al.  Preserving source location privacy in monitoring-based wireless sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.

[18]  Fillia Makedon,et al.  Source location privacy against laptop-class attacks in sensor networks , 2008, SecureComm.

[19]  Donggang Liu,et al.  Location Privacy in Sensor Networks Against a Global Eavesdropper , 2007, 2007 IEEE International Conference on Network Protocols.

[20]  Kyriakos Mouratidis,et al.  Spatial Cloaking Revisited: Distinguishing Information Leakage from Anonymity , 2009, SSTD.

[21]  Jian Ren,et al.  Preserving Source-Location Privacy in Wireless Sensor Networks , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[22]  Sencun Zhu,et al.  Towards Statistically Strong Source Anonymity for Sensor Networks , 2008, INFOCOM.

[23]  Wade Trappe,et al.  Source-location privacy in energy-constrained sensor network routing , 2004, SASN '04.

[24]  Jian Ren,et al.  Source-Location Privacy through Dynamic Routing in Wireless Sensor Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[25]  H. T. Mouftah,et al.  A Protocol for Sink Location Privacy Protection in Wireless Sensor Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[26]  David E. Culler,et al.  TOSSIM: accurate and scalable simulation of entire TinyOS applications , 2003, SenSys '03.

[27]  Kyriakos Mouratidis,et al.  Shortest Path Computation with No Information Leakage , 2012, Proc. VLDB Endow..

[28]  Liang Zhang,et al.  Protecting Receiver-Location Privacy in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[29]  John Anderson,et al.  Wireless sensor networks for habitat monitoring , 2002, WSNA '02.

[30]  Wade Trappe,et al.  Introduction to Cryptography with Coding Theory , 2002 .

[31]  Ji Luo,et al.  Delay Tolerant Event Collection in Sensor Networks with Mobile Sink , 2010, 2010 Proceedings IEEE INFOCOM.