An Improved Pillar K-Means Based Protocol for Privacy-Preserving Location Monitoring in Wireless Sensor Network

The main criteria affecting the wireless sensor network is the security of data transmission. This paper proposed a security model for preserving the data transmission by enhancing a location monitoring and privacy-preserving protocol in the wireless sensor network. The proposed approach in this paperwork incorporates improved pillar k-means and hybrid location-privacy aware algorithm for increasing the security of wireless sensor network. The sensor network is used by different users, where the network authenticates its user by monitoring and preserving the network from the connected user. The proposed hybrid algorithm reduces the overall cost regarding communication and computational while the quality-aware increases the accuracy of location to the server. The improved pillar k-means algorithm proposed in this work to cluster the sensor nodes into a set of cluster nodes. The clustering process groups the network into nodes and searches the transmission node is monitored and secured. The output of the proposed work is carried out in MatLab platform, and it was compared with existing protocol, and the result shows the proposed IPLPA is the least possible method for preserving security regarding location monitoring and privacy in the wireless sensor network.

[1]  Xiaodong Lin,et al.  SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency , 2013, IEEE Transactions on Parallel and Distributed Systems.

[2]  Yuval Elovici,et al.  Online Social Networks: Threats and Solutions , 2013, IEEE Communications Surveys & Tutorials.

[3]  Jie Wu,et al.  Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks , 2015, IEEE Transactions on Parallel and Distributed Systems.

[4]  Shafiullah Khan,et al.  Intrusion Detection Systems in Wireless Sensor Networks: A Review , 2013, Int. J. Distributed Sens. Networks.

[5]  Kewei Sha,et al.  Noname Manuscript No. (will Be Inserted by the Editor) Multipath Routing Techniques in Wireless Sensor Networks: a Survey , 2022 .

[6]  Wade Trappe,et al.  Enhancing Source-Location Privacy in Sensor Network Routing , 2005, ICDCS.

[7]  Katina Michael,et al.  Location and tracking of mobile devices: Überveillance stalks the streets , 2013, Comput. Law Secur. Rev..

[8]  Lin Yao,et al.  Protecting source–location privacy based on multirings in wireless sensor networks , 2015, Concurr. Comput. Pract. Exp..

[9]  Chi-Yin Chow,et al.  A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks , 2011, IEEE Transactions on Mobile Computing.

[10]  Mianxiong Dong,et al.  Achieving Source Location Privacy and Network Lifetime Maximization Through Tree-Based Diversionary Routing in Wireless Sensor Networks , 2014, IEEE Access.

[11]  Kirankumar B. Balavalad,et al.  A Privacy-Preserving Location Monitoring System for WSNs with Blocking Misbehaving Users in Anonymity Networks , 2014 .

[12]  Shusen Yang,et al.  A survey on the ietf protocol suite for the internet of things: standards, challenges, and opportunities , 2013, IEEE Wireless Communications.

[13]  Sajal K. Das,et al.  Using data mules to preserve source location privacy in Wireless Sensor Networks , 2014, Pervasive Mob. Comput..

[14]  Eran Halperin,et al.  Identifying Personal Genomes by Surname Inference , 2013, Science.

[15]  Jie Gao,et al.  Is random walk truly memoryless — Traffic analysis and source location privacy under random walks , 2013, 2013 Proceedings IEEE INFOCOM.

[16]  Lin Yao,et al.  Protecting the sink location privacy in wireless sensor networks , 2012, Personal and Ubiquitous Computing.

[17]  Edith C. H. Ngai,et al.  On providing location privacy for mobile sinks in wireless sensor networks , 2013, Wirel. Networks.

[18]  M. Kumar,et al.  Cluster based Location privacy in Wireless Sensor Networks against a universal adversary , 2013, 2013 International Conference on Information Communication and Embedded Systems (ICICES).

[19]  Ozgur Koray Sahingoz,et al.  Mobile networking with UAVs: Opportunities and challenges , 2013, 2013 International Conference on Unmanned Aircraft Systems (ICUAS).

[20]  Xiuzhen Cheng,et al.  Target Counting in Wireless Sensor Networks , 2014 .

[21]  Sajjad Haider Shami,et al.  Evolution of Communication Technologies for Smart Grid applications , 2013 .

[22]  Sung-Woon Lee,et al.  Security Concerns of Identity Authentication and Context Privacy Preservation in uHealthcare System , 2013, 2013 14th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing.

[23]  Yasushi Kiyoki,et al.  A pillar algorithm for K-means optimization by distance maximization for initial centroid designation , 2009, 2009 IEEE Symposium on Computational Intelligence and Data Mining.

[24]  Guohong Cao,et al.  Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System , 2013, IEEE Transactions on Mobile Computing.

[25]  Marco Zennaro,et al.  Successful deployment of a Wireless Sensor Network for precision agriculture in Malawi , 2012, NESEA.

[26]  Manjusha Pandey,et al.  Privacy Provisioning in Wireless Sensor Networks , 2014, Wirel. Pers. Commun..