A Probabilistic Source Location Privacy Protection Scheme in Wireless Sensor Networks

With the recent developments of wireless sensor networks (WSNs), computing and communication have experienced huge advancement. Meanwhile, security has not received the same attention to go along with such developments. In this paper, we focus on the source location privacy problem in WSNs, a hot research topic in security, and propose a probabilistic source location privacy (PSLP) protection scheme for WSNs. A more powerful adversary, which can use hidden Markov model to estimate the state of the source, is considered in this study. To cope with this type of adversary, phantom nodes and fake sources, which are responsible to mimic the behavior of the source, are utilized to diversify the routing path. Then, the weight of each node is calculated as a criterion to select the next-hop candidate. In addition, two transmission modes are designed to transmit real packets. The simulation results demonstrate that the proposed PSLP scheme improves the safety time without compromising the energy consumption.

[1]  Abdelwahab Boualouache,et al.  A Survey on Pseudonym Changing Strategies for Vehicular Ad-Hoc Networks , 2017, IEEE Communications Surveys & Tutorials.

[2]  Sajal K. Das,et al.  Using data mules to preserve source location privacy in Wireless Sensor Networks , 2014, Pervasive Mob. Comput..

[3]  Hao Wang,et al.  CASLP: A Confused Arc-Based Source Location Privacy Protection Scheme in WSNs for IoT , 2018, IEEE Communications Magazine.

[4]  Rongbo Zhu,et al.  Node Location Privacy Protection Based on Differentially Private Grids in Industrial Wireless Sensor Networks , 2018, Sensors.

[5]  Sajal K. Das,et al.  Using Data Mules to Preserve Source Location Privacy in Wireless Sensor Networks , 2012, ICDCN.

[6]  Yuguang Fang,et al.  Protecting Location Privacy for Task Allocation in Ad Hoc Mobile Cloud Computing , 2018, IEEE Transactions on Emerging Topics in Computing.

[7]  Seokjoo Shin,et al.  Strategic Location-Based Random Routing for Source Location Privacy in Wireless Sensor Networks , 2018, Sensors.

[8]  Arun Kumar Sangaiah,et al.  Constrained Random Routing Mechanism for Source Privacy Protection in WSNs , 2017, IEEE Access.

[9]  Ido Nevat,et al.  Optimal Privacy-Preserving Probabilistic Routing for Wireless Networks , 2017, IEEE Transactions on Information Forensics and Security.

[10]  Bharat K. Bhargava,et al.  Source-location privacy full protection in wireless sensor networks , 2018, Inf. Sci..

[11]  Jie Li,et al.  Privacy-preserving authentication schemes for vehicular ad hoc networks: a survey , 2016, Wirel. Commun. Mob. Comput..

[12]  Juan Chen,et al.  Hiding the Source Based on Limited Flooding for Sensor Networks , 2015, Sensors.

[13]  Jie Wu,et al.  Quantitative Measurement and Design of Source-Location Privacy Schemes for Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.

[14]  Mohsen Guizani,et al.  CPSLP: A Cloud-Based Scheme for Protecting Source Location Privacy in Wireless Sensor Networks Using Multi-Sinks , 2019, IEEE Transactions on Vehicular Technology.

[15]  Raja Datta,et al.  A novel source location privacy preservation technique to achieve enhanced privacy and network lifetime in WSNs , 2018, Pervasive Mob. Comput..

[16]  Arshad Jhumka,et al.  Hybrid online protocols for source location privacy in wireless sensor networks , 2018, J. Parallel Distributed Comput..

[17]  Guangjie Han,et al.  A Coverage-Aware Hierarchical Charging Algorithm in Wireless Rechargeable Sensor Networks , 2019, IEEE Network.

[18]  Hao Wang,et al.  A source location protection protocol based on dynamic routing in WSNs for the Social Internet of Things , 2017, Future Gener. Comput. Syst..

[19]  Guangjie Han,et al.  An Uneven Cluster-Based Mobile Charging Algorithm for Wireless Rechargeable Sensor Networks , 2019, IEEE Systems Journal.

[20]  Sanghamitra Panda,et al.  Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks , 2015 .

[21]  Yuxin Liu,et al.  Preserving Source Location Privacy for Energy Harvesting WSNs , 2017, Sensors.

[22]  Wade Trappe,et al.  Source-location privacy in energy-constrained sensor network routing , 2004, SASN '04.

[23]  Jie Li,et al.  A Secure Routing Protocol for Cluster-Based Wireless Sensor Networks Using ID-Based Digital Signature , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[24]  H. Vincent Poor,et al.  Community-Structured Evolutionary Game for Privacy Protection in Social Networks , 2018, IEEE Transactions on Information Forensics and Security.

[25]  Mohsen Guizani,et al.  KCLP: A k-Means Cluster-Based Location Privacy Protection Scheme in WSNs for IoT , 2018, IEEE Wireless Communications.