Silence is Golden: A Source Location Privacy Scheme for Wireless Sensor Networks Based on Silent Nodes

被引:3
|
作者
Gu, Chen [1 ]
Jhumka, Arshad [2 ]
Maple, Carsten [3 ]
机构
[1] Hefei Univ Technol, Sch Comp Sci & Informat Engn, Hefei, Peoples R China
[2] Univ Warwick, Dept Comp Sci, Coventry, England
[3] WMG Univ Warwick, Coventry, England
基金
英国工程与自然科学研究理事会; 中国国家自然科学基金;
关键词
PROTECTION SCHEME; PROTOCOLS; CLOUD; WSNS;
D O I
10.1155/2022/5026549
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Source location privacy (SLP) is an important property for security-critical wireless sensor network applications such as monitoring and tracking. However, cryptology-based schemes cannot protect the SLP effectively since an adversary can capture the source node regardless of the contents of messages. Most techniques use fake sources or message delay to provide SLP, but at the cost of high energy consumption or high message delivery latency. In this paper, we present a new technique to address SLP by selecting sets of nodes that are to be silent for a short period, forcing an attacker to either be delayed or to trace back to the source along a longer route. As such, we make a number of important contributions: (i) we formalise the silent nodes selection (SiNS) problem, (ii) we prove it to be NP-complete, and (iii) to circumvent the high complexity of SiNS, we propose a novel SLP-aware routing protocol. Results from extensive simulations show that our proposed routing protocol provides a high level of SLP under appropriate parameterization at the expense of only negligible latency and messages overhead.
引用
收藏
页数:16
相关论文
共 50 条
  • [41] Source-Location Privacy Based on Dynamic Mix-Ring in Wireless Sensor Networks
    Tang, Di
    Gu, Jian
    Yu, You
    Yang, Yuanyuan
    Han, Weijia
    Ma, Xiao
    2018 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2018, : 327 - 331
  • [42] An Efficient Source Location Privacy Protection Algorithm Based on Circular Trap for Wireless Sensor Networks
    Wang, Yiting
    Liu, Liang
    Gao, Wenzhao
    SYMMETRY-BASEL, 2019, 11 (05):
  • [43] Source Location Privacy in a Cluster-Based Wireless Sensor Networks against Local Adversary
    Tanash, Islam M.
    Yaseen, Fedaa
    Al-Mistarihi, Mamoun F.
    Al-Duwairi, Basheer
    Shurman, Mohammad
    2017 8TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS), 2017, : 348 - 351
  • [44] Energy Efficient Source Location Privacy Protecting Scheme in Wireless Sensor Networks Using Ant Colony Optimization
    Zhou, Liming
    Wen, Qiaoyan
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [45] Location scheme in wireless sensor networks
    Yao Ye
    Cai Wandong
    Hilaire, Vincent
    Koukam, Abder
    2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 121 - +
  • [46] An Adaptive Scheme for Protecting Source Location Privacy in Underwater Acoustic Sensor Networks
    Wang, Hao
    Zheng, Huijuan
    Han, Guangjie
    Tang, Dong
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2025, 24 (03) : 2193 - 2202
  • [47] Application of the Chinese Remainder Theorem for Source Location Privacy in Wireless Sensor Networks
    Manjula, R.
    Datta, Raja
    PROCEEDINGS OF THE 2016 IEEE STUDENTS' TECHNOLOGY SYMPOSIUM (TECHSYM), 2016, : 202 - 207
  • [48] Privacy Intensity Policy for Optimizing Source Node Location in Wireless Sensor Networks
    Jiang Zhanjun
    Zhou Tao
    Yang Yonghong
    LASER & OPTOELECTRONICS PROGRESS, 2020, 57 (24)
  • [49] Source-Location Privacy through Dynamic Routing in Wireless Sensor Networks
    Li, Yun
    Ren, Jian
    2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [50] Dynamic routing approach for enhancing source location privacy in wireless sensor networks
    Gulshan Kumar
    Rajkumar Singh Rathore
    Kutub Thakur
    Ahmad Almadhor
    Sardar Asad Ali Biabani
    Subhash Chander
    Wireless Networks, 2023, 29 : 2591 - 2607