Achieving Source Location Privacy Protection in Monitoring Wireless Sensor Networks through Proxy Node Routing
Achieving high source location privacy is critical when Wireless Sensor Networks (WSNs) are used in sensitive applications such as in asset or battlefield monitoring. Due to the sensitivity of information in these applications, it is important to ensure the flow of data between sensor nodes is secur...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2019-02-01
|
Series: | Sensors |
Subjects: | |
Online Access: | http://www.mdpi.com/1424-8220/19/5/1037 |
_version_ | 1798034485525086208 |
---|---|
author | Lilian C. Mutalemwa Seokjoo Shin |
author_facet | Lilian C. Mutalemwa Seokjoo Shin |
author_sort | Lilian C. Mutalemwa |
collection | DOAJ |
description | Achieving high source location privacy is critical when Wireless Sensor Networks (WSNs) are used in sensitive applications such as in asset or battlefield monitoring. Due to the sensitivity of information in these applications, it is important to ensure the flow of data between sensor nodes is secure and it does not expose any information about the monitored assets to an adversary. This paper proposes a routing scheme with stronger source location privacy than the privacy of traditional routing schemes. The paper addresses some limitations of four existing schemes by providing highly random routing paths between the source nodes and sink node. The scheme randomly sends packet to the sink node through tactically positioned proxy nodes to guarantee the routes are highly befuddling to the adversary. To achieve high privacy, the proposed scheme uses a randomizing factor to generate a new random route for every successive packet. Simulation results demonstrate that the proposed scheme provides longer safety period and stronger privacy to outperform other schemes. Furthermore the scheme provides stronger privacy against both, patient and cautious adversary models. |
first_indexed | 2024-04-11T20:44:51Z |
format | Article |
id | doaj.art-eb396eef3ff947159987e42aa0d49c30 |
institution | Directory Open Access Journal |
issn | 1424-8220 |
language | English |
last_indexed | 2024-04-11T20:44:51Z |
publishDate | 2019-02-01 |
publisher | MDPI AG |
record_format | Article |
series | Sensors |
spelling | doaj.art-eb396eef3ff947159987e42aa0d49c302022-12-22T04:04:05ZengMDPI AGSensors1424-82202019-02-01195103710.3390/s19051037s19051037Achieving Source Location Privacy Protection in Monitoring Wireless Sensor Networks through Proxy Node RoutingLilian C. Mutalemwa0Seokjoo Shin1Department of Computer Engineering, Chosun University, Gwangju 61452, KoreaDepartment of Computer Engineering, Chosun University, Gwangju 61452, KoreaAchieving high source location privacy is critical when Wireless Sensor Networks (WSNs) are used in sensitive applications such as in asset or battlefield monitoring. Due to the sensitivity of information in these applications, it is important to ensure the flow of data between sensor nodes is secure and it does not expose any information about the monitored assets to an adversary. This paper proposes a routing scheme with stronger source location privacy than the privacy of traditional routing schemes. The paper addresses some limitations of four existing schemes by providing highly random routing paths between the source nodes and sink node. The scheme randomly sends packet to the sink node through tactically positioned proxy nodes to guarantee the routes are highly befuddling to the adversary. To achieve high privacy, the proposed scheme uses a randomizing factor to generate a new random route for every successive packet. Simulation results demonstrate that the proposed scheme provides longer safety period and stronger privacy to outperform other schemes. Furthermore the scheme provides stronger privacy against both, patient and cautious adversary models.http://www.mdpi.com/1424-8220/19/5/1037source location privacywireless sensor networkpatient adversarycautious adversaryproxy noderandom routing |
spellingShingle | Lilian C. Mutalemwa Seokjoo Shin Achieving Source Location Privacy Protection in Monitoring Wireless Sensor Networks through Proxy Node Routing Sensors source location privacy wireless sensor network patient adversary cautious adversary proxy node random routing |
title | Achieving Source Location Privacy Protection in Monitoring Wireless Sensor Networks through Proxy Node Routing |
title_full | Achieving Source Location Privacy Protection in Monitoring Wireless Sensor Networks through Proxy Node Routing |
title_fullStr | Achieving Source Location Privacy Protection in Monitoring Wireless Sensor Networks through Proxy Node Routing |
title_full_unstemmed | Achieving Source Location Privacy Protection in Monitoring Wireless Sensor Networks through Proxy Node Routing |
title_short | Achieving Source Location Privacy Protection in Monitoring Wireless Sensor Networks through Proxy Node Routing |
title_sort | achieving source location privacy protection in monitoring wireless sensor networks through proxy node routing |
topic | source location privacy wireless sensor network patient adversary cautious adversary proxy node random routing |
url | http://www.mdpi.com/1424-8220/19/5/1037 |
work_keys_str_mv | AT liliancmutalemwa achievingsourcelocationprivacyprotectioninmonitoringwirelesssensornetworksthroughproxynoderouting AT seokjooshin achievingsourcelocationprivacyprotectioninmonitoringwirelesssensornetworksthroughproxynoderouting |