Achieving Source Location Privacy Protection in Monitoring Wireless Sensor Networks through Proxy Node Routing

Achieving high source location privacy is critical when Wireless Sensor Networks (WSNs) are used in sensitive applications such as in asset or battlefield monitoring. Due to the sensitivity of information in these applications, it is important to ensure the flow of data between sensor nodes is secur...

Full description

Bibliographic Details
Main Authors: Lilian C. Mutalemwa, Seokjoo Shin
Format: Article
Language:English
Published: MDPI AG 2019-02-01
Series:Sensors
Subjects:
Online Access:http://www.mdpi.com/1424-8220/19/5/1037
_version_ 1798034485525086208
author Lilian C. Mutalemwa
Seokjoo Shin
author_facet Lilian C. Mutalemwa
Seokjoo Shin
author_sort Lilian C. Mutalemwa
collection DOAJ
description Achieving high source location privacy is critical when Wireless Sensor Networks (WSNs) are used in sensitive applications such as in asset or battlefield monitoring. Due to the sensitivity of information in these applications, it is important to ensure the flow of data between sensor nodes is secure and it does not expose any information about the monitored assets to an adversary. This paper proposes a routing scheme with stronger source location privacy than the privacy of traditional routing schemes. The paper addresses some limitations of four existing schemes by providing highly random routing paths between the source nodes and sink node. The scheme randomly sends packet to the sink node through tactically positioned proxy nodes to guarantee the routes are highly befuddling to the adversary. To achieve high privacy, the proposed scheme uses a randomizing factor to generate a new random route for every successive packet. Simulation results demonstrate that the proposed scheme provides longer safety period and stronger privacy to outperform other schemes. Furthermore the scheme provides stronger privacy against both, patient and cautious adversary models.
first_indexed 2024-04-11T20:44:51Z
format Article
id doaj.art-eb396eef3ff947159987e42aa0d49c30
institution Directory Open Access Journal
issn 1424-8220
language English
last_indexed 2024-04-11T20:44:51Z
publishDate 2019-02-01
publisher MDPI AG
record_format Article
series Sensors
spelling doaj.art-eb396eef3ff947159987e42aa0d49c302022-12-22T04:04:05ZengMDPI AGSensors1424-82202019-02-01195103710.3390/s19051037s19051037Achieving Source Location Privacy Protection in Monitoring Wireless Sensor Networks through Proxy Node RoutingLilian C. Mutalemwa0Seokjoo Shin1Department of Computer Engineering, Chosun University, Gwangju 61452, KoreaDepartment of Computer Engineering, Chosun University, Gwangju 61452, KoreaAchieving high source location privacy is critical when Wireless Sensor Networks (WSNs) are used in sensitive applications such as in asset or battlefield monitoring. Due to the sensitivity of information in these applications, it is important to ensure the flow of data between sensor nodes is secure and it does not expose any information about the monitored assets to an adversary. This paper proposes a routing scheme with stronger source location privacy than the privacy of traditional routing schemes. The paper addresses some limitations of four existing schemes by providing highly random routing paths between the source nodes and sink node. The scheme randomly sends packet to the sink node through tactically positioned proxy nodes to guarantee the routes are highly befuddling to the adversary. To achieve high privacy, the proposed scheme uses a randomizing factor to generate a new random route for every successive packet. Simulation results demonstrate that the proposed scheme provides longer safety period and stronger privacy to outperform other schemes. Furthermore the scheme provides stronger privacy against both, patient and cautious adversary models.http://www.mdpi.com/1424-8220/19/5/1037source location privacywireless sensor networkpatient adversarycautious adversaryproxy noderandom routing
spellingShingle Lilian C. Mutalemwa
Seokjoo Shin
Achieving Source Location Privacy Protection in Monitoring Wireless Sensor Networks through Proxy Node Routing
Sensors
source location privacy
wireless sensor network
patient adversary
cautious adversary
proxy node
random routing
title Achieving Source Location Privacy Protection in Monitoring Wireless Sensor Networks through Proxy Node Routing
title_full Achieving Source Location Privacy Protection in Monitoring Wireless Sensor Networks through Proxy Node Routing
title_fullStr Achieving Source Location Privacy Protection in Monitoring Wireless Sensor Networks through Proxy Node Routing
title_full_unstemmed Achieving Source Location Privacy Protection in Monitoring Wireless Sensor Networks through Proxy Node Routing
title_short Achieving Source Location Privacy Protection in Monitoring Wireless Sensor Networks through Proxy Node Routing
title_sort achieving source location privacy protection in monitoring wireless sensor networks through proxy node routing
topic source location privacy
wireless sensor network
patient adversary
cautious adversary
proxy node
random routing
url http://www.mdpi.com/1424-8220/19/5/1037
work_keys_str_mv AT liliancmutalemwa achievingsourcelocationprivacyprotectioninmonitoringwirelesssensornetworksthroughproxynoderouting
AT seokjooshin achievingsourcelocationprivacyprotectioninmonitoringwirelesssensornetworksthroughproxynoderouting