A source-location privacy protection strategy via pseudo normal distribution-based phantom routing in WSNs

Toward resolving the source-location privacy protection issue in Wireless Sensor Networks (WSNs), a Pseudo Normal Distribution-based Phantom Routing (PNDBPR) protocol is proposed in this paper. The proposed protocol is composed of two critical phases: 1) adjusting the value of minimum-hops between a phantom node and its source, and varying the area of the phantom node distribution region at the network deployment stage; 2) generating a set of Gaussian-distributed random real numbers using the Pseudo Random Generator when the source node is transmitting data packets, and calculating the corresponding random walk hops. Theoretical analyses and simulation results show that PNDBPR can dramatically improve the diversity and the dynamicity of the phantom nodes distribution at the expense of a slight increase in communication overheads when compared with the existing PUSBRF (Source Location Privacy Preservation Protocol in Wireless Sensor Network Using Source Based Restricted Flooding) and HBDRW(A hop-based directed random walk) protocols.

[1]  Jian Ren,et al.  Providing Source-Location Privacy in Wireless Sensor Networks , 2009, WASA.

[2]  Qiaoyan Wen,et al.  Protecting Sensor Location Privacy against Adversaries in Wireless Sensor Networks , 2013, 2013 International Conference on Computational and Information Sciences.

[3]  Liang Zhang,et al.  Organizational memory: reducing source-sink distance , 1997, Proceedings of the Thirtieth Hawaii International Conference on System Sciences.

[4]  D S Radhika Shetty,et al.  Protecting Location Privacy in Sensor Networks against a Global Eavesdropper , 2017 .

[5]  Juan Chen,et al.  A Source-Location Privacy Preservation Protocol in Wireless Sensor Networks Using Source-Based Restricted Flooding: A Source-Location Privacy Preservation Protocol in Wireless Sensor Networks Using Source-Based Restricted Flooding , 2010 .

[6]  Wade Trappe,et al.  Source-location privacy in energy-constrained sensor network routing , 2004, SASN '04.

[7]  Mauro Conti,et al.  Providing Source Location Privacy in Wireless Sensor Networks: A Survey , 2013, IEEE Communications Surveys & Tutorials.

[8]  Jian Ren,et al.  Source-Location Privacy through Dynamic Routing in Wireless Sensor Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[9]  Yu Meng,et al.  A Novel Deployment Scheme for Green Internet of Things , 2014, IEEE Internet of Things Journal.

[10]  Mehmet A. Orgun,et al.  Efficient Random Key Based Encryption System for Data Packet Confidentiality in WSNs , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.

[11]  Chin-Tser Huang,et al.  PASSAGES: Preserving Anonymity of Sources and Sinks against Global Eavesdroppers , 2013, 2013 Proceedings IEEE INFOCOM.

[12]  Basel Alomair,et al.  Toward a Statistical Framework for Source Anonymity in Sensor Networks , 2013, IEEE Transactions on Mobile Computing.

[13]  Ke Xu,et al.  An Anti-Tracking Source-Location Privacy Protection Protocol in WSNs Based on Path Extension , 2014, IEEE Internet of Things Journal.

[14]  Jie Wu,et al.  Quantitative Measurement and Design of Source-Location Privacy Schemes for Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.

[15]  Chen Juan A Source-Location Privacy Preservation Protocol in Wireless Sensor Networks Using Source-Based Restricted Flooding , 2010 .

[16]  Qiaoyan Wen,et al.  Passive RFID-supported source location privacy preservation against global eavesdroppers in WSN , 2013, 2013 5th IEEE International Conference on Broadband Network & Multimedia Technology.

[17]  Donggang Liu,et al.  Protecting Location Privacy in Sensor Networks against a Global Eavesdropper , 2012, IEEE Transactions on Mobile Computing.