Abstract
The massive growth in interconnected devices from a multiplicity of networks goes hand-in-hand with the emergence of the Internet of Things (IoT) paradigm. As a critical component of the IoT, sensor networks have become ubiquitous and widely used in various application domains. However, open-ended wireless communication brings severe threats to user privacy and security. Attackers from outside the network can trace back along the data stream to capture the source node, which poses a significant threat to the privacy of the data source. A feasible defense method is to interfere with the attacker’s tracking process through forged data streams. However, the related traditional solutions generally have shortcomings in terms of balancing security and efficiency. Therefore, this article proposes a pseudopacket scheduling algorithm (PPSA), which aims at reasonably regulating the process of pseudopacket generation to interfere with the adversary’s tracking to the data source. The algorithm comprises three phases. First, the sink node performs geographic information acquisition and neighbor node discovery with a flood-based method. Then, the sink node uses a self-adapting proxy selection method to construct backbone routes with both randomness and low latency to receive actual packets. Finally, the nodes on both sides of the backbone routes follow a pseudopacket scheduling strategy to interfere with the adversary’s tracking of the source locations. The experimental results showcase that our proposed scheme effectively controls the additional energy consumption and transmission delays within acceptable ranges while ensuring adequate location privacy.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.