Abstract

Recently, Distributed Energy Resources (DERs) have been utilized with increasing frequency in Industrial Internet of Things (IIoT) to deal with energy and environmental challenges. IIoT with wireless communication technology, which is easy to be intercepted, often facing various attack. For the safety of the network, more complex algorithms need to be run on IIoT, but the action need more energy. In addition, in some application scenarios, the location where the packets were generated indicates that an event occurred. An attacker can find the sensor node through a backtracking attack, which is equivalent to reaching the place where the event occurred. In order to hide the location information of the event, it is necessary to protect source location privacy (SLP), which will also increase the energy consumption of IIoT. If only the traditional battery is used to power the nodes in IIoT, the lifetime of the system will be limited. When IIoT is deployed outdoors, it is often difficult to replace the battery. The existence of lakes make IIoT have coverage holes during deployment. In order to implement SLP and make the system work for a long time in the environment with deployment holes, we use DERs. Herein, we propose an SLP protection scheme based on phantom nodes, rings, and fake paths (PRFs) for IIoT. To increase the safety time of the network, the PRFs dynamically selects the phantom nodes. To adapt to a complex deployment environment, the ring can be flexibly deployed according to the terrain. The PRFs uses fake paths to confuse attackers. We integrate DERs technology into PRFs, such as using solar power modules, looking forward to extending the lifetime of the system. The experimental results proved that the PRFs could efficiently reduce backtracking attacks while maintaining a balance between security and network energy consumption of IIoT.

Highlights

  • With the rapid development in wireless communication technology, the application of wireless sensor networks (WSNs) has rapidly increased, such as those in wildlife protection [1], environmental monitoring [2], traffic management [3], disaster management [4], and medical care [5]

  • If some areas exist in the deployment environment where sensors are not allowed to be deployed, the PRFs can still perform efficiently; 2) In this study, many intuitive, simple, and efficient algorithms are used to realize the PRFs scheme; these algorithms require little computational power and is suitable for WSNs; 3) We integrate Distributed Energy Resources (DERs) technology into PRFs to improve the lifetime of the Industrial Internet of Things (IIoT). 4) We perform simulations using OMNET++ to prove the efficiency of our scheme

  • This paper focuses on the protection of source location privacy (SLP), which is aimed at WSNs deployed on land, to strengthen the context privacy of transmission and realize the protection of SLP

Read more

Summary

INTRODUCTION

With the rapid development in wireless communication technology, the application of wireless sensor networks (WSNs) has rapidly increased, such as those in wildlife protection [1], environmental monitoring [2], traffic management [3], disaster management [4], and medical care [5]. We propose a routing scheme based on phantom nodes, rings, and fake paths (PRFs). If some areas exist in the deployment environment where sensors are not allowed to be deployed, the PRFs can still perform efficiently; 2) In this study, many intuitive, simple, and efficient algorithms are used to realize the PRFs scheme; these algorithms require little computational power and is suitable for WSNs; 3) We integrate DERs technology into PRFs to improve the lifetime of the IIoT. The phantom node transmits the real packet to the ring by the method described in Algorithm 2; Phase 3. The real packet is transmitted clockwise in the ring and arrives at the sink proxy node; Phase 4. The main contributions of this paper as follows: 1) This paper presents the PRFs scheme based on phantom nodes, rings, and fake paths.

RELATED STUDIES
CONCLUSION AND FUTURE STUDIES
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.