Abstract

Achieving high source location privacy is critical when Wireless Sensor Networks (WSNs) are used in sensitive applications such as in asset or battlefield monitoring. Due to the sensitivity of information in these applications, it is important to ensure the flow of data between sensor nodes is secure and it does not expose any information about the monitored assets to an adversary. This paper proposes a routing scheme with stronger source location privacy than the privacy of traditional routing schemes. The paper addresses some limitations of four existing schemes by providing highly random routing paths between the source nodes and sink node. The scheme randomly sends packet to the sink node through tactically positioned proxy nodes to guarantee the routes are highly befuddling to the adversary. To achieve high privacy, the proposed scheme uses a randomizing factor to generate a new random route for every successive packet. Simulation results demonstrate that the proposed scheme provides longer safety period and stronger privacy to outperform other schemes. Furthermore the scheme provides stronger privacy against both, patient and cautious adversary models.

Highlights

  • The use of Wireless Sensor Networks (WSNs) in monitoring applications can vary from safety-critical monitoring applications such as monitoring of high value assets, the military, healthcare and radiation monitoring, to non-critical applications such as temperature and humidity control [1].In safety-critical monitoring applications, it is extremely important to ensure that transmission of data between the sensor nodes is secure and information such as location of the asset being monitored is kept private [2,3]

  • The use of WSNs in monitoring applications requires designing of effective source location privacy routing schemes

  • This paper presents a two-phase quadrant-based routing scheme to address the source location privacy problem

Read more

Summary

Introduction

The use of Wireless Sensor Networks (WSNs) in monitoring applications can vary from safety-critical monitoring applications such as monitoring of high value assets, the military, healthcare and radiation monitoring, to non-critical applications such as temperature and humidity control [1]. The proposed scheme aims to address some limitations of existing source location privacy routing schemes including the shortest path routing [6], phantom single-path routing [8], randomly selected intermediate node routing [10], and all-direction random routing [11] schemes. The main contributions of this paper can be summarized as follows: (1) to propose a new routing scheme that uses strategic proxy nodes to provide strong source location privacy for source nodes in all areas of the network; (2) to conduct a series of experiments to evaluate performance of the proposed routing scheme against patient and cautious adversaries; (3) to demonstrate that the proposed scheme provides stronger source location privacy than some of the existing schemes including the shortest path routing, phantom single-path routing, randomly selected intermediate node routing, and all-direction random routing schemes. Intermediate node forwards packet to sink node through a fixed route

Limitations
Related Work
Network Model
Adversary Model
Proposed Proxy Node Routing Scheme
Network Initialization
Packet Routing Strategy
Phase 1
Phase 2
Privacy
Simulation Environment
Simulation
Findings
Conclusions and Future Work
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call