Abstract

In many Internet of Things (IoT) systems and monitoring wireless sensor networks (WSNs), sensor nodes are expected to function for prolonged periods of time with no scope of recharging the sensor node batteries. Similarly, in safety-critical monitoring applications, the WSNs are expected to guarantee effective source location privacy (SLP) protection throughout the network lifetime. Fake packet-based SLP protocols are often energy-inefficient, they incur short network lifetime, and have high probability of packet collision events. Therefore, it is important to evaluate features such as the capability of the protocols to guarantee effective SLP protection for prolonged periods of time and reliable packet delivery. The existing studies show some deficit in the performance evaluation of the protocols. Consequently, this paper presents some investigations on the performance of the fake packet-based SLP protocols. Comprehensive performance analysis of four existing protocols is done under varied network parameters and configurations. Performance is observed under varied sensor node residual energy, source-sink distance, lifetime, source packet rate, network size, and node density. Analysis results establish that the protocols are capable of achieving high levels of SLP protection. However, the privacy protection is short-lived. Furthermore, the results show that long source-sink distance, long fake packet routes, short distance between fake packet sources and phantom nodes, and large amounts of fake packet traffic can improve the SLP protection while diminishing the packet delivery reliability, energy efficiency, and the network lifetime. The results also show that when the source packet rate is increased it influences some negative effects on the performance of the protocols. Moreover, it is observed that integrating fake packet routing and packet flooding techniques can impact some positive effects on the SLP protection and negative effects on the network lifetime. Based on the observations and analysis results, some recommendations are presented to improve the performance of the protocols.

Highlights

  • Internet of Things (IoT) technology has become a reality and its popularity is maturing

  • Four fake packet-based SLP protocols are included in the investigations: the tree-based diversionary routing protocol (TDR) [15], data dissemination routing protocol (DDR) [16], distributed protocol with fake source and phantom source routing (FPR) [17], and the probabilistic source location privacy protection protocol (PRR) [18]

  • We evaluate the performance of the tree-based diversionary routing protocol (TDR) [15], data dissemination routing protocol (DDR) [16], distributed protocol with fake source and phantom source routing (FPR) [17], and the probabilistic source location privacy protection protocol (PRR) [18]

Read more

Summary

INTRODUCTION

Internet of Things (IoT) technology has become a reality and its popularity is maturing. Four fake packet-based SLP protocols are included in the investigations: the tree-based diversionary routing protocol (TDR) [15], data dissemination routing protocol (DDR) [16], distributed protocol with fake source and phantom source routing (FPR) [17], and the probabilistic source location privacy protection protocol (PRR) [18]. We investigate the performance of TDR, DDR, PRR, and FPR protocols using important performance metrics: safety period, capture ratio, detection ratio, energy consumption, network lifetime, end-to-end delay, and packet delivery ratio. (2) Conduct a series of experiments to evaluate the SLP protection, energy consumption, network lifetime, endto-end delay, and packet delivery ratio performance of the TDR, DDR, PRR, and FPR protocols under varied network configurations. (4) Investigate the ability of the TDR, DDR, PRR, and FPR protocols to preserve the SLP in long-term monitoring networks and the effects of distributing fake packet traffic in various regions of the WSN domain.

PRIVACY PROTECTION PROTOCOLS WITH FAKE PACKET INJECTION TECHNIQUES
EXPERIMENTAL ANALYSIS
DISCUSSIONS
Findings
CONCLUSION AND FUTURE WORK

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.