Abstract

Wireless sensor networks (WSNs) have been applied in networking devices, and a new problem has emerged called source-location privacy (SLP) in critical security systems. In wireless sensor networks, hiding the location of the source node from the hackers is known as SLP. The WSNs have limited battery capacity and low computational ability. Many state-of-the-art protocols have been proposed to address the SLP problems and other problems such as limited battery capacity and low computational power. One of the popular protocols is random path routing (RPR), and in random path routing, the system keeps sending the message randomly along all the possible paths from a source node to a sink node irrespective of the path’s distance. The problem arises when the system keeps sending a message via the longest route, resulting because of high battery usage and computational costs. This research paper presents a novel networking model referred to as calculated random path routing (CRPR). CRPR first calculates the top three shortest paths, and then randomly sends a token to any of the top three shortest calculated paths, ensuring the optimal tradeoff between computational cost and SLP. The proposed methodology includes the formal modeling of the CRPR in Colored Petri Nets. We have validated and verified the CRPR, and the results depict the optimal tradeoff.

Highlights

  • One of the major Wireless sensor networks (WSNs) deployment problems is source-location privacy (SPL) [1]

  • Whenever the assets are detected, the node becomes the source node, and it starts transmitting packets to a sink node, indicating that the assets have been detected in its surroundings [8]

  • One of the significant issues in WSNs is the security of the packets being transmitted in multi-hop touch

Read more

Summary

Introduction

One of the major WSN deployment problems is source-location privacy (SPL) [1]. SLP includes the hiding of all source nodes in the network from attackers [1]. Whenever the assets are detected, the node becomes the source node, and it starts transmitting packets to a sink node, indicating that the assets have been detected in its surroundings [8]. The distance between the source node and the sink node is not in the transmission range of sensor nodes. For this reason, WSNs create multi-hop communication [9]. One of the significant issues in WSNs is the security of the packets being transmitted in multi-hop touch. Mobile nodes require different protocols than those that are static

Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.