Abstract

With the rapid popularization and development of Internet, global researchers are increasingly paying more and more attention to anonymity and privacy security. Anonymous communication technology has gradually become people’s focus. Attacks against sensors may appear in different layers, so anonymity at network layer should therefore be envisioned. Tor, as one of the anonymous communication systems which implements multi-hop to protect user’s identity privacy on the Internet, is currently the most popular anonymous privacy solution, but the concept of Tor has not applied to wireless sensor networks. Therefore, in this article, we think the mix structure of Tor which is crucial to its anonymity can be applied to wireless sensor networks; what’s more, an improved path selecting algorithm according to round trip time we propose can boost some degree of performance. First, we make a summary of current typical path selection algorithms and analyze the performance and anonymity problems of these algorithms in network congestion. Then, in order to improve the performance of the algorithm in congestion, a routing improvement scheme based on round trip time is proposed.

Highlights

  • Time information is very important for sensors to communicate with each other, because most sensor network applications rely on time synchronization

  • In the experiment described below, the control group is the path selection algorithm currently used by Tor, at the same time, the experimental group is the improved path selection algorithm mentioned above

  • In order to improve congestion control and network load balancing, and improve the performance of Tor, an improved routing algorithm based on circuit’s RTT is proposed; we identify the RTT as indicator of path selecting, in the case of no congestion on the network, its performance is very close to the current Tor, but with the increase of network congestion, its performance has been significantly improved

Read more

Summary

Introduction

Time information is very important for sensors to communicate with each other, because most sensor network applications rely on time synchronization. Time information can be used by attackers to intrude.[1] In addition to time information, there is other sensitive information in wireless sensor networks (WSNs), such as IP address, the size of message, and the frequency of contact. Some researchers have integrated onion routing with sensor networks to preserve privacy[2] and anonymize sensor network IDs using Tor.[3,4,5]. We can apply Tor in the WSNs by means of equipping sensors with the technology of Tor to achieve anonymity, like mobile phones with Tor app. Path selection algorithm is crucial for performance and anonymity of this system which guarantees time requirement for sensor

Objectives
Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.