Abstract
Fog (From cOre to edGe) computing employs a huge number of wireless embedded devices to enable end users with anywhere-anytime-to-anything connectivity. Due to their operating nature, wireless sensor nodes often work unattended, and hence are exposed to a variety of attacks. Preserving source-location privacy plays a key role in some wireless sensor network (WSN) applications. In this paper, a redundancy branch convergence-based preserved source location privacy scheme (RBCPSLP) is proposed for energy harvesting sensor networks, with the following advantages: numerous routing branches are created in non-hotspot areas with abundant energy, and those routing branches can merge into a few routing paths before they reach the hotspot areas. The generation time, the duration of routing, and the number of routing branches are then decided independently based on the amount of energy obtained, so as to maximize network energy utilization, greatly enhance privacy protection, and provide long network lifetimes. Theoretical analysis and experimental results show that the RBCPSLP scheme allows a several-fold improvement of the network energy utilization as well as the source location privacy preservation, while maximizing network lifetimes.
Highlights
F OG (From cOre to edGe) computing, a term coined by Cisco in 2012, is a distributed computing paradigm [1], that empowers network devices at different hierarchical levels with various degrees of computational and storage capability [1,2,3,4]
Ensuring the security and privacy of embedded devices is a challenging issue since such devices generally operate with a limited power energy budget provided by batteries or solar cells [21,22], must often work in a potentially hostile environment and offer limited hardware support for resisting attacks due to cost constraints, so they are vulnerable to various attacks, including attacks in terms of security, and attacks related to privacy preservation
We propose a redundancy branch convergence-based preserved source location privacy (RBCPSLP) scheme for Energy Harvesting Wireless Sensor Networks (EHWSNs)
Summary
F OG (From cOre to edGe) computing, a term coined by Cisco in 2012, is a distributed computing paradigm [1], that empowers network devices at different hierarchical levels with various degrees of computational and storage capability [1,2,3,4]. The connected devices have reached nine billion and are expected to grow more rapidly and reach 24 billion by 2020 [1,5,6]. With this increasing number of heterogeneous devices connected to the IoT and the generating data [4,7,8,9,10,11], the security and privacy of such devices are becoming an urgent issue [4,6,12,13,14,15]. Ensuring the security and privacy of embedded devices is a challenging issue since such devices generally operate with a limited power energy budget provided by batteries or solar cells [21,22], must often work in a potentially hostile environment and offer limited hardware support for resisting attacks due to cost constraints, so they are vulnerable to various attacks, including attacks in terms of security (such as on-off attacks, fault injection attacks, memory-based attacks and other attacks [4,12,13,14,15,23,24]), and attacks related to privacy preservation
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.