An Anonymity Region Construction and Two Fold Location Protection Scheme for Improving Source and Sink Location Privacy in WSN

Authors

  • Jayanthi R Computer Science Teacher, Sanjose Matriculation Higher Secondary School, Kattoor, Mettupalayam, Tamilnadu, India
  • Mohanraj M Department, Department of Computer Application, Dr SNS Rajalakshmi College of Arts and Science, Chinnavedampatti, Coimbatore, Tamilnadu, India

DOI:

https://doi.org/10.26438/ijcse/v7i2.724730

Keywords:

Wireless Sensor Network, Contextual privacy, All-direction Random Routing algorithm, Improved All-direction Random Routing algorithm, Two-fold location privacy protecting

Abstract

Generally, Wireless Sensor Networks (WSNs) refers to a spatially distributed autonomous network which consists of several sensor nodes. These nodes sense and transport the data to the sink node through adjacent nodes. Contextual privacy is the main challenging issue in WSN. The attacker node gathers information from traffic patterns between source and sink. The protection of source and sink location is very essential to prevent the attacker from gathering information. An all-direction random routing algorithm (ARR) was proposed to protect source-location from attacker node. This algorithm utilized agent nodes to establish a path between sources and sink nodes using only local decisions. ARR is efficiently protecting source location but it exposes direction information of sink. So in this paper, ARR is improved by injecting fake packets and random walk of real packets to hide direction information. Additionally, the anonymity of source and sink location is improved by Two-fold location privacy protection scheme where anonymity is constructed around the source and sink node based on geographic information to hide actual location. In anonymity region, packets are sent from a fake source node and received by fake sink node. The number of fake source and sink is selected based on traffic flow.

References

[1] X. Yi, A. Bouguettaya, D. Georgakopoulos, A. Song, J. Willemson, “Privacy protection for wireless medical sensor data”, IEEE transactions on dependable and secure computing, Vol.13, Issue.3, pp.369-380, 2016.

[2] K. Ravikumar, V. Manikandan, “Detection of Node Capture Attack in Wireless Sensor Networks”, International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.4, pp.56-61, 2018.

[3] M. Poonam, Mahajan, "WSN: Infrastructure and Applications", International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue.1, pp.6-10, 2018.

[4] C. Gentili, G. Valenza, M. Nardelli, A. Lanatà, G. Bertschy, L. Weiner, P. Pietrini, “Longitudinal monitoring of heartbeat dynamics predicts mood changes in bipolar patients: a pilot study”, Journal of affective disorders, Vol.209, pp.30-38, 2017.

[5] L. Ranganath, K.S. Kavya, B.M. Priyanka, A.M. Shruthi, C. VidyaRaj, “Security for Source Node Privacy in Wireless Sensor Networks”, International Research Journal of Engineering and Technology, Vol.4, Issue.4, pp.1307-1309, 2017.

[6] N. Wang, J. Zeng, “All-Direction Random Routing for Source-Location Privacy Protecting against Parasitic Sensor Networks”, Sensors, Vol.17, Issue.3, pp.1-18, 2017.

[7] R. Di Pietro, A. Viejo, “Location privacy and resilience in wireless sensor networks querying”, Computer Communications, Vol.34, Issue.3, pp.515-523, 2011.

[8] B. Chakraborty, S. Verma, K.P. Singh, “Staircase based differential privacy with branching mechanism for location privacy preservation in wireless sensor networks”, Computers & Security, Vol.77, pp.36-48, 2018.

[9] M. Bradbury, A. Jhumka, M. Leeke, “Hybrid online protocols for source location privacy in wireless sensor networks”, Journal of Parallel and Distributed Computing, Vol.115, pp.67-81, 2018.

[10] M. Raj, N. Li, D. Liu, M. Wright, S.K. Das, “Using data mules to preserve source location privacy in wireless sensor networks”, Pervasive and Mobile Computing, Vol.11, pp.244-260, 2014.

[11] P.K. Roy, J.P. Singh, P. Kumar, M.P. Singh, “Source location privacy using fake source and phantom routing (FSAPR) technique in wireless sensor networks”, Procedia Computer Science, Vol.57, pp.936-941, 2015.

[12] J. Deng, R. Han, S. Mishra, “Countermeasures against traffic analysis attacks in wireless sensor networks”, In 2005. SecureComm 2005. IEEE First International Conference on Security and Privacy for Emerging Areas in Communications Networks, pp.113-126, 2005.

Downloads

Published

2019-02-28
CITATION
DOI: 10.26438/ijcse/v7i2.724730
Published: 2019-02-28

How to Cite

[1]
R. Jayanthi and M. Mohanraj, “An Anonymity Region Construction and Two Fold Location Protection Scheme for Improving Source and Sink Location Privacy in WSN”, Int. J. Comp. Sci. Eng., vol. 7, no. 2, pp. 724–730, Feb. 2019.

Issue

Section

Research Article