An Anonymity Region Construction and Two Fold Location Protection Scheme for Improving Source and Sink Location Privacy in WSN
DOI:
https://doi.org/10.26438/ijcse/v7i2.724730Keywords:
Wireless Sensor Network, Contextual privacy, All-direction Random Routing algorithm, Improved All-direction Random Routing algorithm, Two-fold location privacy protectingAbstract
Generally, Wireless Sensor Networks (WSNs) refers to a spatially distributed autonomous network which consists of several sensor nodes. These nodes sense and transport the data to the sink node through adjacent nodes. Contextual privacy is the main challenging issue in WSN. The attacker node gathers information from traffic patterns between source and sink. The protection of source and sink location is very essential to prevent the attacker from gathering information. An all-direction random routing algorithm (ARR) was proposed to protect source-location from attacker node. This algorithm utilized agent nodes to establish a path between sources and sink nodes using only local decisions. ARR is efficiently protecting source location but it exposes direction information of sink. So in this paper, ARR is improved by injecting fake packets and random walk of real packets to hide direction information. Additionally, the anonymity of source and sink location is improved by Two-fold location privacy protection scheme where anonymity is constructed around the source and sink node based on geographic information to hide actual location. In anonymity region, packets are sent from a fake source node and received by fake sink node. The number of fake source and sink is selected based on traffic flow.
References
[1] X. Yi, A. Bouguettaya, D. Georgakopoulos, A. Song, J. Willemson, “Privacy protection for wireless medical sensor data”, IEEE transactions on dependable and secure computing, Vol.13, Issue.3, pp.369-380, 2016.
[2] K. Ravikumar, V. Manikandan, “Detection of Node Capture Attack in Wireless Sensor Networks”, International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.4, pp.56-61, 2018.
[3] M. Poonam, Mahajan, "WSN: Infrastructure and Applications", International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue.1, pp.6-10, 2018.
[4] C. Gentili, G. Valenza, M. Nardelli, A. Lanatà, G. Bertschy, L. Weiner, P. Pietrini, “Longitudinal monitoring of heartbeat dynamics predicts mood changes in bipolar patients: a pilot study”, Journal of affective disorders, Vol.209, pp.30-38, 2017.
[5] L. Ranganath, K.S. Kavya, B.M. Priyanka, A.M. Shruthi, C. VidyaRaj, “Security for Source Node Privacy in Wireless Sensor Networks”, International Research Journal of Engineering and Technology, Vol.4, Issue.4, pp.1307-1309, 2017.
[6] N. Wang, J. Zeng, “All-Direction Random Routing for Source-Location Privacy Protecting against Parasitic Sensor Networks”, Sensors, Vol.17, Issue.3, pp.1-18, 2017.
[7] R. Di Pietro, A. Viejo, “Location privacy and resilience in wireless sensor networks querying”, Computer Communications, Vol.34, Issue.3, pp.515-523, 2011.
[8] B. Chakraborty, S. Verma, K.P. Singh, “Staircase based differential privacy with branching mechanism for location privacy preservation in wireless sensor networks”, Computers & Security, Vol.77, pp.36-48, 2018.
[9] M. Bradbury, A. Jhumka, M. Leeke, “Hybrid online protocols for source location privacy in wireless sensor networks”, Journal of Parallel and Distributed Computing, Vol.115, pp.67-81, 2018.
[10] M. Raj, N. Li, D. Liu, M. Wright, S.K. Das, “Using data mules to preserve source location privacy in wireless sensor networks”, Pervasive and Mobile Computing, Vol.11, pp.244-260, 2014.
[11] P.K. Roy, J.P. Singh, P. Kumar, M.P. Singh, “Source location privacy using fake source and phantom routing (FSAPR) technique in wireless sensor networks”, Procedia Computer Science, Vol.57, pp.936-941, 2015.
[12] J. Deng, R. Han, S. Mishra, “Countermeasures against traffic analysis attacks in wireless sensor networks”, In 2005. SecureComm 2005. IEEE First International Conference on Security and Privacy for Emerging Areas in Communications Networks, pp.113-126, 2005.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
