Awareness based gannet optimization for source location privacy preservation with multiple assets in wireless sensor networks

被引:1
作者
Singh, Mintu [1 ,2 ]
Singh, Maheshwari Prasad [1 ]
机构
[1] Natl Inst Technol Patna, Dept Comp Sci & Engn, Patna 800005, Bihar, India
[2] Bhagalpur Coll Engn, Dept CSE, Bhagalpur, India
关键词
optimization; phantom node routing; privacy preservation; random walk; shortest path; source location; wireless sensor networks;
D O I
10.1002/cpe.8191
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The wireless sensor network (WSN) has been assimilated into modern society and is utilized in many crucial application domains, including animal monitoring, border surveillance, asset monitoring, and so forth. These technologies aid in protecting the place of the event's occurrence from the adversary. Maintaining privacy concerning the source location is challenging due to the sensor nodes' limitations and efficient routing strategies. Hence, this research introduces a novel source location privacy preservation using the awareness-based Gannet with random-Dijkstra's algorithm (AGO-RD). The network is initialized by splitting the hotspot and non-hotspot region optimally using the proposed awareness-based Gannet (AGO) algorithm. Here, the multi-objective fitness function is utilized to initialize the network based on factors like throughput, energy consumption, latency, and entropy. Then, the information is forwarded to the phantom node in the non-hotspot region to preserve the source location's privacy, which is far from the sink node. The proposed random-Dijkstra algorithm is utilized to route the information from the phantom node to the sink with more security. Analysis of the proposed AGO-RD-based source location privacy preservation technique in terms of delay, throughput, network lifetime, and energy consumption accomplished the values of 6.52 ms, 95.68%, 7109.9 rounds, and 0.000125 mu J.
引用
收藏
页数:18
相关论文
共 29 条
  • [1] Counterfeit Clones: A Novel Technique for Source and Sink Location Privacy in Wireless Sensor Networks
    Al-Ahmadi, Saad A.
    [J]. IEEE ACCESS, 2022, 10 (62693-62701): : 62693 - 62701
  • [2] A Cooperative Clustering Protocol With Duty Cycling for Energy Harvesting Enabled Wireless Sensor Networks
    Bahbahani, Mohammed S.
    Alsusa, Emad
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2018, 17 (01) : 101 - 111
  • [3] PSSPR: A source location privacy protection scheme based on sector phantom routing in WSNs
    Chen, Yuling
    Sun, Jing
    Yang, Yixian
    Li, Tao
    Niu, Xinxin
    Zhou, Huiyu
    [J]. INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (02) : 1204 - 1221
  • [4] George CM., 2023, J THEOR APPL INF TEC, V101, P3259
  • [5] Novel Two-Level Randomized Sector-based Routing to Maintain Source Location Privacy in WSN for IoT
    Jainulabudeen, A.
    Surputheen, M. Mohamed
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (03): : 285 - 291
  • [6] Energy-efficient source location privacy protection for network lifetime maximization against local eavesdropper in wireless sensor network (EeSP)
    Jan, Naveed
    Khan, Sarmadullah
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (02)
  • [7] Low-Latency and Energy-Efficient Data Preservation Mechanism in Low-Duty-Cycle Sensor Networks
    Jiang, Chan
    Li, Tao-Shen
    Liang, Jun-Bin
    Wu, Heng
    [J]. SENSORS, 2017, 17 (05):
  • [8] A survey on QoS mechanisms in WSN for computational intelligence based routing protocols
    Kaur, Tarunpreet
    Kumar, Dilip
    [J]. WIRELESS NETWORKS, 2020, 26 (04) : 2465 - 2486
  • [9] Kukkala VB., PRIVACY PRESERVING N
  • [10] Li F., 2021, NETWORKS, V2021, P1