A Ring-Based Routing Scheme for Distributed Energy Resources Management in IIoT

被引:7
作者
Xiong, Zhiwen [1 ,2 ]
Wang, Huibin [1 ]
Zhang, Lili [1 ]
Fan, Tanghuai [2 ]
Shen, Jie [1 ]
机构
[1] Hohai Univ, Coll Comp & Informat Engn, Nanjing 211100, Peoples R China
[2] Nanchang Inst Technol, Sch Informat Engn, Nanchang 330029, Jiangxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Routing; Phantoms; Privacy; Wireless sensor networks; Energy resources; Protocols; Wireless communication; Source location privacy; distributed energy resources; IIoT; coverage hole; phantom node; fake path; SOURCE-LOCATION PRIVACY; PROTECTION; ALGORITHM; PROTOCOLS; TRACKING;
D O I
10.1109/ACCESS.2020.3023260
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, Distributed Energy Resources (DERs) have been utilized with increasing frequency in Industrial Internet of Things (IIoT) to deal with energy and environmental challenges. IIoT with wireless communication technology, which is easy to be intercepted, often facing various attack. For the safety of the network, more complex algorithms need to be run on IIoT, but the action need more energy. In addition, in some application scenarios, the location where the packets were generated indicates that an event occurred. An attacker can find the sensor node through a backtracking attack, which is equivalent to reaching the place where the event occurred. In order to hide the location information of the event, it is necessary to protect source location privacy (SLP), which will also increase the energy consumption of IIoT. If only the traditional battery is used to power the nodes in IIoT, the lifetime of the system will be limited. When IIoT is deployed outdoors, it is often difficult to replace the battery. The existence of lakes make IIoT have coverage holes during deployment. In order to implement SLP and make the system work for a long time in the environment with deployment holes, we use DERs. Herein, we propose an SLP protection scheme based on phantom nodes, rings, and fake paths (PRFs) for IIoT. To increase the safety time of the network, the PRFs dynamically selects the phantom nodes. To adapt to a complex deployment environment, the ring can be flexibly deployed according to the terrain. The PRFs uses fake paths to confuse attackers. We integrate DERs technology into PRFs, such as using solar power modules, looking forward to extending the lifetime of the system. The experimental results proved that the PRFs could efficiently reduce backtracking attacks while maintaining a balance between security and network energy consumption of IIoT.
引用
收藏
页码:167490 / 167503
页数:14
相关论文
共 38 条
  • [1] Protecting Source Location Privacy in a Clustered Wireless Sensor Networks against Local Eavesdroppers
    Al-Mistarihi, Mamoun F.
    Tanash, Islam M.
    Yaseen, Fedaa S.
    Darabkh, Khalid A.
    [J]. MOBILE NETWORKS & APPLICATIONS, 2020, 25 (01) : 42 - 54
  • [2] Flexibility Provisions From a Fast Charging Facility Equipped With DERs for Wind Integrated Grids
    Alharbi, Walied
    Bhattacharya, Kankar
    [J]. IEEE TRANSACTIONS ON SUSTAINABLE ENERGY, 2019, 10 (03) : 1006 - 1014
  • [3] An Energy-Efficient Evolutionary Clustering Technique for Disaster Management in IoT Networks
    Biabani, Morteza
    Fotouhi, Hossein
    Yazdani, Nasser
    [J]. SENSORS, 2020, 20 (09)
  • [4] A Near-Optimal Source Location Privacy Scheme for Wireless Sensor Networks
    Bradbury, Matthew
    Jhumka, Arshad
    [J]. 2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 409 - 416
  • [5] Distributed Coordination of DERs With Storage for Dynamic Economic Dispatch
    Cherukuri, Ashish
    Cortes, Jorge
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2018, 63 (03) : 835 - 842
  • [6] Preserving Source-Location Privacy through Redundant Fog Loop for Wireless Sensor Networks
    Dong, Mianxiong
    Ota, Kaoru
    Liu, Anfeng
    [J]. CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 1836 - 1843
  • [7] Dutta Neelanjana, 2010, Proceedings 11th International Conference on Mobile Data Management (MDM 2010), P336, DOI 10.1109/MDM.2010.75
  • [8] Wearable Wireless Sensors Network for ECG Telemonitoring Using Neural Network for Features Extraction
    El Attaoui, Amina
    Hazmi, Marouane
    Jilbab, Abdelilah
    Bourouhou, Abdennasser
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2020, 111 (03) : 1955 - 1976
  • [9] REBTAM: reliable energy balance traffic aware data reporting algorithm for object tracking in multi-sink wireless sensor networks
    El-Fouly, Fatma Hanafy
    Abd Ramadan, Rabie
    Mahmoud, Mohamed I.
    Dessouky, Moawad I.
    [J]. WIRELESS NETWORKS, 2018, 24 (03) : 735 - 753
  • [10] OKRA: optimal task and resource allocation for energy minimization in mobile edge computing systems
    Fang, Weiwei
    Ding, Shuai
    Li, Yangyang
    Zhou, Wenchen
    Xiong, Naixue
    [J]. WIRELESS NETWORKS, 2019, 25 (05) : 2851 - 2867