CPSLP: A Cloud-Based Scheme for Protecting Source Location Privacy in Wireless Sensor Networks Using Multi-Sinks

被引:56
作者
Han, Guangjie [1 ]
Miao, Xu [1 ]
Wang, Hao [1 ]
Guizani, Mohsen [2 ]
Zhang, Wenbo [3 ]
机构
[1] Hohai Univ, Dept Informat & Commun Syst, Changzhou 213022, Peoples R China
[2] Qatar Univ, Coll Engn, Doha 999043, Qatar
[3] Shenyang Ligong Univ, Sch Informat Sci & Engn, Shenyang 110159, Liaoning, Peoples R China
基金
中国国家自然科学基金;
关键词
Multi-sinks; cloud-based; source location protection; privacy protection; wireless sensor network; WSNS; PROTOCOL;
D O I
10.1109/TVT.2019.2891127
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Source location privacy is a major problem in wireless sensor networks (WSNs). WSNs are usually deployed in random areas with no protection. The source location reveals valuable information about targets. If an adversary locates the source node by analyzing the traffic mode, a target can be easily attacked. In this paper, a scheme based on the cloud using multi-sinks (CPSLP) is proposed to address the issue of source location privacy. The authors propose a scheme that changes packet destinations randomly in each transmission. In addition, multiple sinks are adopted to create many routing paths. The introduction of an intermediate node renders the routing path more random and flexible. Then, a cloud-shaped fake hotspot is created to add fake packets into the WSN to confuse the adversary and provide a comprehensive privacy location. Each valuable packet is routed through a path that is quite difficult for the hotspot-locating adversary to find directly. Simulation results illustrate that the CPSLP scheme can prevent adversarial capture and maintain a high level of privacy protection at the same time. The energy consumption in this scheme exerts limited influence on the network lifetime compared with a cloud-based scheme and an all-direction random routing algorithm scheme.
引用
收藏
页码:2739 / 2750
页数:12
相关论文
共 31 条
[1]  
[Anonymous], 2014, VEHICULAR TECHNOLOGY
[2]  
[Anonymous], CHINA COMMUNICATI S1
[3]   Energy Harvesting for Physical Layer Security in Cooperative Networks Based on Compressed Sensing [J].
Chang, Shuai ;
Li, Jialun ;
Fu, Xiaomei ;
Zhang, Liang .
ENTROPY, 2017, 19 (09)
[4]   On protecting end-to-end location privacy against local eavesdropper in Wireless Sensor Networks [J].
Chen, Honglong ;
Lou, Wei .
PERVASIVE AND MOBILE COMPUTING, 2015, 16 :36-50
[5]   Hiding the Source Based on Limited Flooding for Sensor Networks [J].
Chen, Juan ;
Lin, Zhengkui ;
Hu, Ying ;
Wang, Bailing .
SENSORS, 2015, 15 (11) :29129-29148
[6]  
Fang Wei, 2012, 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet), P795, DOI 10.1109/CECNet.2012.6201768
[7]  
Guo Cheng, 2015, 2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC), P1, DOI 10.1109/PCCC.2015.7410341
[8]   A source location protection protocol based on dynamic routing in WSNs for the Social Internet of Things [J].
Han, Guangjie ;
Zhou, Lina ;
Wang, Hao ;
Zhang, Wenbo ;
Chan, Sammy .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 82 :689-697
[9]   A Disaster Management-Oriented Path Planning for Mobile Anchor Node-Based Localization in Wireless Sensor Networks [J].
Han, Guangjie ;
Yang, Xuan ;
Liu, Li ;
Zhang, Wenbo ;
Guizani, Mohsen .
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2020, 8 (01) :115-125
[10]   HySense: A Hybrid Mobile CrowdSensing Framework for Sensing Opportunities Compensation under Dynamic Coverage Constraint [J].
Han, Guangjie ;
Liu, Li ;
Chan, Sammy ;
Yu, Ruiyun ;
Yang, Yu .
IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (03) :93-99