Enhanced Location Privacy Protection of Base Station in Wireless Sensor Networks

被引:0
作者
Li, Xinfeng [1 ]
Wang, Xiaoyuan [1 ]
Zheng, Nan [2 ]
Wan, Zhiguo [1 ]
Gu, Ming [1 ]
机构
[1] Tsinghua Univ, Minist Educ, Key Lab Informat Syst Secur, Beijing, Peoples R China
[2] Tsinghua Univ, Sch Software, Beijing, Peoples R China
来源
2009 FIFTH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR NETWORKS | 2009年
关键词
Location Privacy; Base Station;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Location privacy in wireless sensor networks has gained a wide concern. Particularly, the location privacy of base station requires ultimate protection due to its crucial position in wireless sensor networks. In this paper, we propose an efficient scheme, consisting of anonymous topology discovery and intelligent fake packet injection (IFPI), to protect the location privacy of base station. Anonymous topology discovery eliminates the potential threats against base station within topology discovery period. On the other hand, IFPI enhances privacy protection strength during data transmission period. Under given conditions, comprehensive simulations demonstrate that our scheme significantly improves privacy strength compared with existing strategies.
引用
收藏
页码:457 / +
页数:2
相关论文
共 50 条
[31]   Protecting source-location privacy based on multirings in wireless sensor networks [J].
Yao, Lin ;
Kang, Lin ;
Deng, Fangyu ;
Deng, Jing ;
Wu, Guowei .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (15) :3863-3876
[32]   Location Privacy in Unattended Wireless Sensor Networks upon the Requirement of Data Survivability [J].
Chen, Chung-Wei ;
Tsai, Yuh-Ren .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2011, 29 (07) :1480-1490
[33]   Cluster Based Location Privacy in Wireless Sensor Networks Against a Universal Adversary [J].
George, Chinnu Mary ;
Kumar, Manoj .
2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2013, :288-293
[34]   Tactics for Providing Location Privacy against Global Adversaries in Wireless Sensor Networks [J].
Pavitha, N. ;
Shelke, Santosh N. .
2015 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONTROL (IC4), 2015,
[35]   On the Effect of Imperfect Range Estimates on Base Station Anonymity in Wireless Sensor Networks [J].
Ward, Jon R. ;
Younis, Mohamed .
2013 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2013), 2013, :605-610
[36]   Base Station Anonymity Distributed Self-Assessment in Wireless Sensor Networks [J].
Ward, Jon R. ;
Younis, Mohamed .
2015 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2015, :103-108
[37]   On the Use of Distributed Relays to Increase Base Station Anonymity in Wireless Sensor Networks [J].
Ward, Jon R. ;
Younis, Mohamed .
2012 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2012), 2012,
[38]   Protecting Source Location Privacy in a Clustered Wireless Sensor Networks against Local Eavesdroppers [J].
Mamoun F. Al-Mistarihi ;
Islam M. Tanash ;
Fedaa S. Yaseen ;
Khalid A. Darabkh .
Mobile Networks and Applications, 2020, 25 :42-54
[39]   Counterfeit Clones: A Novel Technique for Source and Sink Location Privacy in Wireless Sensor Networks [J].
Al-Ahmadi, Saad A. .
IEEE ACCESS, 2022, 10 (62693-62701) :62693-62701
[40]   Location privacy protection algorithm for mobile networks [J].
Kun Gao ;
Yiwei Zhu ;
Songjie Gong ;
Hengsong Tan .
EURASIP Journal on Wireless Communications and Networking, 2016