Enhanced Location Privacy Protection of Base Station in Wireless Sensor Networks

被引:0
作者
Li, Xinfeng [1 ]
Wang, Xiaoyuan [1 ]
Zheng, Nan [2 ]
Wan, Zhiguo [1 ]
Gu, Ming [1 ]
机构
[1] Tsinghua Univ, Minist Educ, Key Lab Informat Syst Secur, Beijing, Peoples R China
[2] Tsinghua Univ, Sch Software, Beijing, Peoples R China
来源
2009 FIFTH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR NETWORKS | 2009年
关键词
Location Privacy; Base Station;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Location privacy in wireless sensor networks has gained a wide concern. Particularly, the location privacy of base station requires ultimate protection due to its crucial position in wireless sensor networks. In this paper, we propose an efficient scheme, consisting of anonymous topology discovery and intelligent fake packet injection (IFPI), to protect the location privacy of base station. Anonymous topology discovery eliminates the potential threats against base station within topology discovery period. On the other hand, IFPI enhances privacy protection strength during data transmission period. Under given conditions, comprehensive simulations demonstrate that our scheme significantly improves privacy strength compared with existing strategies.
引用
收藏
页码:457 / +
页数:2
相关论文
共 50 条
[41]   Protecting Source Location Privacy in a Clustered Wireless Sensor Networks against Local Eavesdroppers [J].
Al-Mistarihi, Mamoun F. ;
Tanash, Islam M. ;
Yaseen, Fedaa S. ;
Darabkh, Khalid A. .
MOBILE NETWORKS & APPLICATIONS, 2020, 25 (01) :42-54
[42]   Location privacy protection algorithm for mobile networks [J].
Gao, Kun ;
Zhu, Yiwei ;
Gong, Songjie ;
Tan, Hengsong .
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2016,
[43]   A Metric for Evaluating Base Station Anonymity in Acknowledgement-Based Wireless Sensor Networks [J].
Ward, Jon R. ;
Younis, Mohamed .
2014 IEEE MILITARY COMMUNICATIONS CONFERENCE: AFFORDABLE MISSION SUCCESS: MEETING THE CHALLENGE (MILCOM 2014), 2014, :216-221
[44]   Exploiting architectural techniques for boosting base-station anonymity in wireless sensor networks [J].
Ren, Zhong ;
Younis, Mohamed .
INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2012, 11 (04) :215-227
[45]   Data Privacy Protection Algorithm Based on Redundant Slice Technology in Wireless Sensor Networks [J].
Li, Peng ;
Xu, Chao ;
Xu, He .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2021, 15 (01) :190-212
[46]   An Enhanced Location Scattering Based Privacy Protection Scheme [J].
Nisha, Nisha ;
Natgunanathan, Iynkaran ;
Xiang, Yong .
IEEE ACCESS, 2022, 10 :21250-21263
[47]   Exploiting Context-Awareness to Enhance Source-Location Privacy in Wireless Sensor Networks [J].
Rios, Ruben ;
Lopez, Javier .
COMPUTER JOURNAL, 2011, 54 (10) :1603-1615
[48]   From Nowhere to Somewhere: Protecting End-to-End Location Privacy in Wireless Sensor Networks [J].
Chen, Honglong ;
Lou, Wei .
2010 IEEE 29TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2010, :1-8
[49]   Preserving receiver-location privacy against traffic analysis attacks in wireless sensor networks [J].
Zhou, L. (zhouliming1985@gmail.com), 1600, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (09) :10113-10122
[50]   On protecting end-to-end location privacy against local eavesdropper in Wireless Sensor Networks [J].
Chen, Honglong ;
Lou, Wei .
PERVASIVE AND MOBILE COMPUTING, 2015, 16 :36-50