Counterfeit Clones: A Novel Technique for Source and Sink Location Privacy in Wireless Sensor Networks

被引:4
|
作者
Al-Ahmadi, Saad A. [1 ]
机构
[1] King Saud Univ, Dept Comp Sci, Riyadh 11451, Saudi Arabia
来源
IEEE ACCESS | 2022年 / 10卷 / 62693-62701期
关键词
Wireless sensor networks; Privacy; Sensors; Cloning; Base stations; Security; Safety; WSN; counterfeit clones; internet of things; sink node; source node; location privacy; PROTECTION; PRESERVATION; WSNS; EFFICIENT; SCHEME; ALGORITHM; INTERNET;
D O I
10.1109/ACCESS.2022.3182660
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless Sensor Networks (WSNs) are an essential part of the Internet of Things (IoT). In WSNs, sensors are randomly deployed in harsh environments for monitoring purposes. In such environments, employing only the content protection mechanisms available leaves WSNs vulnerable to unauthorized interception by global and local adversaries. An attacker may exploit contextual data to locate the source or the sink; therefore, context privacy is an exigent part of WSN privacy that cannot be neglected. WSN is used in many applications and can transmit sensitive information. To protect sensitive information, it is necessary to provide protection techniques to prevent the adversary from breaching and exposing the location of the source and sink. Past works focus on protecting the location at the routing level; however, the adversary could bypass that and easily locate the nodes by capturing frames and discovering the source and destination addresses. In this paper, we propose the Counterfeit Clones (CC) scheme to protect nodes' location privacy at the data link layer by using a lightweight one-way hash function to hide the MAC address. At the routing level, fake sources and sinks are deployed to obfuscate the source and the destination node identity. The performance analysis results confirm that the CC technique has a longer safety time with lower energy consumption in comparison with some of the existing solutions. Compared to contrasting algorithms, CC can increase the safety time and protect the location privacy for source and sink with faster packet transmission to the base station.
引用
收藏
页码:62693 / 62701
页数:9
相关论文
共 50 条
  • [1] Protecting the sink location privacy in wireless sensor networks
    Yao, Lin
    Kang, Lin
    Shang, Pengfei
    Wu, Guowei
    PERSONAL AND UBIQUITOUS COMPUTING, 2013, 17 (05) : 883 - 893
  • [2] Protecting the sink location privacy in wireless sensor networks
    Lin Yao
    Lin Kang
    Pengfei Shang
    Guowei Wu
    Personal and Ubiquitous Computing, 2013, 17 : 883 - 893
  • [3] A Protocol for Sink Location Privacy Protection in Wireless Sensor Networks
    Ying, Bidi
    Makrakis, Dimitrios
    Mouftah, Hussein T.
    2011 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE (GLOBECOM 2011), 2011,
  • [4] A Novel Routing Strategy to Provide Source Location Privacy in Wireless Sensor Networks
    LI Shuming
    XIAO Yan
    LIN Qiaomin
    QI Zhuzhu
    Wuhan University Journal of Natural Sciences, 2016, 21 (04) : 298 - 306
  • [5] Preserving Mobile-Sink-Location Privacy in Wireless Sensor Networks
    Yao, Jianbo
    2010 2ND INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS PROCEEDINGS (DBTA), 2010,
  • [6] Preserving Source- and Sink-location Privacy in Sensor Networks
    Lee, Sangho
    Kim, Jong
    Kim, Yoonho
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2016, 13 (01) : 115 - 130
  • [7] Source Location Privacy Using Fake Source And Phantom Routing (FSAPR) Technique in Wireless Sensor Networks
    Roy, Pradeep Kumar
    Singh, Jyoti Prakash
    Kumar, Prabhat
    Singh, M. P.
    3RD INTERNATIONAL CONFERENCE ON RECENT TRENDS IN COMPUTING 2015 (ICRTC-2015), 2015, 57 : 936 - 941
  • [8] Preserving Source-Location Privacy in Wireless Sensor Networks
    Li, Yun
    Ren, Jian
    2009 6TH ANNUAL IEEE COMMUNICATIONS SOCIETY CONFERENCE ON SENSOR, MESH AND AD HOC COMMUNICATIONS AND NETWORKS (SECON 2009), 2009, : 493 - 501
  • [9] Providing Source-Location Privacy in Wireless Sensor Networks
    Li, Yun
    Ren, Jian
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, 2009, 5682 : 338 - 347
  • [10] A new 'Direction' for Source Location Privacy in Wireless Sensor Networks'
    Rana, Shehla S.
    Vaidya, Nitin H.
    2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012, : 342 - 347