Node Location Privacy Protection in Unattended Wireless Sensor Networks

被引:6
作者
Zhou, ZhiGang [1 ]
Wang, Yu [1 ]
Li, PanPan [2 ]
Chang, XinGong [1 ]
Luo, JiWei [1 ]
机构
[1] Shanxi Univ Finance & Econ, 696 Wucheng Rd, Taiyuan, Shanxi, Peoples R China
[2] Jiaxing Univ, 56 Yuexiu South Rd, Jiaxing, Zhejiang, Peoples R China
关键词
PRESERVATION; MAXIMIZATION; PROTOCOL; SCHEME;
D O I
10.1155/2021/5539382
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Node location protection is critical to the wireless sensor networks (WSN), especially for unattended environment. However, due to most of the static deployment and the limitations in energy, storage, and communication capabilities of the sensors, WSNs are vulnerable to various location (and derivative) attacks. In this work, we study the node location privacy protection issue from both aspects of attacks and defenses. First, we present a new two-phase location attack for two important types of nodes (including base station and source node). It can locate a base station node within few amounts of local wireless transmission monitoring and then reversely trace the location of the source node. Different from existing methods, the proposed attack determines the node location based on the transmission direction, which can break through existing defenses. Then, to defend against such attacks, we design a pseudospiral-based routing protocol for WSN. We analyze the performance of parameters such as routing probability, maximum detectable angle, hop count, and number of loops based on PU SBRF, MoRF, and PLAUDIT methods. The theory analysis and confrontation experiment of attack and defense show that the proposed scheme can protect the location privacy of the target node with moderate communication and computation overhead.
引用
收藏
页数:17
相关论文
共 38 条
[1]   An Adaptive Wake-Up-Interval to Enhance Receiver-Based Ps-Mac Protocol for Wireless Sensor Networks [J].
Adam, Mohammed Sani ;
Por, Lip Yee ;
Hussain, Mohammad Rashid ;
Khan, Nawsher ;
Ang, Tan Fong ;
Anisi, Mohammad Hossein ;
Huang, Zhirui ;
Ali, Ihsan .
SENSORS, 2019, 19 (17)
[2]   A Fog-Centric Secure Cloud Storage Scheme [J].
Ahsan, M. A. Manazir ;
Ali, Ihsan ;
Imran, Muhammad ;
Bin Idris, Mohd Yamani Idna ;
Khan, Suleman ;
Khan, Anwar .
IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2022, 7 (02) :250-262
[3]  
Ahsan MAM, 2020, INT J PARALLEL PROG, V48, P470, DOI 10.1007/s10766-018-0584-8
[4]  
[Anonymous], 2010, LECT NOTES ELECTR EN
[5]   Load-conscious maximization of base-station location privacy in wireless sensor networks [J].
Baroutis, Nikolaos ;
Younis, Mohamed .
COMPUTER NETWORKS, 2017, 124 :126-139
[6]  
Baroutis N, 2015, C LOCAL COMPUT NETW, P109, DOI 10.1109/LCN.2015.7366289
[7]   On protecting end-to-end location privacy against local eavesdropper in Wireless Sensor Networks [J].
Chen, Honglong ;
Lou, Wei .
PERVASIVE AND MOBILE COMPUTING, 2015, 16 :36-50
[8]   Designing robust routing protocols to protect base stations in wireless sensor networks [J].
Chen, Juan ;
Zhang, Hongli ;
Du, Xiaojiang ;
Fang, Binxing ;
Yan, Liu .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2014, 14 (17) :1613-1626
[9]   A source-location privacy preservation protocol in wireless sensor networks using source-based restricted flooding [J].
Chen J. ;
Fang B.-X. ;
Yin L.-H. ;
Su S. .
Jisuanji Xuebao/Chinese Journal of Computers, 2010, 33 (09) :1736-1747
[10]   Countermeasures against traffic analysis attacks in wireless sensor networks [J].
Deng, J ;
Han, R ;
Mishra, S .
First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Proceedings, 2005, :113-124