Preserving Source-Location Privacy through Redundant Fog Loop for Wireless Sensor Networks

被引:22
作者
Dong, Mianxiong [1 ]
Ota, Kaoru [1 ]
Liu, Anfeng [2 ]
机构
[1] Muroran Inst Technol, Dept Informat & Elect Engn, Muroran, Hokkaido, Japan
[2] Cent S Univ, Sch Informat Sci & Engn, Changsha 410083, Hunan, Peoples R China
来源
CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING | 2015年
关键词
wireless sensor networks; source-location privacy; redundant fog loop; performance optimization; ENERGY; LIFETIME;
D O I
10.1109/CIT/IUCC/DASC/PICOM.2015.274
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A redundant fog loop-based scheme is proposed to preserve the source node-location privacy and achieve energy efficiency through two important mechanisms in wireless sensor networks (WSNs). The first mechanism is to create fogs with loop paths. The second mechanism creates fogs in the real source node region as well as many interference fogs in other regions of the network. In addition, the fogs are dynamically changing, and the communication among fogs also forms the loop path. The simulation results show that for medium-scale networks, our scheme can improve the privacy security by 8 fold compared to the phantom routing scheme, whereas the energy efficiency can be improved by 4 fold.
引用
收藏
页码:1836 / 1843
页数:8
相关论文
共 21 条
[1]  
[Anonymous], 2008, P IEEE INFOCOM 27 C
[2]   Maximizing lifetime of event-unobservable wireless sensor networks [J].
Bicakci, Kemal ;
Gultekin, Hakan ;
Tavli, Bulent ;
Bagci, Ibrahim Ethem .
COMPUTER STANDARDS & INTERFACES, 2011, 33 (04) :401-410
[3]   Lifetime Bounds of Wireless Sensor Networks Preserving Perfect Sink Unobservability [J].
Bicakci, Kemal ;
Bagci, Ibrahim Ethem ;
Tavli, Bulent .
IEEE COMMUNICATIONS LETTERS, 2011, 15 (02) :205-207
[4]   On Optimal Information Capture by Energy-Constrained Mobile Sensors [J].
He, Shibo ;
Chen, Jiming ;
Sun, Youxian ;
Yau, David K. Y. ;
Yip, Nung Kwan .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2010, 59 (05) :2472-2484
[5]   On the Use of Fake Sources for Source Location Privacy: Trade-Offs Between Energy and Privacy [J].
Jhumka, Arshad ;
Leeke, Matthew ;
Shrestha, Sambid .
COMPUTER JOURNAL, 2011, 54 (06) :860-874
[6]   Lifetime maximization through dynamic ring-based routing scheme for correlated data collecting in WSNs [J].
Jiang, Liangshan ;
Liu, Anfeng ;
Hu, Yanling ;
Chen, Zhigang .
COMPUTERS & ELECTRICAL ENGINEERING, 2015, 41 :191-215
[7]   Enhancing source-location privacy in sensor network routing [J].
Kamat, P ;
Zhang, YY ;
Trappe, W ;
Ozturk, C .
25th IEEE International Conference on Distributed Computing Systems, Proceedings, 2005, :599-608
[8]   Privacy preservation in wireless sensor networks: A state-of-the-art survey [J].
Li, Na ;
Zhang, Nan ;
Das, Sajal K. ;
Thuraisingham, Bhavani .
AD HOC NETWORKS, 2009, 7 (08) :1501-1514
[9]   Quantitative Measurement and Design of Source-Location Privacy Schemes for Wireless Sensor Networks [J].
Li, Yun ;
Ren, Jian ;
Wu, Jie .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (07) :1302-1311
[10]   On mitigating hotspots to maximize network lifetime in multi-hop wireless sensor network with guaranteed transport delay and reliability [J].
Liu, Anfeng ;
Zhang, Deyu ;
Zhang, Penghui ;
Cui, Guohua ;
Chen, Zhigang .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2014, 7 (03) :255-273