Hiding the Source Based on Limited Flooding for Sensor Networks

被引:15
作者
Chen, Juan [1 ]
Lin, Zhengkui [1 ]
Hu, Ying [1 ]
Wang, Bailing [2 ]
机构
[1] Dalian Maritime Univ, Dept Informat Sci & Technol, Dalian 116026, Peoples R China
[2] Harbin Inst Technol, Dept Comp Sci, Weihai 264209, Peoples R China
关键词
wireless sensors network; internet of things; source location; privacy protection; security; SOURCE-LOCATION PRIVACY;
D O I
10.3390/s151129129
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Wireless sensor networks are widely used to monitor valuable objects such as rare animals or armies. Once an object is detected, the source, i.e., the sensor nearest to the object, generates and periodically sends a packet about the object to the base station. Since attackers can capture the object by localizing the source, many protocols have been proposed to protect source location. Instead of transmitting the packet to the base station directly, typical source location protection protocols first transmit packets randomly for a few hops to a phantom location, and then forward the packets to the base station. The problem with these protocols is that the generated phantom locations are usually not only near the true source but also close to each other. As a result, attackers can easily trace a route back to the source from the phantom locations. To address the above problem, we propose a new protocol for source location protection based on limited flooding, named SLP. Compared with existing protocols, SLP can generate phantom locations that are not only far away from the source, but also widely distributed. It improves source location security significantly with low communication cost. We further propose a protocol, namely SLP-E, to protect source location against more powerful attackers with wider fields of vision. The performance of our SLP and SLP-E are validated by both theoretical analysis and simulation results.
引用
收藏
页码:29129 / 29148
页数:20
相关论文
共 24 条
[1]   Toward a Statistical Framework for Source Anonymity in Sensor Networks [J].
Alomair, Basel ;
Clark, Andrew ;
Cuellar, Jorge ;
Poovendran, Radha .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2013, 12 (02) :248-260
[2]  
[Anonymous], 2014, VEHICULAR TECHNOLOGY
[3]  
[Anonymous], ACM Transactions on Information and System Security (TISSEC), DOI DOI 10.1145/290163.290168
[4]   On protecting end-to-end location privacy against local eavesdropper in Wireless Sensor Networks [J].
Chen, Honglong ;
Lou, Wei .
PERVASIVE AND MOBILE COMPUTING, 2015, 16 :36-50
[5]   Designing robust routing protocols to protect base stations in wireless sensor networks [J].
Chen, Juan ;
Zhang, Hongli ;
Du, Xiaojiang ;
Fang, Binxing ;
Yan, Liu .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2014, 14 (17) :1613-1626
[6]   An efficient anonymous communication protocol for wireless sensor networks [J].
Chen, Juan ;
Du, Xiaojiang ;
Fang, Binxing .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2012, 12 (14) :1302-1312
[7]   Providing Source Location Privacy in Wireless Sensor Networks: A Survey [J].
Conti, Mauro ;
Willemsen, Jeroen ;
Crispo, Bruno .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (03) :1238-1280
[8]   Multimedia Sensor Networks Based on Ultrawideband Chaotic Radio Pulses [J].
Dmitriev, A. S. ;
Efremova, E. V. ;
Gerasimov, M. Yu .
JOURNAL OF COMMUNICATIONS TECHNOLOGY AND ELECTRONICS, 2015, 60 (04) :393-401
[9]   Enhancing source-location privacy in sensor network routing [J].
Kamat, P ;
Zhang, YY ;
Trappe, W ;
Ozturk, C .
25th IEEE International Conference on Distributed Computing Systems, Proceedings, 2005, :599-608
[10]  
Kang L, 2009, IEEE ICC, P603