A Pseudopacket Scheduling Algorithm for Protecting Source Location Privacy in the Internet of Things

被引:13
作者
He, Yu [1 ]
Han, Guangjie [1 ]
Xu, Mengting [1 ,2 ]
Martinez-Garcia, Miguel [3 ]
机构
[1] Hohai Univ, Changzhou Key Lab Internet Things Technol Intelli, Changzhou 213022, Peoples R China
[2] Chinese Acad Sci, Inst Acoust, State Key Lab Acoust, Beijing 100190, Peoples R China
[3] Loughborough Univ, Dept Aeronaut & Automot Engn, Loughborough LE11 3TU, Leics, England
关键词
Routing; Internet of Things; Privacy; Energy consumption; Position measurement; Phantoms; Delays; Artificial intelligence; Internet of Things (IoT); pseudopacket routing; sensor networks; source location privacy (SLP); SCHEME; CLOUD; WSNS;
D O I
10.1109/JIOT.2021.3117957
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The massive growth in interconnected devices from a multiplicity of networks goes hand-in-hand with the emergence of the Internet of Things (IoT) paradigm. As a critical component of the IoT, sensor networks have become ubiquitous and widely used in various application domains. However, open-ended wireless communication brings severe threats to user privacy and security. Attackers from outside the network can trace back along the data stream to capture the source node, which poses a significant threat to the privacy of the data source. A feasible defense method is to interfere with the attacker's tracking process through forged data streams. However, the related traditional solutions generally have shortcomings in terms of balancing security and efficiency. Therefore, this article proposes a pseudopacket scheduling algorithm (PPSA), which aims at reasonably regulating the process of pseudopacket generation to interfere with the adversary's tracking to the data source. The algorithm comprises three phases. First, the sink node performs geographic information acquisition and neighbor node discovery with a flood-based method. Then, the sink node uses a self-adapting proxy selection method to construct backbone routes with both randomness and low latency to receive actual packets. Finally, the nodes on both sides of the backbone routes follow a pseudopacket scheduling strategy to interfere with the adversary's tracking of the source locations. The experimental results showcase that our proposed scheme effectively controls the additional energy consumption and transmission delays within acceptable ranges while ensuring adequate location privacy.
引用
收藏
页码:9999 / 10009
页数:11
相关论文
共 24 条
[1]   Protecting Source Location Privacy in a Clustered Wireless Sensor Networks against Local Eavesdroppers [J].
Al-Mistarihi, Mamoun F. ;
Tanash, Islam M. ;
Yaseen, Fedaa S. ;
Darabkh, Khalid A. .
MOBILE NETWORKS & APPLICATIONS, 2020, 25 (01) :42-54
[2]  
[Anonymous], 2020, MATLAB, Version 9.8.0 (R2020a)
[3]   The Internet of Things: A survey [J].
Atzori, Luigi ;
Iera, Antonio ;
Morabito, Giacomo .
COMPUTER NETWORKS, 2010, 54 (15) :2787-2805
[4]   Smart Parking System With Privacy Preservation and Reputation Management Using Blockchain [J].
Badr, Mahmoud M. ;
Amiri, Wesam Al ;
Fouda, Mostafa M. ;
Mahmoud, Mohamed M. E. A. ;
Aljohani, Abdulah Jeza ;
Alasmary, Waleed .
IEEE ACCESS, 2020, 8 :150823-150843
[5]   On protecting end-to-end location privacy against local eavesdropper in Wireless Sensor Networks [J].
Chen, Honglong ;
Lou, Wei .
PERVASIVE AND MOBILE COMPUTING, 2015, 16 :36-50
[6]   A source-location privacy preservation protocol in wireless sensor networks using source-based restricted flooding [J].
Chen J. ;
Fang B.-X. ;
Yin L.-H. ;
Su S. .
Jisuanji Xuebao/Chinese Journal of Computers, 2010, 33 (09) :1736-1747
[7]   Constrained Random Routing Mechanism for Source Privacy Protectionin WSNs [J].
Chen, Wenlong ;
Zhang, Mingshu ;
Hu, Guangwu ;
Tang, Xiaolan ;
Sangaiah, Arun Kumar .
IEEE ACCESS, 2017, 5 :23171-23181
[8]   Dynamical Resource Allocation in Edge for Trustable Internet-of-Things Systems: A Reinforcement Learning Method [J].
Deng, Shuiguang ;
Xiang, Zhengzhe ;
Zhao, Peng ;
Taheri, Javid ;
Gao, Honghao ;
Yin, Jianwei ;
Zomaya, Albert Y. .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (09) :6103-6113
[9]   CPSLP: A Cloud-Based Scheme for Protecting Source Location Privacy in Wireless Sensor Networks Using Multi-Sinks [J].
Han, Guangjie ;
Miao, Xu ;
Wang, Hao ;
Guizani, Mohsen ;
Zhang, Wenbo .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (03) :2739-2750
[10]   A source location protection protocol based on dynamic routing in WSNs for the Social Internet of Things [J].
Han, Guangjie ;
Zhou, Lina ;
Wang, Hao ;
Zhang, Wenbo ;
Chan, Sammy .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 82 :689-697