Source location privacy in wireless sensor networks: What is the right choice of privacy metric?

被引:0
|
作者
Tejodbhav Koduru
R. Manjula
机构
[1] SRM University AP,Department of Computer Science and Engineering
来源
Wireless Networks | 2023年 / 29卷
关键词
IoT; WSN; Source location privacy; Safety period; Capture ratio; Entropy; Traffic analysis;
D O I
暂无
中图分类号
学科分类号
摘要
Today, communication between objects, machines, objects to machines and to humans is possible due to the Internet of Things (IoT). However, their applicability is restricted mostly to areas that are inhabited by humans. Monitoring and tracking in wilderness areas is still a challenging task to date, if not impossible. To bridge this gap, IoT networks are instrumented with Wireless Sensor Networks that are capable of providing remote services through multi-hop communication paradigm. Since these networks are deployed in deserted places, it becomes very crucial to protect the privacy of the location information of critical events or sources that these networks are monitoring. To this end, we propose a new random-walk based routing protocol namely BLS (Backward walk, L-walk, Shortest path walk) to protect the location of critical sources/events. The aim is to break the correlations between the network traffic and render the traffic-analysis efforts of the attacker, in locating the source of information, useless. In addition, we also evaluate the performance of the proposed technique by comparing it with the existing techniques using different privacy metrics such as safety period, entropy and capture ratio. Through this research work, we observed that the performance of source location privacy (SLP) preservation techniques is giving differing results for different privacy metrics. Although the proposed solution outperforms in terms of entropy metric by 104.59-folds improvements compared to Forward Random Walk technique, its performance in terms of safety period and capture ratio metrics are very poor with an improvement of just 0.65-folds and 0.1-fold respectively. Therefore, there is a dire need to come up with a right choice of metric for SLP preservation techniques.
引用
收藏
页码:1891 / 1898
页数:7
相关论文
共 50 条
  • [1] Source location privacy in wireless sensor networks: What is the right choice of privacy metric?
    Koduru, Tejodbhav
    Manjula, R.
    WIRELESS NETWORKS, 2023, 29 (04) : 1891 - 1898
  • [2] An Efficient Privacy Preserving Protocol for Source Location Privacy in Wireless Sensor Networks
    Roy, Pradecp Kumar
    Rijhim
    Singh, Jyoti Prakash
    Kumar, Prabhat
    PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2016, : 1093 - 1097
  • [3] Preserving Source-Location Privacy in Wireless Sensor Networks
    Li, Yun
    Ren, Jian
    2009 6TH ANNUAL IEEE COMMUNICATIONS SOCIETY CONFERENCE ON SENSOR, MESH AND AD HOC COMMUNICATIONS AND NETWORKS (SECON 2009), 2009, : 493 - 501
  • [4] Providing Source-Location Privacy in Wireless Sensor Networks
    Li, Yun
    Ren, Jian
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, 2009, 5682 : 338 - 347
  • [5] A new 'Direction' for Source Location Privacy in Wireless Sensor Networks'
    Rana, Shehla S.
    Vaidya, Nitin H.
    2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012, : 342 - 347
  • [6] Providing Source Location Privacy in Wireless Sensor Networks: A Survey
    Conti, Mauro
    Willemsen, Jeroen
    Crispo, Bruno
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (03): : 1238 - 1280
  • [7] Fake source-based source location privacy in wireless sensor networks
    Jhumka, Arshad
    Bradbury, Matthew
    Leeke, Matthew
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (12): : 2999 - 3020
  • [8] A Dynamic Fake Source Algorithm for Source Location Privacy in Wireless Sensor Networks
    Bradbury, Matthew
    Leeke, Matthew
    Jhumka, Arshad
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 531 - 538
  • [9] A Protecting Source-Location Privacy Scheme for Wireless Sensor Networks
    Miao, Xu
    Han, Guangjie
    He, Yu
    Wang, Hao
    Jiang, Jinfang
    2018 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE AND STORAGE (NAS), 2018,
  • [10] Quantitative Analysis on Source-Location Privacy for Wireless Sensor Networks
    Tang, Di
    Gu, Jian
    Hang, Weijia
    Ma, Xiao
    IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2020, : 805 - 809