Abstract
A Semi Random Circle routing for mobile Sink joint Ray Routing for data (SRCRR) scheme is proposed for preserving sink-location privacy with a delay guaranteed. In the SRCRR scheme, the data are directionally routed along ray paths and stored at intermediate nodes probabilistically. The Sink moves in a semirandom circular pattern to collect data from the local nodes occasionally, which guarantees that the data will be collected with an acceptable delay and prevents attackers from predicting their locations and movements. The experimental results indicate that the performance of the SRCRR scheme is better than that of the previous schemes.
- K. Bicakci, I. E. Bagci, and B. Tavli. 2011. Lifetime bounds of wireless sensor networks preserving perfect sink unobservability. IEEE Communications Letters 15, 2 (2011), 205--207.Google Scholar
Cross Ref
- G. F. Chai, M. Xu, W. Y. Xu, and Z. Y. Lin. 2012. Enhancing sink-location privacy in wireless sensor networks through k-anonymity. International Journal of Distributed Sensor Networks.Google Scholar
- Z. Chen, A. Liu, and Z. Li, et al. 2016. Distributed duty cycle control for delay improvement in wireless sensor networks. Peer-to-Peer Networking and Applications 10, 3 (2017), 559--578. 2016.Google Scholar
Cross Ref
- K. Cho, M. H. Jo, T. Y. Kwon, H. H. Chen, and D. H. Lee. 2013. Classification and experimental analysis for clones detection approaches in wireless sensor networks. IEEE Systems Journal 7, 1 (2013), 26--35.Google Scholar
Cross Ref
- M. Dong, K. Ota, and A. Liu. 2016a. RMER: Reliable and energy efficient data collection for large-scale wireless sensor networks. IEEE Internet of Things Journal, 3, 4 (2016), 511--519.Google Scholar
Cross Ref
- M. Dong X. Liu, and Z Qian. 2015. QoE-ensured price competition model for emerging mobile networks. IEEE Wireless Communications 22, 4 (2015), 50--57.Google Scholar
Digital Library
- S. Gao, H. Zhang, and S. K. Da. 2011. Efficient data collection in wireless sensor networks with path-constrained mobile sinks. IEEE Transactions on Mobile Computing 10, 4 (2011), 592--608. Google Scholar
Digital Library
- Y. Huang, M. Zhao, and C. Xue. 2015. Joint WCET and update activity minimization for cyber-physical systems. ACM Transactions on Embedded Computing Systems (TECS) 14, 1 (2015), 1--6. Google Scholar
Digital Library
- J. Hu, M. Xie, C. Pan, Q. Zhuge, E. H. M. Sha, and C. Xue. 2015. Low overhead software wear leveling for hybrid PCM+ DRAM main memory on embedded systems. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 23, 4 (2015), 654--663.Google Scholar
Digital Library
- Y. Hu, M. Dong, K. Ota, A. Liu, and M. Guo. 2016. Mobile target detection in wireless sensor networks with adjustable sensing frequency. IEEE System Journal 10, 3 (2016) 1160--1171.Google Scholar
Cross Ref
- Y. Hu and A. Liu. 2015. An efficient heuristic subtraction deployment strategy to guarantee quality of event detection for WSNs. The Computer Journal 58, 8 (2015), 1747--1762.Google Scholar
Cross Ref
- S. Jason and M. Wolf. 2015. Tailoring design for embedded computer vision applications. Computer 48, 5 (2015), 58--62.Google Scholar
Digital Library
- Y. Jian, S. Chen, Z. Zhang, and L. Zhang. 2008. A novel scheme for protecting receiver's location privacy in wireless sensor networks. IEEE Transactions on Wireless Communications 7, 10 (2008), 3769--3779. Google Scholar
Digital Library
- P. Kamat, Y. Zhang, W. Trappe, et al. 2005. Enhancing source-location privacy in sensor network routing. In Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS’05). 599--608. Google Scholar
Digital Library
- B. Kemal, G. Hakan, T. Bulent, and B. I. Ethem. 2011. Maximizing lifetime of event-unobservable wireless sensor networks, Computer Standards and Interfaces 33, 4 (2011), 401--410. Google Scholar
Digital Library
- D. Lee, M. Wolf, and S. S. Bhattacharyya. 2013. High-performance and low-energy buffer mapping method for multiprocessor DSP systems. ACM Transactions on Embedded Computing Systems (TECS). 12, 3 (2013), 82. Google Scholar
Digital Library
- X. Liu, M. Dong, K. Ota, L. T. Yang, and A. Liu. 2016a. Trace malicious source to guarantee cyber security for mass monitor critical infrastructure. Journal of Computer and System Sciences. 2016.Google Scholar
- X. Liu, M. Dong, K. Ota, P. Hung, and A. Liu. 2016c. Service pricing decision in cyber-physical systems: Insights from game theory. IEEE Transactions on Services Computing 9, 2 (2016), 186--198. Google Scholar
Digital Library
- N. Li, N. Zhang, S. K. Das, and B. Thuraisingham. 2009. Privacy preservation in wireless sensor networks: A state-of-the-art survey. Ad Hoc Networks 7, 8 (2009), 1501--1514. Google Scholar
Digital Library
- W. F. Liang and J. L. Xu. 2013. Network lifetime maximization for time-sensitive data gathering in wireless sensor networks with a mobile sink. Wireless Communications and Mobile Computing 13, 14 (2013), 1263--1280.Google Scholar
Cross Ref
- Y. Liu, M. Dong, K. Ota, and A. Liu. 2016b. Activetrust: Secure and trustable routing in wireless sensor networks. IEEE Transactions on Information Forensics and Security 11, 9 (2016), 2013--2027. Google Scholar
Digital Library
- A. Liu, Q. Zhang, and Z. Li, et al. 2016d. A green and reliable communication modeling for industrial internet of things. Computers 8 Electrical Engineering. Google Scholar
Digital Library
- Z. H. Liu and W. Y. Xu. 2012. Determining sink location through zeroing-in attackers in wireless sensor networks. Wireless Networks 18, 3 (2012), 335--349. Google Scholar
Digital Library
- J. Long, M. Dong, K. Ot, and K. A. Liu. 2014. Achieving source location privacy and network life-time maximization through tree-based diversionary routing in WSNs. IEEE Access 2, 633--651.Google Scholar
Cross Ref
- M. E. Mahmoud and X. M. Shen. 2012. A cloud-based scheme for protecting source-location privacy against hotspot-locating attack in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems 23, 10 (2012), 1805--1818. Google Scholar
Digital Library
- K. Mehta, D. Liu, and M. Wright. 2007. Location privacy in sensor networks against a global eavesdropper. In Proceedings of IEEE International Conference on Network Protocols (ICNP’07), 314--323.Google Scholar
- Y. J. Mo, B. Wang, W. Y. Liu, and L. T. Yang. 2013. A Sink-oriented layered clustering protocol for wireless sensor networks. Mobile Networks and Applications 18, 5 (2013), 639--650. Google Scholar
Digital Library
- E. C.-H. Ngai and I. Rodhe. 2013. On providing location privacy for mobile sinks in wireless sensor networks. Wireless Networks 19, 1 (2013), 115--130. Google Scholar
Digital Library
- OMNeT++ simulator. 2013. Homepage. Retrieved from http://www.omnetpp.org/>.Google Scholar
- R. Rios and J. Lopez. 2011. Analysis of location privacy solutions in wireless sensor networks. IET Communications 5, 17 (2011), 2518--2532.Google Scholar
Cross Ref
- M. Shao, Y. Yang, S. Zhu, and G. H. Cao. 2008. Towards statistically strong source anonymity for sensor networks. In Proceedings of IEEE INFOCOM 2008, 51--55.Google Scholar
- F. M. Tashtarian and M. H. Y. Moghaddama. 2015. ODT: Optimal deadline-based trajectory for mobile sinks in WSN: A decision tree and dynamic programming approach. Computer Networks 77 (2015), 128--143. Google Scholar
Digital Library
- H. D. Wang, B. Sheng, and Q. Li. 2009. Privacy-aware routing in sensor networks, Computer Networks 53, 9 (2009), 1512--1529. Google Scholar
Digital Library
- R. Xie, A. Liu, and J. Gao. 2016. A residual energy aware schedule scheme for WSNs employing adjustable awake/sleep duty cycle. Wireless Personal Communications 90, 4 (2016), 1859--1887. Google Scholar
Digital Library
- Y. Yang, M. Shao, S. Zhu, B. Urgaonkar, and G. Cao. 2008. Towards event source unobservability with minimum network traffic. In Proceedings of the 1st ACM Conference on Wireless Network Security, 77--88. Google Scholar
Digital Library
- K. U. Zhang and Y. Ozturk. 2005. Enhancing source-location privacy in sensor network routing. In Proceedings of the 25th IEEE International Conference on Distributed Computing Systems, 599--608. Google Scholar
Digital Library
Index Terms
Preserving Smart Sink-Location Privacy with Delay Guaranteed Routing Scheme for WSNs
Recommendations
An energy-efficient and sink-location privacy enhanced scheme for WSNs through ring based routing
Sink location privacy is one of the major issues in Wireless Sensor Networks (WSNs) where adversaries may locate the sink by observing the destination of packets, directing and scaling of data flow, which leads to exposure of the sink-location privacy. ...
Secure Multi-copy Routing in Compromised Delay Tolerant Networks
Routing in delay tolerant networks (DTNs) is challenging due to their unique characteristics of intermittent node connectivity. Different protocols (single-, multi-copy, erasure-coding-based etc.) utilizing store-carry-and-forward paradigm have been ...
A Novel Message Scheduling Framework for Delay Tolerant Networks Routing
Multicopy routing strategies have been considered the most applicable approaches to achieve message delivery in Delay Tolerant Networks (DTNs). Epidemic routing and two-hop forwarding routing are two well-reported approaches for delay tolerant networks ...






Comments