skip to main content
research-article

Preserving Smart Sink-Location Privacy with Delay Guaranteed Routing Scheme for WSNs

Published:26 May 2017Publication History
Skip Abstract Section

Abstract

A Semi Random Circle routing for mobile Sink joint Ray Routing for data (SRCRR) scheme is proposed for preserving sink-location privacy with a delay guaranteed. In the SRCRR scheme, the data are directionally routed along ray paths and stored at intermediate nodes probabilistically. The Sink moves in a semirandom circular pattern to collect data from the local nodes occasionally, which guarantees that the data will be collected with an acceptable delay and prevents attackers from predicting their locations and movements. The experimental results indicate that the performance of the SRCRR scheme is better than that of the previous schemes.

References

  1. K. Bicakci, I. E. Bagci, and B. Tavli. 2011. Lifetime bounds of wireless sensor networks preserving perfect sink unobservability. IEEE Communications Letters 15, 2 (2011), 205--207.Google ScholarGoogle ScholarCross RefCross Ref
  2. G. F. Chai, M. Xu, W. Y. Xu, and Z. Y. Lin. 2012. Enhancing sink-location privacy in wireless sensor networks through k-anonymity. International Journal of Distributed Sensor Networks.Google ScholarGoogle Scholar
  3. Z. Chen, A. Liu, and Z. Li, et al. 2016. Distributed duty cycle control for delay improvement in wireless sensor networks. Peer-to-Peer Networking and Applications 10, 3 (2017), 559--578. 2016.Google ScholarGoogle ScholarCross RefCross Ref
  4. K. Cho, M. H. Jo, T. Y. Kwon, H. H. Chen, and D. H. Lee. 2013. Classification and experimental analysis for clones detection approaches in wireless sensor networks. IEEE Systems Journal 7, 1 (2013), 26--35.Google ScholarGoogle ScholarCross RefCross Ref
  5. M. Dong, K. Ota, and A. Liu. 2016a. RMER: Reliable and energy efficient data collection for large-scale wireless sensor networks. IEEE Internet of Things Journal, 3, 4 (2016), 511--519.Google ScholarGoogle ScholarCross RefCross Ref
  6. M. Dong X. Liu, and Z Qian. 2015. QoE-ensured price competition model for emerging mobile networks. IEEE Wireless Communications 22, 4 (2015), 50--57.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. S. Gao, H. Zhang, and S. K. Da. 2011. Efficient data collection in wireless sensor networks with path-constrained mobile sinks. IEEE Transactions on Mobile Computing 10, 4 (2011), 592--608. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Y. Huang, M. Zhao, and C. Xue. 2015. Joint WCET and update activity minimization for cyber-physical systems. ACM Transactions on Embedded Computing Systems (TECS) 14, 1 (2015), 1--6. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. J. Hu, M. Xie, C. Pan, Q. Zhuge, E. H. M. Sha, and C. Xue. 2015. Low overhead software wear leveling for hybrid PCM+ DRAM main memory on embedded systems. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 23, 4 (2015), 654--663.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Y. Hu, M. Dong, K. Ota, A. Liu, and M. Guo. 2016. Mobile target detection in wireless sensor networks with adjustable sensing frequency. IEEE System Journal 10, 3 (2016) 1160--1171.Google ScholarGoogle ScholarCross RefCross Ref
  11. Y. Hu and A. Liu. 2015. An efficient heuristic subtraction deployment strategy to guarantee quality of event detection for WSNs. The Computer Journal 58, 8 (2015), 1747--1762.Google ScholarGoogle ScholarCross RefCross Ref
  12. S. Jason and M. Wolf. 2015. Tailoring design for embedded computer vision applications. Computer 48, 5 (2015), 58--62.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Y. Jian, S. Chen, Z. Zhang, and L. Zhang. 2008. A novel scheme for protecting receiver's location privacy in wireless sensor networks. IEEE Transactions on Wireless Communications 7, 10 (2008), 3769--3779. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. P. Kamat, Y. Zhang, W. Trappe, et al. 2005. Enhancing source-location privacy in sensor network routing. In Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS’05). 599--608. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. B. Kemal, G. Hakan, T. Bulent, and B. I. Ethem. 2011. Maximizing lifetime of event-unobservable wireless sensor networks, Computer Standards and Interfaces 33, 4 (2011), 401--410. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. D. Lee, M. Wolf, and S. S. Bhattacharyya. 2013. High-performance and low-energy buffer mapping method for multiprocessor DSP systems. ACM Transactions on Embedded Computing Systems (TECS). 12, 3 (2013), 82. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. X. Liu, M. Dong, K. Ota, L. T. Yang, and A. Liu. 2016a. Trace malicious source to guarantee cyber security for mass monitor critical infrastructure. Journal of Computer and System Sciences. 2016.Google ScholarGoogle Scholar
  18. X. Liu, M. Dong, K. Ota, P. Hung, and A. Liu. 2016c. Service pricing decision in cyber-physical systems: Insights from game theory. IEEE Transactions on Services Computing 9, 2 (2016), 186--198. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. N. Li, N. Zhang, S. K. Das, and B. Thuraisingham. 2009. Privacy preservation in wireless sensor networks: A state-of-the-art survey. Ad Hoc Networks 7, 8 (2009), 1501--1514. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. W. F. Liang and J. L. Xu. 2013. Network lifetime maximization for time-sensitive data gathering in wireless sensor networks with a mobile sink. Wireless Communications and Mobile Computing 13, 14 (2013), 1263--1280.Google ScholarGoogle ScholarCross RefCross Ref
  21. Y. Liu, M. Dong, K. Ota, and A. Liu. 2016b. Activetrust: Secure and trustable routing in wireless sensor networks. IEEE Transactions on Information Forensics and Security 11, 9 (2016), 2013--2027. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. A. Liu, Q. Zhang, and Z. Li, et al. 2016d. A green and reliable communication modeling for industrial internet of things. Computers 8 Electrical Engineering. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Z. H. Liu and W. Y. Xu. 2012. Determining sink location through zeroing-in attackers in wireless sensor networks. Wireless Networks 18, 3 (2012), 335--349. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. J. Long, M. Dong, K. Ot, and K. A. Liu. 2014. Achieving source location privacy and network life-time maximization through tree-based diversionary routing in WSNs. IEEE Access 2, 633--651.Google ScholarGoogle ScholarCross RefCross Ref
  25. M. E. Mahmoud and X. M. Shen. 2012. A cloud-based scheme for protecting source-location privacy against hotspot-locating attack in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems 23, 10 (2012), 1805--1818. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. K. Mehta, D. Liu, and M. Wright. 2007. Location privacy in sensor networks against a global eavesdropper. In Proceedings of IEEE International Conference on Network Protocols (ICNP’07), 314--323.Google ScholarGoogle Scholar
  27. Y. J. Mo, B. Wang, W. Y. Liu, and L. T. Yang. 2013. A Sink-oriented layered clustering protocol for wireless sensor networks. Mobile Networks and Applications 18, 5 (2013), 639--650. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. E. C.-H. Ngai and I. Rodhe. 2013. On providing location privacy for mobile sinks in wireless sensor networks. Wireless Networks 19, 1 (2013), 115--130. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. OMNeT++ simulator. 2013. Homepage. Retrieved from http://www.omnetpp.org/>.Google ScholarGoogle Scholar
  30. R. Rios and J. Lopez. 2011. Analysis of location privacy solutions in wireless sensor networks. IET Communications 5, 17 (2011), 2518--2532.Google ScholarGoogle ScholarCross RefCross Ref
  31. M. Shao, Y. Yang, S. Zhu, and G. H. Cao. 2008. Towards statistically strong source anonymity for sensor networks. In Proceedings of IEEE INFOCOM 2008, 51--55.Google ScholarGoogle Scholar
  32. F. M. Tashtarian and M. H. Y. Moghaddama. 2015. ODT: Optimal deadline-based trajectory for mobile sinks in WSN: A decision tree and dynamic programming approach. Computer Networks 77 (2015), 128--143. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. H. D. Wang, B. Sheng, and Q. Li. 2009. Privacy-aware routing in sensor networks, Computer Networks 53, 9 (2009), 1512--1529. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. R. Xie, A. Liu, and J. Gao. 2016. A residual energy aware schedule scheme for WSNs employing adjustable awake/sleep duty cycle. Wireless Personal Communications 90, 4 (2016), 1859--1887. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Y. Yang, M. Shao, S. Zhu, B. Urgaonkar, and G. Cao. 2008. Towards event source unobservability with minimum network traffic. In Proceedings of the 1st ACM Conference on Wireless Network Security, 77--88. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. K. U. Zhang and Y. Ozturk. 2005. Enhancing source-location privacy in sensor network routing. In Proceedings of the 25th IEEE International Conference on Distributed Computing Systems, 599--608. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Preserving Smart Sink-Location Privacy with Delay Guaranteed Routing Scheme for WSNs

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader
      About Cookies On This Site

      We use cookies to ensure that we give you the best experience on our website.

      Learn more

      Got it!