On protecting end-to-end location privacy against local eavesdropper in Wireless Sensor Networks
نویسندگان
چکیده
Wireless Sensor Networks (WSNs) are often deployed in hostile environments to detect and collect interested events such as the appearance of a rare animal, which is called event collection system. However, due to the open characteristic of wireless communications, an adversary can detect the location of a source or sink and eventually capture them by eavesdropping on the sensor nodes’ transmissions and tracing the packets’ trajectories in the networks. Thus the location privacy of both the source and sink becomes a critical issue in WSNs. Previous research only focuses on the location privacy of the source or sink independently. In this paper, we address the importance of location privacy of both the source and sink andpropose four schemes called forward randomwalk (FRW), bidirectional tree (BT), dynamic bidirectional tree (DBT) and zigzag bidirectional tree (ZBT) respectively to deliver messages from source to sink, which can protect the end-to-end location privacy against local eavesdropper. Simulation results illustrate the effectiveness of the proposed location privacy protection schemes. © 2014 Elsevier B.V. All rights reserved.
منابع مشابه
Preserving Source-Location Privacy in Wireless Sensor Networks against a Global Eavesdropper
While many works to date in wireless sensor networks (WSNs) security have focused on providing confidentiality for message contents, contextual information usually remains exposed. Thus the adversary especially the global eavesdropper can easily obtain the sensitive information such as the location of a target object in a monitoring application, which is critical to the mission of the sensor ne...
متن کاملA Secure Routing Algorithm for Underwater Wireless Sensor Networks
Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...
متن کاملProviding Location Privacy against a Global Adversary in Wireless Sensor Networks ⋆
Wireless sensor networks are widely used in our daily life. It consists of various sensors which collect different information containing the identity, status, and location of an object or any other business, social or privately relevant information. But we pay attention to some issues related to sensor’s location privacy. In this paper, we focus on protecting the sensor’s location by introduci...
متن کاملPreventing Attacks from Eavesdropper Using HMAC Protocol in Wireless Sensor Networks
A wireless sensor network (WSN) is composed of numerous small sensing devices with limited communication range. The sensors collect data from the environment and report them to the sinks. With the promising sensing and wireless technologies, sensor networks are expected to be widely deployed in a broad spectrum of civil and military applications. Location information of the sinks, the sensors, ...
متن کاملSink Location Privacy Protection in Wireless Sensor Network
Wireless Sensor Network (WSN) is a broad network consisting of a number of sensor nodes in it. WSN is used mainly for monitoring and data aggregation purpose. A best plan of opponent may attack the sink node which is the aggregation point for the whole network. So, first there comes a need to secure the sink node from adversary. There are previous work are done by providing location privacy to ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Pervasive and Mobile Computing
دوره 16 شماره
صفحات -
تاریخ انتشار 2015