Abstract
In wireless sensor networks, the convergence node (sink node) is the center of the network, all network data will be transmitted to the sink node, it will process and extract effective information, which leads to the uneven distribution of traffic. An external attacker who can monitor traffic will find the location of the convergent node and attack it according to this feature. In order to protect the location of the sink node in the wireless sensor network, a privacy protection protocol based on K anonymous false packet injection (KAFP) is proposed. The protocol randomly generates K false sink nodes, transmits real data to the sink node and transmits false data to the false sink node. By hiding the location of the sink node, the security time is increased. Theoretical analysis and simulation experiment results show that KAFP can protect privacy of convergent nodes at lower energy consumption when the value of K is properly selected.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ren, F.Y., Huang, H.N., Lin, C.: Wireless sensor networks. J. Softw. 14(7), 1282–1291 (2003). (in Chinese with English abstract)
Fan, Y.J., Chen, H., Zhang, X.Y.: Data privacy preservation in wireless sensor networks. Chin. J. Comput. 35(6), 1132–1147 (2012)
Peng, H., Chen, H., Zhang, X.Y.: Location privacy preservation in wireless sensor networks. J. Softw. 26(3), 617–639 (2015)
Qian, P., Wu, M.: Survey on privacy preservation in IoT. Appl. Res. Comput. 30(1), 14–21 (2013)
Wang, S.: Location privacy protection in wireless sensor networks. Central South University, HuNan (2009)
Deng, J., Han, R., Mishra, S.: Intrusion tolerance and anti traffic analysis strategies for wireless sensor networks. IEEE Comput. Soc. 32(5), 637–646 (2004)
Jian, Y., Chen, S.G., Zhang, Z., et al.: A novel scheme for protecting receiver’s location privacy in wireless sensor networks. IEEE Trans. Wirel. Commun. 7(10), 3769–3779 (2008)
Deng, J., Han, R., Mishra, S.: Countermeasures against traffic analysis attacks in wireless sensor networks. In: First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Washington, DC, USA, pp. 113–126 (2005)
Deng, J., Han, R., Mishra, S.: Decorrelating wireless sensor network to inhibit traffic analysis attacks. Pervasive Mob. Comput. 2(2), 159–186 (2005)
Zhang, K.: Research on sink-location privacy protection in wireless sensor networks. Anhun University (2014)
Chen H.L., Lou, W.: From nowhere to somewhere: protecting end-to-end location privacy in wireless sensor networks. In: Performance Computing and Communications Conference, Albuquerque, New Mexico, USA, pp. 1–8 (2010)
Li, Z.: An energy-efficient and preserving sink-location privacy scheme for WSNs. Central South University, HuNan (2012)
Nezhad, A.A., Makrakis, D., Miri, A.: Anonymous topology discovery for multi-hop wireless sensor networks. In: Proceedings of the 3rd ACM Workshop on Qos and Security for Wireless and Mobile Networks, New York, USA, pp. 78–85 (2007)
Yang, Y., Shao, M., Zhu, S., et al.: Towards statistically strong source anonymity for sensor networks. ACM Trans. Sens. Netw. 9(3), 34 (2013)
Li, P.Y., Zhang, Z.X.: Protocol algorithm design of location privacy preserving for Sink node based on security area. J. Syst. Simul. 27(12), 2973–2980 (2015)
Acknowledgments
This work is supported by the National Natural Science Foundation of China (nos. 61762030).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Song, L., Ma, W., Ye, J. (2018). Location Privacy Protection for Sink Node in WSN Based on K Anonymous False Packets Injection. In: Chen, Q., Wu, J., Zhang, S., Yuan, C., Batten, L., Li, G. (eds) Applications and Techniques in Information Security. ATIS 2018. Communications in Computer and Information Science, vol 950. Springer, Singapore. https://doi.org/10.1007/978-981-13-2907-4_6
Download citation
DOI: https://doi.org/10.1007/978-981-13-2907-4_6
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-2906-7
Online ISBN: 978-981-13-2907-4
eBook Packages: Computer ScienceComputer Science (R0)