Skip to main content

Advertisement

Log in

Dynamic routing approach for enhancing source location privacy in wireless sensor networks

  • Original Paper
  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

In real-time and mission-critical applications of wireless sensor networks (WSNs), such as military, the location of monitored objects must only be informed by sensor nodes to the base station, remaining anonymous to the rest of the network. However, preserving source location privacy is a challenging task due to the open nature of WSNs. Several methods have been proposed to address this issue, including anonymity-based, obfuscation-based, and policy-based methods. Anonymity-based methods are unsuitable for protecting position privacy, obfuscation-based methods are unable to protect identity, and policy-based methods are appropriate for all location privacy categories but challenging for end-users to understand and manage. These methods take into account different assumptions about attackers, energy consumption, and other factors in WSNs such as transmission delay and fixed battery and memory. Prior research has focused on one or more aspects of WSNs while ignoring others. In this work, we propose a Dynamic Routing Approach For enhancing Source Location Privacy in WSNs (SLP-DRA) to preserve source location privacy by dynamically selecting a path and injecting fake messages into the network. The dynamic selection of a route for transmitting real messages from the source sensor node to the base station, in the presence of fake packets, successfully confuses the attacker about the exact location of the monitored object in the network. The simulated results are compared using commonly used performance metrics of WSNs such as energy usage, transmission delay, security, and network lifetime. The comparative results show that SLP-DRA enhances the security level in preserving source location privacy compared to other techniques without compromising network lifetime, transmission delay, or energy consumption. We validate that SLP-DRA is robust against commonly used attacks, such as hop-by-hop and backtracking attacks, in finding the source location in WSNs.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Al-Mistarihi, M.F., Tanash, I.M., Yaseen, F.S., & Darabkh, K.A. (2019). Protecting source location privacy in a clustered wireless sensor networks against local eavesdroppers. Mobile Networks and Applications, 25, 1–13.

    Google Scholar 

  2. Han, G., Zhou, L., Wang, H., Zhang, W., & Chan, S. (2018). A source location protection protocol based on dynamic routing in wsns for the social internet of things. Future Generation Computer Systems, 82, 689–697.

    Article  Google Scholar 

  3. Han, G., Miao, X., Wang, H., Guizani, M., & Zhang, W. (2019). Cpslp: A cloud-based scheme for protecting source location privacy in wireless sensor networks using multi-sinks. IEEE Transactions on Vehicular Technology, 68(3), 2739–2750.

    Article  Google Scholar 

  4. He, Y., Han, G., Wang, H., Ansere, J. A., & Zhang, W. (2019). A sector-based random routing scheme for protecting the source location privacy in wsns for the internet of things. Future Generation Computer Systems, 96, 438–448.

    Article  Google Scholar 

  5. Mutalemwa, L. C., & Shin, S. (2019). Achieving source location privacy protection in monitoring wireless sensor networks through proxy node routing. Sensors, 19(5), 1037.

    Article  Google Scholar 

  6. Chakraborty, B., Verma, S., & Singh, K. P. (2019). Differentially private location privacy preservation in wireless sensor networks. Wireless Personal Communications, 104(1), 387–406.

    Article  Google Scholar 

  7. Jan, N., Al-Bayatti, A. H., Alalwan, N., & Alzahrani, A. I. (2019). An enhanced source location privacy based on data dissemination in wireless sensor networks (delp). Sensors, 19(9), 2050.

    Article  Google Scholar 

  8. Alolaiwy, M., Tanik, M., & Jololian, L. (2021). From cnns to adaptive filter design for digital image denoising using reinforcement q-learning. In: SoutheastCon 2021, IEEE, pp 1–8

  9. Jhumka, A., Leeke, M., & Shrestha, S. (2011). On the Use of Fake Sources for Source Location Privacy: Trade-Offs Between Energy and Privacy. The Computer Journal, 54(6), 860–874. https://doi.org/10.1093/comjnl/bxr010

    Article  Google Scholar 

  10. Zhou, L., & Shan, Y. (2019). Multi-branch source location privacy protection scheme based on random walk in wsns. In: 2019 IEEE 4th International Conference on Cloud Computing and Big Data Analysis (ICCCBDA), IEEE, pp 543–547

  11. Wang, H., Han, G., Zhou, L., Ansere, J. A., & Zhang, W. (2019). A source location privacy protection scheme based on ring-loop routing for the iot. Computer Networks, 148, 142–150.

    Article  Google Scholar 

  12. Kaur, R., Verma, K., Jain, S. K., & Kesswani, N. (2019). Efficient routing protocol for location privacy preserving in internet of things. International Journal of Information Security and Privacy (IJISP), 13(1), 70–85.

    Article  Google Scholar 

  13. Deng, J., Han, R., & Mishra, S. (2005). Countermeasures against traffic analysis attacks in wireless sensor networks. In: Security and Privacy for Emerging Areas in Communications Networks, 2005. SecureComm 2005. First International Conference on, IEEE, pp 113–126

  14. Ishmanov, F., & Bin Zikria, Y. (2017). Trust mechanisms to secure routing in wireless sensor networks: Current state of the research and open research issues. Journal of Sensors. 10.1155/2017/4724852

    Article  Google Scholar 

  15. Roy, P. K., Singh, J. P., Kumar, P., & Singh, M. (2015). Source location privacy using fake source and phantom routing (fsapr) technique in wireless sensor networks. Procedia Computer Science, 57, 936–941.

    Article  Google Scholar 

  16. Cremonini, M., Braghin, C., & Ardagna, C.A. (2013). Privacy on the internet. In: Computer and Information Security Handbook, Elsevier, pp 739–753

  17. Mehta, K., Liu, D., & Wright, M. (2007). Location privacy in sensor networks against a global eavesdropper. In: Network Protocols, 2007. ICNP 2007. In: IEEE International Conference on, IEEE, pp 314–323

  18. Kamath, S., Meisner, E., & Isler, V. (2007). Triangulation based multi target tracking with mobile sensor networks. In: Robotics and Automation, 2007 IEEE International Conference on, IEEE, pp 3283–3288

  19. Kamat, P., Zhang, Y., Trappe, W., & Ozturk, C. (2005). Enhancing source-location privacy in sensor network routing. In: Distributed Computing Systems, 2005. ICDCS 2005. Proceedings 25th IEEE International Conference on, IEEE, pp 599–608

  20. Armenia, S., Morabito, G., & Palazzo, S. (2007). Analysis of location privacy/energy efficiency tradeoffs in wireless sensor networks. In: International Conference on Research in Networking, Springer, pp 215–226

  21. Lee, S. W., Park, Y. H., Son, J. H., Kang, Y., Choe, J. G., Moon, H. G., & Seo, S. W. (2007). Source-location privacy in wireless sensor networks. Journal of the Korea Institute of Information Security and Cryptology, 17(2), 125–137.

    Google Scholar 

  22. Yao, J., & Wen, G. (2008). Preserving source-location privacy in energy-constrained wireless sensor networks. In: Distributed Computing Systems Workshops, 2008. ICDCS’08. 28th International Conference on, IEEE, pp 412–416

  23. Jiang, J. R., Sheu, J. P., Tu, C., Wu, J. W., et al. (2011). An anonymous path routing (apr) protocol for wireless sensor networks. Journal of Information Science and Engineering, 27(2), 657–680.

    MathSciNet  Google Scholar 

  24. Bahsi, H., & Levi, A. (2009). Energy efficient privacy preserved data gathering in wireless sensor networks having multiple sinks. In: 2009 2nd International Conference on Computer Science and its Applications, pp 1–8, 10.1109/CSA.2009.5404315

  25. Tan, G., Li, W., & Song, J. (2014). Enhancing source location privacy in energy-constrained wireless sensor networks. In: Proceedings of international conference on computer science and information technology, Springer, pp 279–289

  26. Luo, X., Ji, X., & Park, M.S. (2010). Location privacy against traffic analysis attacks in wireless sensor networks. In: Information Science and Applications (ICISA), 2010 International Conference on, IEEE, pp 1–6

  27. Xi, Y., Schwiebert, L., & Shi, W. (2014). Privacy preserving shortest path routing with an application to navigation. Pervasive and Mobile Computing, 13, 142–149.

    Article  Google Scholar 

  28. Chakraborty, B., Verma, S., & Singh, K. P. (2018). Staircase based differential privacy with branching mechanism for location privacy preservation in wireless sensor networks. Computers & Security, 77, 36–48.

    Article  Google Scholar 

  29. Kou, K., Liu, Z., Ye, H., Li, Z., & Liu, W. (2021). A location privacy protection algorithm based on differential privacy in sensor network. International Journal of Embedded Systems, 14(5), 432–442.

    Article  Google Scholar 

  30. Li, Y., Ren, J., & Wu, J. (2012). Quantitative measurement and design of source-location privacy schemes for wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 23(7), 1302–1311.

    Article  Google Scholar 

  31. Mehta, K., Liu, D., & Wright, M. (2012). Protecting location privacy in sensor networks against a global eavesdropper. IEEE Transactions on Mobile Computing, 11(2), 320–336.

    Article  Google Scholar 

  32. Raj, M., Li, N., Liu, D., Wright, M., & Das, S. K. (2014). Using data mules to preserve source location privacy in wireless sensor networks. Pervasive and Mobile Computing, 11, 244–260.

    Article  Google Scholar 

  33. Ren, J., Zhang, Y., & Liu, K. (2013). An energy-efficient cyclic diversionary routing strategy against global eavesdroppers in wireless sensor networks. International Journal of Distributed Sensor Networks, 9(4), 834245.

    Article  Google Scholar 

  34. Long, J., Liu, A., Dong, M., & Li, Z. (2015). An energy-efficient and sink-location privacy enhanced scheme for wsns through ring based routing. Journal of parallel and Distributed computing, 81, 47–65.

    Article  Google Scholar 

  35. Liu, A., Zhang, D., Zhang, P., Cui, G., & Chen, Z. (2014). On mitigating hotspots to maximize network lifetime in multi-hop wireless sensor network with guaranteed transport delay and reliability. Peer-to-peer Networking and Applications, 7(3), 255–273.

    Article  Google Scholar 

  36. Wang, H., Sheng, B., & Li, Q. (2009). Privacy-aware routing in sensor networks. Computer Networks, 53(9), 1512–1529.

    Article  MATH  Google Scholar 

  37. Wei, F., Zhang, X., Xiao, H., & Men, A. (2012). A modified wireless token ring protocol for wireless sensor network. In: Consumer Electronics, Communications and Networks (CECNet), 2012 2nd International Conference on, IEEE, pp 795–799

  38. Chen, J., Du, X., & Fang, B. (2012). An efficient anonymous communication protocol for wireless sensor networks. Wireless Communications and Mobile Computing, 12(14), 1302–1312.

    Article  Google Scholar 

  39. Dwork, C., Kenthapadi, K., McSherry, F., Mironov, I., & Naor, M. (2006). Our data, ourselves: Privacy via distributed noise generation. In: Annual international conference on the theory and applications of cryptographic techniques, Springer, pp 486–503

  40. Luo, G., Zhang, Z., Zhang, Z., Liu, Y., & Wang, L. (2020). A smart privacy-preserving learning method by fake gradients to protect users items in recommender systems. Complexity 2020

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gulshan Kumar.

Ethics declarations

Conflict of interest

Authors declare no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kumar, G., Rathore, R.S., Thakur, K. et al. Dynamic routing approach for enhancing source location privacy in wireless sensor networks. Wireless Netw 29, 2591–2607 (2023). https://doi.org/10.1007/s11276-023-03322-8

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-023-03322-8

Keywords

Navigation