Abstract
In real-time and mission-critical applications of wireless sensor networks (WSNs), such as military, the location of monitored objects must only be informed by sensor nodes to the base station, remaining anonymous to the rest of the network. However, preserving source location privacy is a challenging task due to the open nature of WSNs. Several methods have been proposed to address this issue, including anonymity-based, obfuscation-based, and policy-based methods. Anonymity-based methods are unsuitable for protecting position privacy, obfuscation-based methods are unable to protect identity, and policy-based methods are appropriate for all location privacy categories but challenging for end-users to understand and manage. These methods take into account different assumptions about attackers, energy consumption, and other factors in WSNs such as transmission delay and fixed battery and memory. Prior research has focused on one or more aspects of WSNs while ignoring others. In this work, we propose a Dynamic Routing Approach For enhancing Source Location Privacy in WSNs (SLP-DRA) to preserve source location privacy by dynamically selecting a path and injecting fake messages into the network. The dynamic selection of a route for transmitting real messages from the source sensor node to the base station, in the presence of fake packets, successfully confuses the attacker about the exact location of the monitored object in the network. The simulated results are compared using commonly used performance metrics of WSNs such as energy usage, transmission delay, security, and network lifetime. The comparative results show that SLP-DRA enhances the security level in preserving source location privacy compared to other techniques without compromising network lifetime, transmission delay, or energy consumption. We validate that SLP-DRA is robust against commonly used attacks, such as hop-by-hop and backtracking attacks, in finding the source location in WSNs.
Similar content being viewed by others
References
Al-Mistarihi, M.F., Tanash, I.M., Yaseen, F.S., & Darabkh, K.A. (2019). Protecting source location privacy in a clustered wireless sensor networks against local eavesdroppers. Mobile Networks and Applications, 25, 1–13.
Han, G., Zhou, L., Wang, H., Zhang, W., & Chan, S. (2018). A source location protection protocol based on dynamic routing in wsns for the social internet of things. Future Generation Computer Systems, 82, 689–697.
Han, G., Miao, X., Wang, H., Guizani, M., & Zhang, W. (2019). Cpslp: A cloud-based scheme for protecting source location privacy in wireless sensor networks using multi-sinks. IEEE Transactions on Vehicular Technology, 68(3), 2739–2750.
He, Y., Han, G., Wang, H., Ansere, J. A., & Zhang, W. (2019). A sector-based random routing scheme for protecting the source location privacy in wsns for the internet of things. Future Generation Computer Systems, 96, 438–448.
Mutalemwa, L. C., & Shin, S. (2019). Achieving source location privacy protection in monitoring wireless sensor networks through proxy node routing. Sensors, 19(5), 1037.
Chakraborty, B., Verma, S., & Singh, K. P. (2019). Differentially private location privacy preservation in wireless sensor networks. Wireless Personal Communications, 104(1), 387–406.
Jan, N., Al-Bayatti, A. H., Alalwan, N., & Alzahrani, A. I. (2019). An enhanced source location privacy based on data dissemination in wireless sensor networks (delp). Sensors, 19(9), 2050.
Alolaiwy, M., Tanik, M., & Jololian, L. (2021). From cnns to adaptive filter design for digital image denoising using reinforcement q-learning. In: SoutheastCon 2021, IEEE, pp 1–8
Jhumka, A., Leeke, M., & Shrestha, S. (2011). On the Use of Fake Sources for Source Location Privacy: Trade-Offs Between Energy and Privacy. The Computer Journal, 54(6), 860–874. https://doi.org/10.1093/comjnl/bxr010
Zhou, L., & Shan, Y. (2019). Multi-branch source location privacy protection scheme based on random walk in wsns. In: 2019 IEEE 4th International Conference on Cloud Computing and Big Data Analysis (ICCCBDA), IEEE, pp 543–547
Wang, H., Han, G., Zhou, L., Ansere, J. A., & Zhang, W. (2019). A source location privacy protection scheme based on ring-loop routing for the iot. Computer Networks, 148, 142–150.
Kaur, R., Verma, K., Jain, S. K., & Kesswani, N. (2019). Efficient routing protocol for location privacy preserving in internet of things. International Journal of Information Security and Privacy (IJISP), 13(1), 70–85.
Deng, J., Han, R., & Mishra, S. (2005). Countermeasures against traffic analysis attacks in wireless sensor networks. In: Security and Privacy for Emerging Areas in Communications Networks, 2005. SecureComm 2005. First International Conference on, IEEE, pp 113–126
Ishmanov, F., & Bin Zikria, Y. (2017). Trust mechanisms to secure routing in wireless sensor networks: Current state of the research and open research issues. Journal of Sensors. 10.1155/2017/4724852
Roy, P. K., Singh, J. P., Kumar, P., & Singh, M. (2015). Source location privacy using fake source and phantom routing (fsapr) technique in wireless sensor networks. Procedia Computer Science, 57, 936–941.
Cremonini, M., Braghin, C., & Ardagna, C.A. (2013). Privacy on the internet. In: Computer and Information Security Handbook, Elsevier, pp 739–753
Mehta, K., Liu, D., & Wright, M. (2007). Location privacy in sensor networks against a global eavesdropper. In: Network Protocols, 2007. ICNP 2007. In: IEEE International Conference on, IEEE, pp 314–323
Kamath, S., Meisner, E., & Isler, V. (2007). Triangulation based multi target tracking with mobile sensor networks. In: Robotics and Automation, 2007 IEEE International Conference on, IEEE, pp 3283–3288
Kamat, P., Zhang, Y., Trappe, W., & Ozturk, C. (2005). Enhancing source-location privacy in sensor network routing. In: Distributed Computing Systems, 2005. ICDCS 2005. Proceedings 25th IEEE International Conference on, IEEE, pp 599–608
Armenia, S., Morabito, G., & Palazzo, S. (2007). Analysis of location privacy/energy efficiency tradeoffs in wireless sensor networks. In: International Conference on Research in Networking, Springer, pp 215–226
Lee, S. W., Park, Y. H., Son, J. H., Kang, Y., Choe, J. G., Moon, H. G., & Seo, S. W. (2007). Source-location privacy in wireless sensor networks. Journal of the Korea Institute of Information Security and Cryptology, 17(2), 125–137.
Yao, J., & Wen, G. (2008). Preserving source-location privacy in energy-constrained wireless sensor networks. In: Distributed Computing Systems Workshops, 2008. ICDCS’08. 28th International Conference on, IEEE, pp 412–416
Jiang, J. R., Sheu, J. P., Tu, C., Wu, J. W., et al. (2011). An anonymous path routing (apr) protocol for wireless sensor networks. Journal of Information Science and Engineering, 27(2), 657–680.
Bahsi, H., & Levi, A. (2009). Energy efficient privacy preserved data gathering in wireless sensor networks having multiple sinks. In: 2009 2nd International Conference on Computer Science and its Applications, pp 1–8, 10.1109/CSA.2009.5404315
Tan, G., Li, W., & Song, J. (2014). Enhancing source location privacy in energy-constrained wireless sensor networks. In: Proceedings of international conference on computer science and information technology, Springer, pp 279–289
Luo, X., Ji, X., & Park, M.S. (2010). Location privacy against traffic analysis attacks in wireless sensor networks. In: Information Science and Applications (ICISA), 2010 International Conference on, IEEE, pp 1–6
Xi, Y., Schwiebert, L., & Shi, W. (2014). Privacy preserving shortest path routing with an application to navigation. Pervasive and Mobile Computing, 13, 142–149.
Chakraborty, B., Verma, S., & Singh, K. P. (2018). Staircase based differential privacy with branching mechanism for location privacy preservation in wireless sensor networks. Computers & Security, 77, 36–48.
Kou, K., Liu, Z., Ye, H., Li, Z., & Liu, W. (2021). A location privacy protection algorithm based on differential privacy in sensor network. International Journal of Embedded Systems, 14(5), 432–442.
Li, Y., Ren, J., & Wu, J. (2012). Quantitative measurement and design of source-location privacy schemes for wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 23(7), 1302–1311.
Mehta, K., Liu, D., & Wright, M. (2012). Protecting location privacy in sensor networks against a global eavesdropper. IEEE Transactions on Mobile Computing, 11(2), 320–336.
Raj, M., Li, N., Liu, D., Wright, M., & Das, S. K. (2014). Using data mules to preserve source location privacy in wireless sensor networks. Pervasive and Mobile Computing, 11, 244–260.
Ren, J., Zhang, Y., & Liu, K. (2013). An energy-efficient cyclic diversionary routing strategy against global eavesdroppers in wireless sensor networks. International Journal of Distributed Sensor Networks, 9(4), 834245.
Long, J., Liu, A., Dong, M., & Li, Z. (2015). An energy-efficient and sink-location privacy enhanced scheme for wsns through ring based routing. Journal of parallel and Distributed computing, 81, 47–65.
Liu, A., Zhang, D., Zhang, P., Cui, G., & Chen, Z. (2014). On mitigating hotspots to maximize network lifetime in multi-hop wireless sensor network with guaranteed transport delay and reliability. Peer-to-peer Networking and Applications, 7(3), 255–273.
Wang, H., Sheng, B., & Li, Q. (2009). Privacy-aware routing in sensor networks. Computer Networks, 53(9), 1512–1529.
Wei, F., Zhang, X., Xiao, H., & Men, A. (2012). A modified wireless token ring protocol for wireless sensor network. In: Consumer Electronics, Communications and Networks (CECNet), 2012 2nd International Conference on, IEEE, pp 795–799
Chen, J., Du, X., & Fang, B. (2012). An efficient anonymous communication protocol for wireless sensor networks. Wireless Communications and Mobile Computing, 12(14), 1302–1312.
Dwork, C., Kenthapadi, K., McSherry, F., Mironov, I., & Naor, M. (2006). Our data, ourselves: Privacy via distributed noise generation. In: Annual international conference on the theory and applications of cryptographic techniques, Springer, pp 486–503
Luo, G., Zhang, Z., Zhang, Z., Liu, Y., & Wang, L. (2020). A smart privacy-preserving learning method by fake gradients to protect users items in recommender systems. Complexity 2020
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
Authors declare no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Kumar, G., Rathore, R.S., Thakur, K. et al. Dynamic routing approach for enhancing source location privacy in wireless sensor networks. Wireless Netw 29, 2591–2607 (2023). https://doi.org/10.1007/s11276-023-03322-8
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-023-03322-8