Advertisement

Sink Location Privacy Protection Algorithm Based on Tangential Path in WSN

  • Leqiang BaiEmail author
  • Hongshu Zhu
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1074)

Abstract

In order to improve the issue that the existing sink location privacy protection algorithms have lower safety period, sink location privacy protection algorithm based on tangential path in WSN is proposed. Sink determines circular security area, source nodes transmit real data packets through tangential path. Tangent point retransmits them to the sink and generates fake data packets through the original tangent path. In addition, fake sinks are randomly selected outside the security area by normal distribution model, and intersection nodes send fake packets to these fake sinks. Theoretical analysis and simulation results show that this algorithm can improve security period and achieve balance between sink location privacy protection and network energy consumption compared with the existing sink location privacy protection algorithm.

Keywords

Wireless sensor network Sink location Tangential path 

References

  1. 1.
    Deng, J., Han, R., Mishra, S.: Intrusion tolerance and antitraffic analysis strategies for wireless sensor networks. In: DSN 2004: Proceedings of the 2004 International Conference on Dependable Systems and Networks, pp. 637–646. IEEE Computer Society, Washington, DC (2004)Google Scholar
  2. 2.
    Chen, H., Lou, W.: From nowhere to somewhere: protecting end-to-end location privacy in wireless sensor networks (2010)Google Scholar
  3. 3.
    Yao, L., Kang, L., Shang, P., et al.: Protecting the sink location privacy in wireless sensor networks. Pers. Ubiquit. Comput. 17(5), 883–893 (2013)CrossRefGoogle Scholar
  4. 4.
    Ngai, C.H., Rodhe, I.: On providing location privacy for mobile sinks in wireless sensor networks. In: ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, pp. 116–123. ACM (2009)Google Scholar
  5. 5.
    Wang, J., Wang, F., Cao, Z., et al.: Sink location privacy protection under direction attack in wireless sensor networks. Wireless Netw. 23(2), 1–13 (2017)CrossRefGoogle Scholar
  6. 6.
    Jian, Y., Chen, S., Zhang, Z., et al.: A novel scheme for protecting receiver’s location privacy in wireless sensor networks. IEEE Trans. Wireless Commun. 7(10), 3769–3779 (2008)CrossRefGoogle Scholar
  7. 7.
    Liu, C.X., Liu, Y., Zhang, Z.J., et al.: High energy-efficient and privacy-preserving secure data aggregation for wireless sensor networks. Int. J. Commun. Syst. 26(3), 380–394 (2013)MathSciNetCrossRefGoogle Scholar
  8. 8.
    Long, J., Liu, A., Dong, M., et al.: An energy-efficient and sink-location privacy enhanced scheme for WSNs through ring based routing. J. Parallel Distrib. Comput. 81–82(C), 47–65 (2015)Google Scholar
  9. 9.
    Baroutis, N., Younis, M.: Load-conscious maximization of base-station location privacy in wireless sensor networks. Comput. Netw. 124, 126–139 (2017)CrossRefGoogle Scholar
  10. 10.
    Rios, R., Cuellar, J., Lopez, J.: Probabilistic receiver-location privacy protection in wireless sensor networks. Elsevier Science Inc. (2015)Google Scholar
  11. 11.
    Li, Y., Ren, J.: Mixing ring-based source-location privacy in wireless sensor networks. In: IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2009, pp. 1–9. IEEE (2009)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Shenyang Jianzhu UniversityShenyangChina

Personalised recommendations