Abstract
Sensor networks are widely used for subject monitoring and tracking. In this modern era of wireless technology, privacy has become one of the essential concerns of wireless sensor networks. The location information of sensor nodes has to be hidden from an adversary for the sake of privacy. An adversary may trace the traffic and try to figure out the location of the source node. This can expose a significant amount of information about the subject being monitored which may be further misused by the adversary. This paper proposes 2-Phantom Angle-based Routing Scheme (2PARS) designed to improve the Source Location Privacy. The proposed scheme considers a triplet for selecting the phantom nodes. A triplet is a group of three nodes formed on the basis of their distance from the sink, their location information and the inclination angle between them. For every single packet transmission, phantom selection is performed thereby creating alternative paths. As the path changes dynamically, the safety period increases without any significant increase in the packet latency. The analysis shows that this scheme performs better in terms of safety period as compared to single phantom routing and multi-phantom routing schemes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Zhou, Y., Fang, Y., Zhang, Y.: Securing wireless sensor networks: a survey. IEEE Communications Surveys & Tutorials 10(3), 6–28 (2008)
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Computer Networks 38(4), 393–422 (2002)
Alomair, B., Clark, A., Cuellar, J., Poovendran, R.: Statistical framework for source anonymity in sensor networks. In: Global Telecommunications Conference (GLOBECOM 2010), pp. 1–6. IEEE (2010)
Kamat, P., Xu, W., Trappe, W., Zhang, Y.: Temporal privacy in wireless sensor networks. In: The 27th International Conference on Distributed Computing Systems, ICDCS 2007, p. 23. IEEE (2007)
Sheng, B., Li, Q.: Verifiable privacy-preserving range query in two-tiered sensor networks. In: The 27th Conference on Computer Communications, INFOCOM 2008. IEEE (2008)
Solove, D.J.: Understanding privacy, pp. 15–17. Harvard University Press, Cambridge (2008)
Li, N., Zhang, N., Das, S.K., Thuraisingham, B.: Privacy preservation in wireless sensor networks: A state-of-the-art survey. Ad Hoc Networks 7(8), 1501–1514 (2009)
Conti, M., Willemsen, J., Crispo, B.: Providing source location privacy in wireless sensor networks: a survey. IEEE Communications Surveys & Tutorials 15(3), 1238–1280 (2013)
Kamat, P., Zhang, Y., Trappe, W., Ozturk, C.: Enhancing source-location privacy in sensor network routing. In: Proceedings of the 25th IEEE International Conference on Distributed Computing Systems, ICDCS 2005, pp. 599–608. IEEE (2005)
Ozturk, C., Zhang, Y., Trappe, W.: Source-location privacy in energy-constrained sensor network routing. In: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 88–93. ACM (2004)
Yao, J., Wen, G.: Preserving source-location privacy in energy-constrained wireless sensor networks. In: 28th International Conference on Distributed Computing Systems Workshops, ICDCS 2008, pp. 412–416. IEEE (2008)
Zhang, L.: A self-adjusting directed random walk approach for enhancing source-location privacy in sensor network routing. In: Proceedings of the 2006 International Conference on Wireless Communications and Mobile Computing, pp. 33–38. ACM (2006)
Wei-Ping, W., Liang, C., Jian-Xin, W.: A source-location privacy protocol in wsn based on locational angle. In: IEEE International Conference on Communications, ICC 2008, pp. 1630–1634. IEEE (2008)
Li, Y., Lightfoot, L., Ren, J.: Routing-based source-location privacy protection in wireless sensor networks. In: IEEE International Conference on Electro/Information Technology, eit 2009, pp. 29–34. IEEE (2009)
Li, Y., Ren, J.: Preserving source-location privacy in wireless sensor networks. In: 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2009, pp. 1–9. IEEE (2009)
Spachos, P., Toumpakaris, D., Hatzinakos, D.: Angle-based dynamic routing scheme for source location privacy in wireless sensor networks. In: 2014 IEEE 79th Vehicular Technology Conference (VTC Spring), pp. 1–5. IEEE (2014)
Manjula, R., Datta, R.: An energy-efficient routing technique for privacy preservation of assets monitored with wsn. In: 2014 IEEE Students’ Technology Symposium (TechSym), pp. 325–330. IEEE (2014)
Kumar, P., Singh, J., Vishnoi, P., Singh, M.: Source location privacy using multiple-phantom nodes in wsn. In: TENCON 2015 - 2015 IEEE Region 10 Conference, pp. 1–6, November 2015
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Gupta, S., Kumar, P., Singh, J.P., Singh, M.P. (2016). Privacy Preservation of Source Location Using Phantom Nodes. In: Latifi, S. (eds) Information Technology: New Generations. Advances in Intelligent Systems and Computing, vol 448. Springer, Cham. https://doi.org/10.1007/978-3-319-32467-8_23
Download citation
DOI: https://doi.org/10.1007/978-3-319-32467-8_23
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-32466-1
Online ISBN: 978-3-319-32467-8
eBook Packages: EngineeringEngineering (R0)