Skip to main content

Privacy Preservation of Source Location Using Phantom Nodes

  • Conference paper
  • First Online:
Information Technology: New Generations

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 448))

Abstract

Sensor networks are widely used for subject monitoring and tracking. In this modern era of wireless technology, privacy has become one of the essential concerns of wireless sensor networks. The location information of sensor nodes has to be hidden from an adversary for the sake of privacy. An adversary may trace the traffic and try to figure out the location of the source node. This can expose a significant amount of information about the subject being monitored which may be further misused by the adversary. This paper proposes 2-Phantom Angle-based Routing Scheme (2PARS) designed to improve the Source Location Privacy. The proposed scheme considers a triplet for selecting the phantom nodes. A triplet is a group of three nodes formed on the basis of their distance from the sink, their location information and the inclination angle between them. For every single packet transmission, phantom selection is performed thereby creating alternative paths. As the path changes dynamically, the safety period increases without any significant increase in the packet latency. The analysis shows that this scheme performs better in terms of safety period as compared to single phantom routing and multi-phantom routing schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Zhou, Y., Fang, Y., Zhang, Y.: Securing wireless sensor networks: a survey. IEEE Communications Surveys & Tutorials 10(3), 6–28 (2008)

    Article  Google Scholar 

  2. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Computer Networks 38(4), 393–422 (2002)

    Article  Google Scholar 

  3. Alomair, B., Clark, A., Cuellar, J., Poovendran, R.: Statistical framework for source anonymity in sensor networks. In: Global Telecommunications Conference (GLOBECOM 2010), pp. 1–6. IEEE (2010)

    Google Scholar 

  4. Kamat, P., Xu, W., Trappe, W., Zhang, Y.: Temporal privacy in wireless sensor networks. In: The 27th International Conference on Distributed Computing Systems, ICDCS 2007, p. 23. IEEE (2007)

    Google Scholar 

  5. Sheng, B., Li, Q.: Verifiable privacy-preserving range query in two-tiered sensor networks. In: The 27th Conference on Computer Communications, INFOCOM 2008. IEEE (2008)

    Google Scholar 

  6. Solove, D.J.: Understanding privacy, pp. 15–17. Harvard University Press, Cambridge (2008)

    Google Scholar 

  7. Li, N., Zhang, N., Das, S.K., Thuraisingham, B.: Privacy preservation in wireless sensor networks: A state-of-the-art survey. Ad Hoc Networks 7(8), 1501–1514 (2009)

    Article  Google Scholar 

  8. Conti, M., Willemsen, J., Crispo, B.: Providing source location privacy in wireless sensor networks: a survey. IEEE Communications Surveys & Tutorials 15(3), 1238–1280 (2013)

    Article  Google Scholar 

  9. Kamat, P., Zhang, Y., Trappe, W., Ozturk, C.: Enhancing source-location privacy in sensor network routing. In: Proceedings of the 25th IEEE International Conference on Distributed Computing Systems, ICDCS 2005, pp. 599–608. IEEE (2005)

    Google Scholar 

  10. Ozturk, C., Zhang, Y., Trappe, W.: Source-location privacy in energy-constrained sensor network routing. In: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 88–93. ACM (2004)

    Google Scholar 

  11. Yao, J., Wen, G.: Preserving source-location privacy in energy-constrained wireless sensor networks. In: 28th International Conference on Distributed Computing Systems Workshops, ICDCS 2008, pp. 412–416. IEEE (2008)

    Google Scholar 

  12. Zhang, L.: A self-adjusting directed random walk approach for enhancing source-location privacy in sensor network routing. In: Proceedings of the 2006 International Conference on Wireless Communications and Mobile Computing, pp. 33–38. ACM (2006)

    Google Scholar 

  13. Wei-Ping, W., Liang, C., Jian-Xin, W.: A source-location privacy protocol in wsn based on locational angle. In: IEEE International Conference on Communications, ICC 2008, pp. 1630–1634. IEEE (2008)

    Google Scholar 

  14. Li, Y., Lightfoot, L., Ren, J.: Routing-based source-location privacy protection in wireless sensor networks. In: IEEE International Conference on Electro/Information Technology, eit 2009, pp. 29–34. IEEE (2009)

    Google Scholar 

  15. Li, Y., Ren, J.: Preserving source-location privacy in wireless sensor networks. In: 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2009, pp. 1–9. IEEE (2009)

    Google Scholar 

  16. Spachos, P., Toumpakaris, D., Hatzinakos, D.: Angle-based dynamic routing scheme for source location privacy in wireless sensor networks. In: 2014 IEEE 79th Vehicular Technology Conference (VTC Spring), pp. 1–5. IEEE (2014)

    Google Scholar 

  17. Manjula, R., Datta, R.: An energy-efficient routing technique for privacy preservation of assets monitored with wsn. In: 2014 IEEE Students’ Technology Symposium (TechSym), pp. 325–330. IEEE (2014)

    Google Scholar 

  18. Kumar, P., Singh, J., Vishnoi, P., Singh, M.: Source location privacy using multiple-phantom nodes in wsn. In: TENCON 2015 - 2015 IEEE Region 10 Conference, pp. 1–6, November 2015

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Prabhat Kumar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Gupta, S., Kumar, P., Singh, J.P., Singh, M.P. (2016). Privacy Preservation of Source Location Using Phantom Nodes. In: Latifi, S. (eds) Information Technology: New Generations. Advances in Intelligent Systems and Computing, vol 448. Springer, Cham. https://doi.org/10.1007/978-3-319-32467-8_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-32467-8_23

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-32466-1

  • Online ISBN: 978-3-319-32467-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics