Abstract
Source location privacy (SLP) in wireless sensor networks (WSN) intends to protect the location privacy of monitoring objects, as the resources of WSN are limited, the essence of the SLP is to balance the security and energy-cost. Among the existing solutions, the scheme based on random walk (DROW) is most attractive. However, DROW didn’t consider the balance of each node’s energy consumption and the safety period is unstable. What’s more, it didn’t change the data flow either. To solve these problems, in this paper, we put forward an energy-aware location privacy routing protocol which consists of two parts: non-repeat polling routing protocol and strategy of fake messages based on energy-aware. On the premise of not influence the network lifetime seriously, we make full use of the high-energy nodes, strength the security of the network and change the data flow. Simulation results verify that we can provide higher stability as the variance of our protocol is only about one over forty of that based on random-walk. Meanwhile, more nodes participate in packets transmission so the energy consumption is balanced and safety period is extended by 20 % to 30 %.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ozturk, C., Zhang, Y., Trappe, W.: Source-location privacy in energy-constrained sensor network routing. In: ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN 2004, Washington, DC, USA, October 2004, pp. 88–93 (2004)
Kamat, P., Zhang, Y., Trappe, W., Ozturk, C.: Enhancing source-location privacy in sensor network routing. In: 25th IEEE International Conference on Distributed Computing Systems (ICDCS 2005), Columbus, OH, pp. 599–608 (2005)
Conti, M., Willemsen, J., Crispo, B.: Providing source location privacy in wireless sensor networks: a survey. IEEE Commun. Surv. Tutor. 15(3), 1238–1280 (2013)
Ozturk, C., et al.: Source-location privacy for networks of energy-constrained sensors. In: Proceedings. Second IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems, pp. 68–68 (2004)
Li, Y., Lightfoot, L., Ren, J.: Routing-based source-location privacy protection in wireless sensor networks. In: IEEE International Conference on Electro/Information Technology, pp. 29–34 (2009)
Yao, J., Wen, G.: Preserving source-location privacy in energy-constrained wireless sensor networks. In: International Conference on Distributed Computing Systems Workshops IEEE, pp. 412–416 (2008)
Ouyang, Y., et al.: Entrapping adversaries for source protection in sensor networks. In: International Symposium on a World of Wireless, Mobile and Multimedia Networks, pp. 23–34 (2006)
Chen, H., Lou, W.: From nowhere to somewhere: protecting end-to-end location privacy in wireless sensor networks. In: IEEE International Performance Computing & Communications Conference, pp. 1–8 (2010)
Long, J., et al.: Achieving source location privacy and network lifetime maximization through tree-based diversionary routing in wireless sensor networks. IEEE Access 2(10), 633–651 (2014)
Chang, H.Y., Huang, S.C.: Contention-free station communication matching algorithm in multi-hop power management for wireless ad-hoc networks. Int. J. Grid High Perform. Comput. 7(1), 52–66 (2015)
Acknowledgments
This work is supported by NSFC (Grant Nos. 61300181, 61502044), the Fundamental Research Funds for the Central Universities (Grant No. 2015RC23).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Zhang, J., Jin, Z. (2016). Energy-Aware Location Privacy Routing for Wireless Sensor Networks. In: Wang, G., Ray, I., Alcaraz Calero, J., Thampi, S. (eds) Security, Privacy and Anonymity in Computation, Communication and Storage. SpaCCS 2016. Lecture Notes in Computer Science(), vol 10067. Springer, Cham. https://doi.org/10.1007/978-3-319-49145-5_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-49145-5_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-49144-8
Online ISBN: 978-3-319-49145-5
eBook Packages: Computer ScienceComputer Science (R0)