Source Location Privacy Using Ant Colony Optimization in Wireless Sensor Networks

Author(s):  
Jyoti Prakash Singh ◽  
Paramartha Dutta

One of the important application domain of sensor network is monitoring a region and/or tracking a target. In such type of applications, the location of the source node tracking that target is very important. At the same time, if the location of the node currently tracking the target is captured by an adversary then that target may fall into a difficult situation. In this chapter, a solution to source location privacy with the help of Ant Colony Optimization is proposed. The idea of pheromone level is normally used to find out the shortest path between the source node and the base station that to minimize the energy consumption of the networks. The pheromone level of the ants is used here to guide the ants to follow different paths to hide the source location from adversaries who uses traffic analysis to capture the source node.

2020 ◽  
pp. 1016-1034
Author(s):  
Jyoti Prakash Singh ◽  
Paramartha Dutta

One of the important application domain of sensor network is monitoring a region and/or tracking a target. In such type of applications, the location of the source node tracking that target is very important. At the same time, if the location of the node currently tracking the target is captured by an adversary then that target may fall into a difficult situation. In this chapter, a solution to source location privacy with the help of Ant Colony Optimization is proposed. The idea of pheromone level is normally used to find out the shortest path between the source node and the base station that to minimize the energy consumption of the networks. The pheromone level of the ants is used here to guide the ants to follow different paths to hide the source location from adversaries who uses traffic analysis to capture the source node.


Sensors ◽  
2019 ◽  
Vol 19 (9) ◽  
pp. 2074 ◽  
Author(s):  
Qiuhua Wang ◽  
Jiacheng Zhan ◽  
Xiaoqin Ouyang ◽  
Yizhi Ren

Wireless Sensor Networks (WSNs) have been widely deployed to monitor valuable objects. In these applications, the sensor node senses the existence of objects and transmitting data packets to the sink node (SN) in a multi hop fashion. The SN is a powerful node with high performance and is used to collect all the information sensed by the sensor nodes. Due to the open nature of the wireless medium, it is easy for an adversary to trace back along the routing path of the packets and get the location of the source node. Once adversaries have got the source node location, they can capture the monitored targets. Thus, it is important to protect the source node location privacy in WSNs. Many methods have been proposed to deal with this source location privacy protection problem, and most of them provide routing path diversity by using phantom node (PN) which is a fake source node used to entice the adversaries away from the actual source node. But in the existing schemes, the PN is determined by the source node via flooding, which not only consumes a lot of communication overhead, but also shortens the safety period of the source node. In view of the above problems, we propose two new grid-based source location privacy protection schemes in WSNs called grid-based single phantom node source location privacy protection scheme (SPS) and grid-based dual phantom node source location privacy protection scheme (DPS) in this paper. Different from the idea of determining the phantom node by the source node in the existing schemes, we propose to use powerful sink node to help the source node to determine the phantom node candidate set (PNCS), from which the source node randomly selects a phantom node acting as a fake source node. We evaluate our schemes through theoretical analysis and experiments. Experimental results show that compared with other schemes, our proposed schemes are more efficient and achieves higher security, as well as keeping lower total energy consumption. Our proposed schemes can protect the location privacy of the source node even in resource-constrained wireless network environments.


Sensors ◽  
2019 ◽  
Vol 19 (9) ◽  
pp. 2050 ◽  
Author(s):  
Naveed Jan ◽  
Ali Al-Bayatti ◽  
Naseer Alalwan ◽  
Ahmed Alzahrani

Wireless Sensor Network is a network of large number of nodes with limited power and computational capabilities. It has the potential of event monitoring in unattended locations where there is a chance of unauthorized access. The work that is presented here identifies and addresses the problem of eavesdropping in the exposed environment of the sensor network, which makes it easy for the adversary to trace the packets to find the originator source node, hence compromising the contextual privacy. Our scheme provides an enhanced three-level security system for source location privacy. The base station is at the center of square grid of four quadrants and it is surrounded by a ring of flooding nodes, which act as a first step in confusing the adversary. The fake node is deployed in the opposite quadrant of actual source and start reporting base station. The selection of phantom node using our algorithm in another quadrant provides the third level of confusion. The results show that Dissemination in Wireless Sensor Networks (DeLP) has reduced the energy utilization by 50% percent, increased the safety period by 26%, while providing a six times more packet delivery ratio along with a further 15% decrease in the packet delivery delay as compared to the tree-based scheme. It also provides 334% more safety period than the phantom routing, while it lags behind in other parameters due to the simplicity of phantom scheme. This work illustrates the privacy protection of the source node and the designed procedure may be useful in designing more robust algorithms for location privacy.


Sensors ◽  
2018 ◽  
Vol 18 (7) ◽  
pp. 2291 ◽  
Author(s):  
Lilian Mutalemwa ◽  
Seokjoo Shin

Wireless sensor networks (WSNs) are deployed in sensitive applications, such as in military and asset monitoring. In these applications, it is important to ensure good source location privacy. This is owing to the open nature of WSNs and the easiness of an adversary to eavesdrop on sensor communication and back trace the location of the source node. This paper proposes a scheme to preserve the source location privacy based on random routing techniques. To achieve high privacy, packets are randomly routed from the source to the sink node through strategically positioned mediate or diversion nodes. The random selection of mediate or diversion nodes is location-based. Depending on the location of the source node, packets are forwarded through different regions of the network. The proposed scheme guarantees that successive packets are routed through very different routing paths and adversaries find it confusing to back trace them to the source node location. Simulation results demonstrate that the proposed scheme effectively confuses the adversary and provides higher source location privacy to outperform other routing-based source location privacy schemes.


Sign in / Sign up

Export Citation Format

Share Document