source location privacy
Recently Published Documents


TOTAL DOCUMENTS

146
(FIVE YEARS 45)

H-INDEX

19
(FIVE YEARS 5)

2021 ◽  
Author(s):  
Aaesha Alzaabi ◽  
Ayesha Aldoobi ◽  
Latifa Alserkal ◽  
Deena Alnuaimi ◽  
Mahra Alsuwaidi ◽  
...  

2021 ◽  
Vol 2021 ◽  
pp. 1-17
Author(s):  
Naveed Jan ◽  
Sarmadullah Khan ◽  
Ali H. Al-Bayatti ◽  
Madini O. Alassafi ◽  
Ahmed S. Alfakeeh ◽  
...  

Source location privacy (SLP) is a serious issue in wireless sensor networks (WSN) since Eavesdroppers tries to determine the source location. Hunting Animals in Forest is considered as an example for SLP. Many conventional schemes have been proposed for SLP in WSN, namely, Random Walk Routing, and Fake Messages Transmission, which cause critical issues (less safety period, packet delivery latency, and high energy consumption). Furthermore, the security analysis is not properly investigated in any previous work. In this paper, we propose a new model called the circular chessboard-based secure source location privacy model (C2S2-LOOP) with the following tasks: key generation, network topology management (clustering), intercluster routing (travel plan), and data packets encryption. All sensor nodes are deployed in a circular chessboard (Circular Field) and the key generation ( P U K , S E K ) is invoked using elliptic curve cryptography (ECC) with Ant Lion Optimization algorithm, which mitigate the issues of conventional ECC. Then, the network topology is managed using clustering where residual energy of the nodes is used for Cluster Head (CH) selection. Intercluster routing is implemented using packet traversing using clockwise and anticlockwise directions, which are mainly concerned with establishing a secure route between the source to the destination node. To ensure data security, we present the Chaotic Artificial Neural Network (C-ANN) in which encryption is executed. Assume that CH near to the source node has a high trust value, then it traverses (clock-wise) real packets towards sink node and similarly in the left side region (anticlockwise), fake packets are transmitted. Network simulations (OMNeT++) are evaluated and compared with the previous approaches, and finally, our proposed scheme concludes that it maintains not only source node location privacy (large safety period) and also reduces energy consumption by more than 40% and latency by more than 35%.


2021 ◽  
Author(s):  
Manjula Raja ◽  
Tejodbhav Koduru ◽  
Raja Datta

Till date source location privacy preserving techniques have aimed at fake backed or fake source approaches. Also, the work is concentrated to a single source scenarios. In this work, aim to explore the random-walk approach to mitigate passive eavesdropping attacker who backtracks to the source of information. Random-walk based solutions have proven to be effective for energy constrained WSNs. However, there is very little work that has worked for the case of multiple asset (sources) scenario till date. To understand the effect of the random-walk based solutions on level of location privacy in WSN intended IoT systems, for the multiple asset scenario, we developed two solutions. Through simulations we show the performance of the proposed two solutions by comparing them with existing random-walk based solutions. Our findings suggest that mere presence of multiple sources in the network alone does not provide location privacy, as one is intended to expect. It rather, need careful planning and designing of routing protocols to provide better privacy in presence of multiple-assets.<div>The work also presents future research direction for prospective researcher.</div>


2021 ◽  
Author(s):  
Manjula Raja ◽  
Tejodbhav Koduru ◽  
Raja Datta

Till date source location privacy preserving techniques have aimed at fake backed or fake source approaches. Also, the work is concentrated to a single source scenarios. In this work, aim to explore the random-walk approach to mitigate passive eavesdropping attacker who backtracks to the source of information. Random-walk based solutions have proven to be effective for energy constrained WSNs. However, there is very little work that has worked for the case of multiple asset (sources) scenario till date. To understand the effect of the random-walk based solutions on level of location privacy in WSN intended IoT systems, for the multiple asset scenario, we developed two solutions. Through simulations we show the performance of the proposed two solutions by comparing them with existing random-walk based solutions. Our findings suggest that mere presence of multiple sources in the network alone does not provide location privacy, as one is intended to expect. It rather, need careful planning and designing of routing protocols to provide better privacy in presence of multiple-assets.<div>The work also presents future research direction for prospective researcher.</div>


2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Huijiao Wang ◽  
Lin Wu ◽  
Qing Zhao ◽  
Yongzhuang Wei ◽  
Hua Jiang

Source location privacy, one of the core contents of Wireless Sensor Network (WSN) security, has a significant impact on extensive application of WSNs. In this paper, a novel location privacy protection routing scheme called Energy Balanced Branch Tree (EBBT) is proposed by using multibranch and fake sources. This scheme has three phases. In the first place, the data of the source are randomly sent to a certain intermediate node. Then, a minimum hop routing (MHR) from the intermediate node to the base station is formed. Then, branch paths with fake sources are generated dynamically from some nodes on the MHR path. Finally, a tree-shaped structure from real source nodes and fake source nodes to the base station is achieved. In difference to the previous schemes, the location of the real source in the EBBT scheme does not affect the location and the number of fake sources. During the formation of the tree-shaped multibranch paths, the residual energy of nodes is considered sufficiently, and the control of the direction of each branch path is also involved. The influence of the number and length of branches on the network lifetime and network security is also investigated. Experimental results show that the proposed algorithm has the advantages of long network security period and lifetime, as well as high path diversity. Our simulation further illustrates that the EBBT scheme has favorable privacy of the source location without changing the network lifetime.


Sign in / Sign up

Export Citation Format

Share Document