Achieving Source Location Privacy and Network Lifetime Maximization Through Tree-Based Diversionary Routing in Wireless Sensor Networks
Wireless sensor networks (WSNs) have been proliferating due to their wide applications in both military and commercial use. However, one critical challenge to WSNs implementation is source location privacy. In this paper, we propose a novel tree-based diversionary routing scheme for preserving sourc...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2014-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/6842655/ |
id |
doaj-0d026be07c61475fb8935f23226f56be |
---|---|
record_format |
Article |
spelling |
doaj-0d026be07c61475fb8935f23226f56be2021-03-29T19:30:49ZengIEEEIEEE Access2169-35362014-01-01263365110.1109/ACCESS.2014.23328176842655Achieving Source Location Privacy and Network Lifetime Maximization Through Tree-Based Diversionary Routing in Wireless Sensor NetworksJun Long0Mianxiong Dong1Kaoru Ota2Anfeng Liu3School of Information Science and Engineering, Central South University, Changsha, China National Institute of Information and Communications Technology, Tokyo, Japan Muroran Institute of Technology, Muroran, JapanSchool of Information Science and Engineering, Central South University, Changsha, ChinaWireless sensor networks (WSNs) have been proliferating due to their wide applications in both military and commercial use. However, one critical challenge to WSNs implementation is source location privacy. In this paper, we propose a novel tree-based diversionary routing scheme for preserving source location privacy using hide and seek strategy to create diversionary or decoy routes along the path to the sink from the real source, where the end of each diversionary route is a decoy (fake source node), which periodically emits fake events. Meanwhile, the proposed scheme is able to maximize the network lifetime of WSNs. The main idea is that the lifetime of WSNs depends on the nodes with high energy consumption or hotspot, and then the proposed scheme minimizes energy consumption in hotspot and creates redundancy diversionary routes in nonhotspot regions with abundant energy. Hence, it achieves not only privacy preservation, but also network lifetime maximization. Furthermore, we systematically analyze the energy consumption in WSNs, and provide guidance on the number of diversionary routes, which can be created in different regions away from the sink. In addition, we identify a novel attack against phantom routing, which is widely used for source location privacy preservation, namely, direction-oriented attack. We also perform a comprehensive analysis on how the direction-oriented attack can be defeated by the proposed scheme. Theoretical and experimental results show that our scheme is very effective to improve the privacy protection while maximizing the network lifetime.https://ieeexplore.ieee.org/document/6842655/wireless sensor networkssource location privacynetwork lifetime |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Jun Long Mianxiong Dong Kaoru Ota Anfeng Liu |
spellingShingle |
Jun Long Mianxiong Dong Kaoru Ota Anfeng Liu Achieving Source Location Privacy and Network Lifetime Maximization Through Tree-Based Diversionary Routing in Wireless Sensor Networks IEEE Access wireless sensor networks source location privacy network lifetime |
author_facet |
Jun Long Mianxiong Dong Kaoru Ota Anfeng Liu |
author_sort |
Jun Long |
title |
Achieving Source Location Privacy and Network Lifetime Maximization Through Tree-Based Diversionary Routing in Wireless Sensor Networks |
title_short |
Achieving Source Location Privacy and Network Lifetime Maximization Through Tree-Based Diversionary Routing in Wireless Sensor Networks |
title_full |
Achieving Source Location Privacy and Network Lifetime Maximization Through Tree-Based Diversionary Routing in Wireless Sensor Networks |
title_fullStr |
Achieving Source Location Privacy and Network Lifetime Maximization Through Tree-Based Diversionary Routing in Wireless Sensor Networks |
title_full_unstemmed |
Achieving Source Location Privacy and Network Lifetime Maximization Through Tree-Based Diversionary Routing in Wireless Sensor Networks |
title_sort |
achieving source location privacy and network lifetime maximization through tree-based diversionary routing in wireless sensor networks |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2014-01-01 |
description |
Wireless sensor networks (WSNs) have been proliferating due to their wide applications in both military and commercial use. However, one critical challenge to WSNs implementation is source location privacy. In this paper, we propose a novel tree-based diversionary routing scheme for preserving source location privacy using hide and seek strategy to create diversionary or decoy routes along the path to the sink from the real source, where the end of each diversionary route is a decoy (fake source node), which periodically emits fake events. Meanwhile, the proposed scheme is able to maximize the network lifetime of WSNs. The main idea is that the lifetime of WSNs depends on the nodes with high energy consumption or hotspot, and then the proposed scheme minimizes energy consumption in hotspot and creates redundancy diversionary routes in nonhotspot regions with abundant energy. Hence, it achieves not only privacy preservation, but also network lifetime maximization. Furthermore, we systematically analyze the energy consumption in WSNs, and provide guidance on the number of diversionary routes, which can be created in different regions away from the sink. In addition, we identify a novel attack against phantom routing, which is widely used for source location privacy preservation, namely, direction-oriented attack. We also perform a comprehensive analysis on how the direction-oriented attack can be defeated by the proposed scheme. Theoretical and experimental results show that our scheme is very effective to improve the privacy protection while maximizing the network lifetime. |
topic |
wireless sensor networks source location privacy network lifetime |
url |
https://ieeexplore.ieee.org/document/6842655/ |
work_keys_str_mv |
AT junlong achievingsourcelocationprivacyandnetworklifetimemaximizationthroughtreebaseddiversionaryroutinginwirelesssensornetworks AT mianxiongdong achievingsourcelocationprivacyandnetworklifetimemaximizationthroughtreebaseddiversionaryroutinginwirelesssensornetworks AT kaoruota achievingsourcelocationprivacyandnetworklifetimemaximizationthroughtreebaseddiversionaryroutinginwirelesssensornetworks AT anfengliu achievingsourcelocationprivacyandnetworklifetimemaximizationthroughtreebaseddiversionaryroutinginwirelesssensornetworks |
_version_ |
1724196004573478912 |