Hiding the Source Based on Limited Flooding for Sensor Networks

Wireless sensor networks are widely used to monitor valuable objects such as rare animals or armies. Once an object is detected, the source, i.e., the sensor nearest to the object, generates and periodically sends a packet about the object to the base station. Since attackers can capture the object...

Full description

Bibliographic Details
Main Authors: Juan Chen, Zhengkui Lin, Ying Hu, Bailing Wang
Format: Article
Language:English
Published: MDPI AG 2015-11-01
Series:Sensors
Subjects:
Online Access:http://www.mdpi.com/1424-8220/15/11/29129
id doaj-3816aea413cf4d4da7d447223ef5a5b3
record_format Article
spelling doaj-3816aea413cf4d4da7d447223ef5a5b32020-11-25T00:49:06ZengMDPI AGSensors1424-82202015-11-011511291292914810.3390/s151129129s151129129Hiding the Source Based on Limited Flooding for Sensor NetworksJuan Chen0Zhengkui Lin1Ying Hu2Bailing Wang3Department of Information Science and Technology, Dalian Maritime University, Dalian 116026, ChinaDepartment of Information Science and Technology, Dalian Maritime University, Dalian 116026, ChinaDepartment of Information Science and Technology, Dalian Maritime University, Dalian 116026, ChinaDepartment of Computer Science, Harbin Institute of Technology, Weihai 264209, ChinaWireless sensor networks are widely used to monitor valuable objects such as rare animals or armies. Once an object is detected, the source, i.e., the sensor nearest to the object, generates and periodically sends a packet about the object to the base station. Since attackers can capture the object by localizing the source, many protocols have been proposed to protect source location. Instead of transmitting the packet to the base station directly, typical source location protection protocols first transmit packets randomly for a few hops to a phantom location, and then forward the packets to the base station. The problem with these protocols is that the generated phantom locations are usually not only near the true source but also close to each other. As a result, attackers can easily trace a route back to the source from the phantom locations. To address the above problem, we propose a new protocol for source location protection based on limited flooding, named SLP. Compared with existing protocols, SLP can generate phantom locations that are not only far away from the source, but also widely distributed. It improves source location security significantly with low communication cost. We further propose a protocol, namely SLP-E, to protect source location against more powerful attackers with wider fields of vision. The performance of our SLP and SLP-E are validated by both theoretical analysis and simulation results.http://www.mdpi.com/1424-8220/15/11/29129wireless sensors networkinternet of thingssource locationprivacy protectionsecurity
collection DOAJ
language English
format Article
sources DOAJ
author Juan Chen
Zhengkui Lin
Ying Hu
Bailing Wang
spellingShingle Juan Chen
Zhengkui Lin
Ying Hu
Bailing Wang
Hiding the Source Based on Limited Flooding for Sensor Networks
Sensors
wireless sensors network
internet of things
source location
privacy protection
security
author_facet Juan Chen
Zhengkui Lin
Ying Hu
Bailing Wang
author_sort Juan Chen
title Hiding the Source Based on Limited Flooding for Sensor Networks
title_short Hiding the Source Based on Limited Flooding for Sensor Networks
title_full Hiding the Source Based on Limited Flooding for Sensor Networks
title_fullStr Hiding the Source Based on Limited Flooding for Sensor Networks
title_full_unstemmed Hiding the Source Based on Limited Flooding for Sensor Networks
title_sort hiding the source based on limited flooding for sensor networks
publisher MDPI AG
series Sensors
issn 1424-8220
publishDate 2015-11-01
description Wireless sensor networks are widely used to monitor valuable objects such as rare animals or armies. Once an object is detected, the source, i.e., the sensor nearest to the object, generates and periodically sends a packet about the object to the base station. Since attackers can capture the object by localizing the source, many protocols have been proposed to protect source location. Instead of transmitting the packet to the base station directly, typical source location protection protocols first transmit packets randomly for a few hops to a phantom location, and then forward the packets to the base station. The problem with these protocols is that the generated phantom locations are usually not only near the true source but also close to each other. As a result, attackers can easily trace a route back to the source from the phantom locations. To address the above problem, we propose a new protocol for source location protection based on limited flooding, named SLP. Compared with existing protocols, SLP can generate phantom locations that are not only far away from the source, but also widely distributed. It improves source location security significantly with low communication cost. We further propose a protocol, namely SLP-E, to protect source location against more powerful attackers with wider fields of vision. The performance of our SLP and SLP-E are validated by both theoretical analysis and simulation results.
topic wireless sensors network
internet of things
source location
privacy protection
security
url http://www.mdpi.com/1424-8220/15/11/29129
work_keys_str_mv AT juanchen hidingthesourcebasedonlimitedfloodingforsensornetworks
AT zhengkuilin hidingthesourcebasedonlimitedfloodingforsensornetworks
AT yinghu hidingthesourcebasedonlimitedfloodingforsensornetworks
AT bailingwang hidingthesourcebasedonlimitedfloodingforsensornetworks
_version_ 1725252989551116288