Skip to main content

Location Privacy Protection for Sink Node in WSN Based on K Anonymous False Packets Injection

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 950))

Abstract

In wireless sensor networks, the convergence node (sink node) is the center of the network, all network data will be transmitted to the sink node, it will process and extract effective information, which leads to the uneven distribution of traffic. An external attacker who can monitor traffic will find the location of the convergent node and attack it according to this feature. In order to protect the location of the sink node in the wireless sensor network, a privacy protection protocol based on K anonymous false packet injection (KAFP) is proposed. The protocol randomly generates K false sink nodes, transmits real data to the sink node and transmits false data to the false sink node. By hiding the location of the sink node, the security time is increased. Theoretical analysis and simulation experiment results show that KAFP can protect privacy of convergent nodes at lower energy consumption when the value of K is properly selected.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Ren, F.Y., Huang, H.N., Lin, C.: Wireless sensor networks. J. Softw. 14(7), 1282–1291 (2003). (in Chinese with English abstract)

    MATH  Google Scholar 

  2. Fan, Y.J., Chen, H., Zhang, X.Y.: Data privacy preservation in wireless sensor networks. Chin. J. Comput. 35(6), 1132–1147 (2012)

    Article  MathSciNet  Google Scholar 

  3. Peng, H., Chen, H., Zhang, X.Y.: Location privacy preservation in wireless sensor networks. J. Softw. 26(3), 617–639 (2015)

    Google Scholar 

  4. Qian, P., Wu, M.: Survey on privacy preservation in IoT. Appl. Res. Comput. 30(1), 14–21 (2013)

    Google Scholar 

  5. Wang, S.: Location privacy protection in wireless sensor networks. Central South University, HuNan (2009)

    Google Scholar 

  6. Deng, J., Han, R., Mishra, S.: Intrusion tolerance and anti traffic analysis strategies for wireless sensor networks. IEEE Comput. Soc. 32(5), 637–646 (2004)

    Google Scholar 

  7. Jian, Y., Chen, S.G., Zhang, Z., et al.: A novel scheme for protecting receiver’s location privacy in wireless sensor networks. IEEE Trans. Wirel. Commun. 7(10), 3769–3779 (2008)

    Article  Google Scholar 

  8. Deng, J., Han, R., Mishra, S.: Countermeasures against traffic analysis attacks in wireless sensor networks. In: First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Washington, DC, USA, pp. 113–126 (2005)

    Google Scholar 

  9. Deng, J., Han, R., Mishra, S.: Decorrelating wireless sensor network to inhibit traffic analysis attacks. Pervasive Mob. Comput. 2(2), 159–186 (2005)

    Article  Google Scholar 

  10. Zhang, K.: Research on sink-location privacy protection in wireless sensor networks. Anhun University (2014)

    Google Scholar 

  11. Chen H.L., Lou, W.: From nowhere to somewhere: protecting end-to-end location privacy in wireless sensor networks. In: Performance Computing and Communications Conference, Albuquerque, New Mexico, USA, pp. 1–8 (2010)

    Google Scholar 

  12. Li, Z.: An energy-efficient and preserving sink-location privacy scheme for WSNs. Central South University, HuNan (2012)

    Google Scholar 

  13. Nezhad, A.A., Makrakis, D., Miri, A.: Anonymous topology discovery for multi-hop wireless sensor networks. In: Proceedings of the 3rd ACM Workshop on Qos and Security for Wireless and Mobile Networks, New York, USA, pp. 78–85 (2007)

    Google Scholar 

  14. Yang, Y., Shao, M., Zhu, S., et al.: Towards statistically strong source anonymity for sensor networks. ACM Trans. Sens. Netw. 9(3), 34 (2013)

    Article  Google Scholar 

  15. Li, P.Y., Zhang, Z.X.: Protocol algorithm design of location privacy preserving for Sink node based on security area. J. Syst. Simul. 27(12), 2973–2980 (2015)

    Google Scholar 

Download references

Acknowledgments

This work is supported by the National Natural Science Foundation of China (nos. 61762030).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ling Song .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Song, L., Ma, W., Ye, J. (2018). Location Privacy Protection for Sink Node in WSN Based on K Anonymous False Packets Injection. In: Chen, Q., Wu, J., Zhang, S., Yuan, C., Batten, L., Li, G. (eds) Applications and Techniques in Information Security. ATIS 2018. Communications in Computer and Information Science, vol 950. Springer, Singapore. https://doi.org/10.1007/978-981-13-2907-4_6

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-2907-4_6

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-2906-7

  • Online ISBN: 978-981-13-2907-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics