Skip to main content

Advertisement

Log in

An efficient ACO-inspired multi-path routing for source location privacy with dynamic phantom node selection scheme in IoT environments

  • Optimization
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

The rapid growth in the smart era of Internet of Things (IoT) relies on the various applications that lead to the design wide range of routing protocols utilizing Machine learning techniques. Third party interference in the open network to perform malicious activities by using location information of the node is high. Many researchers have designed a wide range of protocols to improve security and energy efficiency but the dynamic nature of the Internet of Things suppressed the performance of those algorithms. This may lead to data drop, node death, delay, less network lifetime, and increased third party malicious activities. In this paper, a novel routing mechanism is developed to preserve source location privacy and prevent adversaries from doing backtracking attacks and traffic analysis for energy preservation. The proposed model consists of two key functions Node/Network Condition based Dynamic Phantom Node selection (NCDPNS) and Ant colony optimization Algorithm Aided Multi-Path based Routing (ACOMPR). Here, NCDPNS selects the phantom node based on the node/network conditions like node availability, link availability, node energy level, distance from other nodes in the network, and number of neighboring hops to preserve the location privacy. ACOMPR selects the path based on the ant colony optimization algorithm to choose more than one path for data transmission with very less common resources shared among multiple paths between the source and destination for energy efficient data transmission. The proposed mechanism is achieving the source location privacy at the first stage and energy efficient routing at the second stage. The proposed mechanism is implemented using a Network Simulator-2 (NS2) simulator with predefined network parameters. The results depict that it achieves high throughput, less delay, increased network lifetime, and low energy dissipation for data transmission by preserving the location of the node. The dynamic nature of the IoT is considered in the proposed work to make it more suitable for real-time applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Algorithm 1
Fig. 4
Algorithm 2
Algorithm 3
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

Data availability

Data sharing is not applicable to this article as no datasets were generated or analyzed during the current study.

References

  • Arpitha T, Chouhan D, Shreyas J (2024) Anonymous and robust biometric authentication scheme for secure social IoT healthcare applications. J Eng Appl Sci 71:8. https://doi.org/10.1186/s44147-023-00342-1

    Article  Google Scholar 

  • Akshatha P, Kumar SD (2023) MQTT and blockchain sharding: an approach to user-controlled data access with improved security and efficiency. Blockchain Res Appl 4:100158. https://doi.org/10.1016/j.bcra.2023.100158

    Article  Google Scholar 

  • Bradbury M, Jhumka A (2017a) A near-optimal source location privacy scheme for wireless sensor networks. In: 2017 IEEE Trustcom/BigDataSE/ICESS. IEEE, Sydney, pp 409–416

  • Bradbury M, Jhumka A (2017b) Understanding source location privacy protocols in sensor networks via perturbation of time series. In: IEEE INFOCOM 2017-IEEE conference on computer communications. IEEE, Atlanta, pp 1–9

  • Bradbury M, Jhumka A, Leeke M (2018) Hybrid online protocols for source location privacy in wireless sensor networks. J Parallel Distrib Comput 115:67–81. https://doi.org/10.1016/j.jpdc.2018.01.006

    Article  Google Scholar 

  • Chen W, Zhang M, Hu G, Tang X, Sangaiah AK (2017) Constrained random routing mechanism for source privacy protection in WSNs. IEEE Access 5:23171–23181

    Article  Google Scholar 

  • Chen Y, Sun J, Yang Y, Li T, Niu X, Zhou H (2022) PSSPR: a source location privacy protection scheme based on sector phantom routing in WSNs. Int J Intell Syst 123:1204–1221. https://doi.org/10.1002/int.22666

    Article  Google Scholar 

  • Gu C, Bradbury M, Jhumka A, Leeke M (2015) Assessing the performance of phantom routing on source location privacy in wireless sensor networks. In: 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, Zhangjiajie, pp 99–108

  • Gharat N, Jolly L (2023) Source location privacy protection algorithms in IoT networks: a survey. In: International conference on soft computing for security applications. Springer, Salem, pp 793–812. https://doi.org/10.1007/978-981-99-3608-3_55

  • Gupta S, Kumar P, Singh J, Singh M (2016) Privacy preservation of source location using phantom nodes. In: Information Technology: New Generations: 13th International Conference on Information Technology. Springer, Las Vegas, pp 247–256

  • Han G, Xia R, Wang H, Li A (2023) Source location privacy protection algorithm based on polyhedral phantom routing in underwater acoustic sensor networks. IEEE Internet Things J 11:8459–8472. https://doi.org/10.1109/JIOT.2023.3318567

    Article  Google Scholar 

  • Hussain T, Yang B, Rahman HU, Iqbal A, Ali F et al (2022) Improving source location privacy in social internet of things using a hybrid phantom routing technique. Comput Secur 123:102917. https://doi.org/10.1016/j.cose.2022.102917

    Article  Google Scholar 

  • Kumar RP, Singh JP, Kumar Prabhat SM (2015) Source location privacy using fake source and phantom routing (FSAPR) technique in wireless sensor networks. Procedia Comput Sci 57:936–941. https://doi.org/10.1016/j.procs.2015.07.486

    Article  Google Scholar 

  • Kamat P, Zhang Y, Trappe W, Ozturk C (2005) Enhancing source-location privacy in sensor network routing. In: 25th IEEE International Conference on Distributed Computing Systems (ICDCS’05). IEEE, Columbus, pp 599–608

  • Li Y, Ren J (2009) Preserving source-location privacy in wireless sensor networks. In: 2009 6th annual IEEE Communications Society conference on sensor, mesh and ad hoc communications and networks. IEEE, San Francisco, pp 1–9

  • Li Y, Ren J (2010) Source-location privacy through dynamic routing in wireless sensor networks. In: 2010 Proceedings IEEE INFOCOM. IEEE, San Diego, pp 1–9

  • Manjula R, Koduru T, Datta R (2021) Protecting source location privacy in IoT-enabled wireless sensor networks: the case of multiple assets. IEEE Internet Things J 9(13):10807–10820

    Article  Google Scholar 

  • Mutalemwa LC, Shin S (2018a) Strategic location-based random routing for source location privacy in wireless sensor networks. Sensors 18:2291. https://doi.org/10.3390/s18072291

  • Mutalemwa LC, Shin S (2018b) Routing schemes for source location privacy in wireless sensor networks: a survey. J Korean Inst Commun Inf Sci 43:1429–1445. https://doi.org/10.7840/kics.2018.43.9.1429

  • Mutalemwa LC, Shin S (2019) Achieving source location privacy protection in monitoring wireless sensor networks through proxy node routing. Sensors 19:1037. https://doi.org/10.3390/s19051037

    Article  Google Scholar 

  • Mutalemwa LC, Shin S (2021) Protecting source location privacy in IoT-enabled wireless sensor networks: the case of multiple assets. IEEE Access 9:104820–104836

    Article  Google Scholar 

  • Ozturk C, Zhang Y, Trappe W (2004) Source-location privacy in energy-constrained sensor network routing. In: Proceedings of the 2nd ACM workshop on security of ad hoc and sensor networks. Association for Computing Machinery, pp 88–93

  • Ren J, Li Y, Li T (2009) Routing-based source-location privacy in wireless sensor networks. In: 2009 IEEE International Conference on Communications. IEEE, Dresden, pp 1–5

  • Sunitha R, Chandrikab J (2020) Evolutionary computing assisted wireless sensor network mining for QoS-centric and energy-efficient routing protocol. Int J Eng 33:791–797. https://doi.org/10.5829/ije.2020.33.05b.10

    Article  Google Scholar 

  • Spachos P, Toumpakaris D, Hatzinakos D (2014) Angle-based dynamic routing scheme for source location privacy in wireless sensor networks. In: 2014 IEEE 79th Vehicular Technology Conference (VTC Spring). IEEE, Seoul, pp 1–5

  • Thomason A, Leeke M, Bradbury M, Jhumka A (2013) Evaluating the impact of broadcast rates and collisions on fake source protocols for source location privacy. In: 2013 12th IEEE international conference on trust, security and privacy in computing and communications. IEEE, Melbourne, pp 667–674

  • Wang N, Zeng J (2017) All-direction random routing for source-location privacy protecting against parasitic sensor networks. Sensors 17:614. https://doi.org/10.3390/s17030614

    Article  Google Scholar 

  • Wang W-P, Chen L, Wang J-X (2008) A source-location privacy protocol in WSN based on locational angle. In: 2008 IEEE international conference on communications. IEEE, Beijing, pp 1630–1634

  • Zhou J, Zhang X, Jiang Z (2021) Recognition of imbalanced epileptic EEG signals by a graph-based extreme learning machine. Wirel Commun Mob Comput 2021:1–12. https://doi.org/10.1155/2021/5871684

    Article  Google Scholar 

Download references

Acknowledgements

The authors thank the Editor and reviewers for their insightful comments to improve the manuscript.

Funding

No funding is available for this research.

Author information

Authors and Affiliations

Authors

Contributions

Arpitha T* (Corresponding Author): Conception and design of study, Implementation, Acquisition of data, Analysis, and/or interpretation of data, Writing-original draft. Dharamendra Chouhan: Guidance, Reviewing and editing the paper. Shreyas J: Reviewing and editing the paper.

Corresponding author

Correspondence to T. Arpitha.

Ethics declarations

Conflict of interest

The authors do not have any Conflict of interest with this article.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Arpitha, T., Chouhan, D. & Shreyas, J. An efficient ACO-inspired multi-path routing for source location privacy with dynamic phantom node selection scheme in IoT environments. Soft Comput 28, 13149–13166 (2024). https://doi.org/10.1007/s00500-024-10376-z

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-024-10376-z

Keywords

Navigation