Abstract
The rapid growth in the smart era of Internet of Things (IoT) relies on the various applications that lead to the design wide range of routing protocols utilizing Machine learning techniques. Third party interference in the open network to perform malicious activities by using location information of the node is high. Many researchers have designed a wide range of protocols to improve security and energy efficiency but the dynamic nature of the Internet of Things suppressed the performance of those algorithms. This may lead to data drop, node death, delay, less network lifetime, and increased third party malicious activities. In this paper, a novel routing mechanism is developed to preserve source location privacy and prevent adversaries from doing backtracking attacks and traffic analysis for energy preservation. The proposed model consists of two key functions Node/Network Condition based Dynamic Phantom Node selection (NCDPNS) and Ant colony optimization Algorithm Aided Multi-Path based Routing (ACOMPR). Here, NCDPNS selects the phantom node based on the node/network conditions like node availability, link availability, node energy level, distance from other nodes in the network, and number of neighboring hops to preserve the location privacy. ACOMPR selects the path based on the ant colony optimization algorithm to choose more than one path for data transmission with very less common resources shared among multiple paths between the source and destination for energy efficient data transmission. The proposed mechanism is achieving the source location privacy at the first stage and energy efficient routing at the second stage. The proposed mechanism is implemented using a Network Simulator-2 (NS2) simulator with predefined network parameters. The results depict that it achieves high throughput, less delay, increased network lifetime, and low energy dissipation for data transmission by preserving the location of the node. The dynamic nature of the IoT is considered in the proposed work to make it more suitable for real-time applications.












Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Data availability
Data sharing is not applicable to this article as no datasets were generated or analyzed during the current study.
References
Arpitha T, Chouhan D, Shreyas J (2024) Anonymous and robust biometric authentication scheme for secure social IoT healthcare applications. J Eng Appl Sci 71:8. https://doi.org/10.1186/s44147-023-00342-1
Akshatha P, Kumar SD (2023) MQTT and blockchain sharding: an approach to user-controlled data access with improved security and efficiency. Blockchain Res Appl 4:100158. https://doi.org/10.1016/j.bcra.2023.100158
Bradbury M, Jhumka A (2017a) A near-optimal source location privacy scheme for wireless sensor networks. In: 2017 IEEE Trustcom/BigDataSE/ICESS. IEEE, Sydney, pp 409–416
Bradbury M, Jhumka A (2017b) Understanding source location privacy protocols in sensor networks via perturbation of time series. In: IEEE INFOCOM 2017-IEEE conference on computer communications. IEEE, Atlanta, pp 1–9
Bradbury M, Jhumka A, Leeke M (2018) Hybrid online protocols for source location privacy in wireless sensor networks. J Parallel Distrib Comput 115:67–81. https://doi.org/10.1016/j.jpdc.2018.01.006
Chen W, Zhang M, Hu G, Tang X, Sangaiah AK (2017) Constrained random routing mechanism for source privacy protection in WSNs. IEEE Access 5:23171–23181
Chen Y, Sun J, Yang Y, Li T, Niu X, Zhou H (2022) PSSPR: a source location privacy protection scheme based on sector phantom routing in WSNs. Int J Intell Syst 123:1204–1221. https://doi.org/10.1002/int.22666
Gu C, Bradbury M, Jhumka A, Leeke M (2015) Assessing the performance of phantom routing on source location privacy in wireless sensor networks. In: 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, Zhangjiajie, pp 99–108
Gharat N, Jolly L (2023) Source location privacy protection algorithms in IoT networks: a survey. In: International conference on soft computing for security applications. Springer, Salem, pp 793–812. https://doi.org/10.1007/978-981-99-3608-3_55
Gupta S, Kumar P, Singh J, Singh M (2016) Privacy preservation of source location using phantom nodes. In: Information Technology: New Generations: 13th International Conference on Information Technology. Springer, Las Vegas, pp 247–256
Han G, Xia R, Wang H, Li A (2023) Source location privacy protection algorithm based on polyhedral phantom routing in underwater acoustic sensor networks. IEEE Internet Things J 11:8459–8472. https://doi.org/10.1109/JIOT.2023.3318567
Hussain T, Yang B, Rahman HU, Iqbal A, Ali F et al (2022) Improving source location privacy in social internet of things using a hybrid phantom routing technique. Comput Secur 123:102917. https://doi.org/10.1016/j.cose.2022.102917
Kumar RP, Singh JP, Kumar Prabhat SM (2015) Source location privacy using fake source and phantom routing (FSAPR) technique in wireless sensor networks. Procedia Comput Sci 57:936–941. https://doi.org/10.1016/j.procs.2015.07.486
Kamat P, Zhang Y, Trappe W, Ozturk C (2005) Enhancing source-location privacy in sensor network routing. In: 25th IEEE International Conference on Distributed Computing Systems (ICDCS’05). IEEE, Columbus, pp 599–608
Li Y, Ren J (2009) Preserving source-location privacy in wireless sensor networks. In: 2009 6th annual IEEE Communications Society conference on sensor, mesh and ad hoc communications and networks. IEEE, San Francisco, pp 1–9
Li Y, Ren J (2010) Source-location privacy through dynamic routing in wireless sensor networks. In: 2010 Proceedings IEEE INFOCOM. IEEE, San Diego, pp 1–9
Manjula R, Koduru T, Datta R (2021) Protecting source location privacy in IoT-enabled wireless sensor networks: the case of multiple assets. IEEE Internet Things J 9(13):10807–10820
Mutalemwa LC, Shin S (2018a) Strategic location-based random routing for source location privacy in wireless sensor networks. Sensors 18:2291. https://doi.org/10.3390/s18072291
Mutalemwa LC, Shin S (2018b) Routing schemes for source location privacy in wireless sensor networks: a survey. J Korean Inst Commun Inf Sci 43:1429–1445. https://doi.org/10.7840/kics.2018.43.9.1429
Mutalemwa LC, Shin S (2019) Achieving source location privacy protection in monitoring wireless sensor networks through proxy node routing. Sensors 19:1037. https://doi.org/10.3390/s19051037
Mutalemwa LC, Shin S (2021) Protecting source location privacy in IoT-enabled wireless sensor networks: the case of multiple assets. IEEE Access 9:104820–104836
Ozturk C, Zhang Y, Trappe W (2004) Source-location privacy in energy-constrained sensor network routing. In: Proceedings of the 2nd ACM workshop on security of ad hoc and sensor networks. Association for Computing Machinery, pp 88–93
Ren J, Li Y, Li T (2009) Routing-based source-location privacy in wireless sensor networks. In: 2009 IEEE International Conference on Communications. IEEE, Dresden, pp 1–5
Sunitha R, Chandrikab J (2020) Evolutionary computing assisted wireless sensor network mining for QoS-centric and energy-efficient routing protocol. Int J Eng 33:791–797. https://doi.org/10.5829/ije.2020.33.05b.10
Spachos P, Toumpakaris D, Hatzinakos D (2014) Angle-based dynamic routing scheme for source location privacy in wireless sensor networks. In: 2014 IEEE 79th Vehicular Technology Conference (VTC Spring). IEEE, Seoul, pp 1–5
Thomason A, Leeke M, Bradbury M, Jhumka A (2013) Evaluating the impact of broadcast rates and collisions on fake source protocols for source location privacy. In: 2013 12th IEEE international conference on trust, security and privacy in computing and communications. IEEE, Melbourne, pp 667–674
Wang N, Zeng J (2017) All-direction random routing for source-location privacy protecting against parasitic sensor networks. Sensors 17:614. https://doi.org/10.3390/s17030614
Wang W-P, Chen L, Wang J-X (2008) A source-location privacy protocol in WSN based on locational angle. In: 2008 IEEE international conference on communications. IEEE, Beijing, pp 1630–1634
Zhou J, Zhang X, Jiang Z (2021) Recognition of imbalanced epileptic EEG signals by a graph-based extreme learning machine. Wirel Commun Mob Comput 2021:1–12. https://doi.org/10.1155/2021/5871684
Acknowledgements
The authors thank the Editor and reviewers for their insightful comments to improve the manuscript.
Funding
No funding is available for this research.
Author information
Authors and Affiliations
Contributions
Arpitha T* (Corresponding Author): Conception and design of study, Implementation, Acquisition of data, Analysis, and/or interpretation of data, Writing-original draft. Dharamendra Chouhan: Guidance, Reviewing and editing the paper. Shreyas J: Reviewing and editing the paper.
Corresponding author
Ethics declarations
Conflict of interest
The authors do not have any Conflict of interest with this article.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Arpitha, T., Chouhan, D. & Shreyas, J. An efficient ACO-inspired multi-path routing for source location privacy with dynamic phantom node selection scheme in IoT environments. Soft Comput 28, 13149–13166 (2024). https://doi.org/10.1007/s00500-024-10376-z
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-024-10376-z