Skip to main content
Log in

SLP-RRFPR: a source location privacy protection scheme based on random ring and limited hop fake packet routing for wireless sensor networks

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In recent times, the wireless sensor network (WSN) has become an integral part of daily life. WSN forms the necessary foundation for several important applications such as animal monitoring, border surveillance, asset monitoring, etc. These applications help maintain the confidentiality of the location of the occurring event from the attacker. The properties of the sensor nodes such as limited energy source, communication capability, memory, and network deployment at a large scale make it challenging to maintain the location privacy of a source node. To secure the source node location, this paper presents a source location privacy protection scheme that is based on random rings and a limited hop fake packet routing scheme (SLP-RRFPR). In the proposed scheme, an event packet is forwarded away from the base station by the random routing with confounding transmission to change the attacker’s backtracking process. Afterward, it follows the random routing, where the phantom node forwards the fake packet to other randomly selected nodes. In the last phase, a real packet is transmitted at the base station by ring routing. The simulation results of the proposed SLP-RRFPR are compared with phantom, baseline, probabilistic, source location privacy protection scheme based on ring-loop routing (SLPRR), and source location protection protocol based on dynamic routing (SLPDR). The simulation results show that the proposed SLP-RRFPR performs better than the compared protocol for various performance metrics, such as safety time, transmission delay, network lifetime, and randomness in the packet path.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25
Fig. 26

Similar content being viewed by others

References

  1. Adil M, Jan MA, Mastorakis S, Song H, Jadoon MM, Abbas S, Farouk A (2021) Hash-MAC-DSDV: mutual authentication for intelligent IoT-based cyber-physical systems. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2021.3083731

    Article  Google Scholar 

  2. Bagree R, Jain VR, Kumar A, Ranjan P (2010) TigerCENSE: Wireless image sensor network to monitor tiger movement. Lect. Notes Comput. Sci. (Including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics). Springer, Berlin, Heidelberg, pp 13–24. https://doi.org/10.1007/978-3-642-17520-6_2

  3. Chen J, Lin Z, Hu Y, Wang B (2015) Hiding the source based on limited flooding for sensor networks. Sensors (Switzerland) 15:29129–29148. https://doi.org/10.3390/s151129129

    Article  Google Scholar 

  4. Comput JPD, Long J, Liu A, Dong M, Li Z (2015) An energy-efficient and sink-location privacy enhanced scheme for WSNs through ring based routing. J Parallel Distrib Comput 81–82. https://doi.org/10.1016/j.jpdc.2015.04.003

  5. Deng J, Han R, Mishra S (2006) Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks. Pervasive Mob Comput 2:159–186. https://doi.org/10.1016/j.pmcj.2005.12.003

    Article  Google Scholar 

  6. Dou K, Guo B, Kuang L (2019) A privacy-preserving multimedia recommendation in the context of social network based on weighted noise injection. Multimed Tools Appl 78:26907–26926. https://doi.org/10.1007/s11042-017-4352-3

    Article  Google Scholar 

  7. Florian M, Pieper F, Baumgart I (2016) Establishing location-privacy in decentralized long-distance geocast services. Ad Hoc Networks 37:110–121. https://doi.org/10.1016/j.adhoc.2015.07.015

    Article  Google Scholar 

  8. Gupta N, Jain A, Vaisla KS, Kumar A, Kumar R (2021) Performance analysis of DSDV and OLSR wireless sensor network routing protocols using FPGA hardware and machine learning. Multimed Tools Appl 80:22301–22319. https://doi.org/10.1007/s11042-021-10820-4

    Article  Google Scholar 

  9. Han G, Zhou L, Wang H, Zhang W, Chan S (2018) A source location protection protocol based on dynamic routing in WSNs for the Social Internet of Things, Futur. Gener Comput Syst 82:689–697. https://doi.org/10.1016/j.future.2017.08.044

    Article  Google Scholar 

  10. Han G, Wang H, Guizani M, Chan S, Zhang W (2018) A k-means cluster-based location privacy protection scheme in WSNs for IoT. IEEE Wirel Commun 25:84–90. https://doi.org/10.1109/MWC.2017.1800061

    Article  Google Scholar 

  11. Hong Z, Wang R, Ji S, Beyah R (2019) Attacker location evaluation-based fake source scheduling for source location privacy in cyber-physical systems. IEEE Trans Inf Forensics Secur 14:1337–1350. https://doi.org/10.1109/TIFS.2018.2876839

    Article  Google Scholar 

  12. Jain S, Pattanaik KK, Shukla A (2019)Query-driven virtual wheel based routing protocol for wireless sensor networks with mobile sink. J Netw Comput Appl 147:102430. https://doi.org/10.1016/j.jnca.2019.102430

    Article  Google Scholar 

  13. Jain S, Pattanaik KK, Verma RK, Bharti S, Shukla A (2021)Delay-aware green routing for mobile-sink-based wireless sensor networks. IEEE Internet Things J 8:4882–4892. https://doi.org/10.1109/JIOT.2020.3030120

    Article  Google Scholar 

  14. Jan MA, Khan F, Mastorakis S, Adil M, Akbar A, Stergiou N (2021) LightIoT: Lightweight and secure communication for energy-efficient IoT in health informatics. IEEE Trans Green Commun Netw 5:1202–1211. https://doi.org/10.1109/TGCN.2021.3077318

    Article  Google Scholar 

  15. Kamat P, Zhang Y, Trappe W, Ozturk C (2005) Enhancing source-location privacy in Sensor Network Routing, 1–10. http://ieeexplore.ieee.org/document/1437121/

  16. Luo H, Zhang H, Long S, Lin Y (2021) Enhancing frequent location privacy-preserving strategy based on geo-Indistinguishability. Multimed Tools Appl 80:21823–21841. https://doi.org/10.1007/s11042-021-10789-0

    Article  Google Scholar 

  17. Manjula R, Datta R (2018) A novel source location privacy preservation technique to achieve enhanced privacy and network lifetime in WSNs. Pervasive Mob Comput 44:58–73. https://doi.org/10.1016/j.pmcj.2018.01.006

    Article  Google Scholar 

  18. Misra S, Mohanta D (2010) Adaptive listen for energy-efficient medium access control in wireless sensor networks. Multimed Tools Appl Springer: 121–145. https://doi.org/10.1007/s11042-009-0410-9

  19. Mutalemwa LC, Shin S (2018) Strategic location-based random routing for source location privacy in wireless sensor networks. Sensors (Switzerland) 18. https://doi.org/10.3390/s18072291

  20. Mutalemwa LC, Shin S (2019) Regulating the packet transmission cost of source location privacy routing schemes in event monitoring wireless networks. IEEE Access 7:140169–140181. https://doi.org/10.1109/ACCESS.2019.2943710

    Article  Google Scholar 

  21. Mutalemwa LC, Shin S (2019) Achieving source location privacy protection in monitoring wireless sensor networks through proxy node routing. Sensors (Switzerland) 19. https://doi.org/10.3390/s19051037

  22. Nadian-Ghomsheh A, Farahani B, Kavian M (2021) A hierarchical privacy-preserving IoT architecture for vision-based hand rehabilitation assessment. Multimed Tools Appl 1–24. https://doi.org/10.1007/s11042-021-10563-2

  23. Naumowicz T, Freeman R, Kirk H, Dean B, Calsyn M, Liers A, Braendle A, Guilford T, Schiller J (2010) Wireless sensor network for habitat monitoring on Skomer Island. In: Proc. - Conf. Local Comput. Networks, LCN, pp 882–889. https://doi.org/10.1109/LCN.2010.5735827

  24. Ozturk C, Zhang Y, Trappe W (2004)Source-location privacy in energy-constrained sensor network routing. In: Proc. 2004 ACM Work. Secur. Ad Hoc Sens. Networks, SASN’04, Association for Computing Machinery, pp 88–93. https://doi.org/10.1145/1029102.1029117

  25. Ozturk C, Zhang Y, Trappe W, Ott M (2004)Source-location privacy for networks of energy-constrained sensors. In: Proc. - Second IEEE Work. Softw. Technol. Futur. Embed. Ubiquitous Syst, pp 68–72. https://doi.org/10.1109/WSTFES.2004.1300417

  26. Raja M, Datta R (2018) An enhanced source location privacy protection technique for wireless sensor networks using randomized routes. IETE J Res 64:764–776. https://doi.org/10.1080/03772063.2017.1371652

    Article  Google Scholar 

  27. Rashwan AM, Taha A-EM, Hassanein HS (2014) Characterizing the performance of security functions in mobile computing systems. IEEE Internet Things J 1:399–413. https://doi.org/10.1109/JIOT.2014.2360217

    Article  Google Scholar 

  28. Sajwan M, Gosain D, Sharma AK (2018) Hybrid energy-efficient multi-path routing for wireless sensor networks R. Comput Electr Eng 67:96–113. https://doi.org/10.1016/j.compeleceng.2018.03.018

    Article  Google Scholar 

  29. Sheu J (2008) Anonymous path routing in wireless sensor networks, 2728–2734

  30. Shukla A, Tripathi S (2018) An optimal relay node selection technique to support green internet of things. J Intell Fuzzy Syst 35:1301–1314. https://doi.org/10.3233/JIFS-169674

    Article  Google Scholar 

  31. Shukla A, Tripathi S (2020) A multi-tier based clustering framework for scalable and energy efficient WSN-assisted IoT network. Wirel Networks 26:3471–3493. https://doi.org/10.1007/s11276-020-02277-4

    Article  Google Scholar 

  32. Shukla A, Tripathi S (2020) An effective relay node selection technique for energy efficient WSN-assisted IoT. Wirel Pers Commun 112:2611–2641. https://doi.org/10.1007/s11277-020-07167-8

    Article  Google Scholar 

  33. Singh A, Nagaraju A (2020) Low latency and energy efficient routing-aware network coding-based data transmission in multi-hop and multi-sink WSN. Ad Hoc Netw 107:102182. https://doi.org/10.1016/j.adhoc.2020.102182

    Article  Google Scholar 

  34. Sun Z, Wang P, Vuran MC, Al-Rodhaan MA, Al-Dhelaan AM, Akyildiz IF (2011) BorderSense: Border patrol through advanced wireless sensor networks. Ad Hoc Netw 9:468–477. https://doi.org/10.1016/j.adhoc.2010.09.008

  35. Thirukrishna JT, Karthik S, Arunachalam VP (2018) Revamp energy efficiency in Homogeneous Wireless Sensor Networks using Optimized Radio Energy Algorithm (OREA) and Power-Aware Distance Source Routing protocol. Futur Gener Comput Syst 81:331–339. https://doi.org/10.1016/j.future.2017.11.042

    Article  Google Scholar 

  36. Wang J, Gao Y, Yin X, Li F, Kim HJ (2018) (2018) An enhanced PEGASIS algorithm with mobile sink support for wireless sensor networks. Wirel Commun Mob Comput. https://doi.org/10.1155/2018/9472075

  37. Wang J, Ju C, Gao Y, Sangaiah AK, Kim GJ (2018) A PSO based energy efficient coverage control algorithm for wireless sensor networks. Comput Mater Contin 56:433–446. https://doi.org/10.3970/cmc.2018.04132

    Article  Google Scholar 

  38. Wang H, Han G, Zhou L, Ansere JA, Zhang W (2019) A Source Location privacy protection scheme based on ring-loop routing for the IoT. Comput Networks 148:142–150. https://doi.org/10.1016/j.comnet.2018.11.005

    Article  Google Scholar 

  39. Wang J, Gao Y, Liu W, Sangaiah AK, Kim H-J(2019) Energy efficient routing algorithm with mobile sink support for wireless sensor networks. Sensors 19:1494. https://doi.org/10.3390/s19071494

    Article  Google Scholar 

  40. Wang J, Gu X, Liu W, Sangaiah AK, Kim HJ (2019) An empower hamilton loop based data collection algorithm with mobile agent for WSNs. Hum -Centric Comput Inf Sci 9:18. https://doi.org/10.1186/s13673-019-0179-4

  41. Wang J, Gao Y, Zhou C, Simon Sherratt R, Wang L (2020) Optimal coverage multi-path scheduling scheme with multiple mobile sinks for WSNs. Comput Mater Contin 62:695–711. https://doi.org/10.32604/cmc.2020.08674

    Article  Google Scholar 

  42. Xu W, Zhang X, Yao L, Xue W, Wei B (2020) A multi-view CNN-based acoustic classification system for automatic animal species identification. Ad Hoc Networks 102:102115. https://doi.org/10.1016/j.adhoc.2020.102115

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anurag Shukla.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shukla, A., Singh, D., Sajwan, M. et al. SLP-RRFPR: a source location privacy protection scheme based on random ring and limited hop fake packet routing for wireless sensor networks. Multimed Tools Appl 81, 11145–11185 (2022). https://doi.org/10.1007/s11042-022-12157-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-12157-y

Keywords

Navigation