Skip to main content

Advertisement

Log in

An energy-efficient source-anonymity protocol in surveillance systems

  • Original Article
  • Published:
Personal and Ubiquitous Computing Aims and scope Submit manuscript

Abstract

Source-location privacy is a critical security property in event-surveillance systems. However, due to the characteristics of surveillance systems, e.g., resource constraints, diverse privacy requirements and large-scale network, the existing anonymity mechanisms cannot effectively deal with the problem of source-location privacy protection. There is an imbalance on network load and transmission latency for most of the existing anonymity schemes, which causes “funnel effect” and conflicts with anonymity. This paper proposes the dynamic optimal mix-ring-based source-location anonymity protocol, DORing. In this scheme, we first set the dynamic optimal mix-ring to collect and mix the network traffic, which can satisfy the diverse QoS requirements for all the packets. Secondly, we propose the sector-based anonymity assess to control the process of mixing in order to filter out the dummy packets and deliver the authentic packets to sink. Finally, the location of mix-ring is adjusted to balance network energy consumption, prolong the lifetime of the network and resist global attack. The simulation results demonstrate that DORing is very efficient in balancing energy consumption and transmission latency and can significantly prolong survival period of the network and ensure security as well as latency to satisfy the packets’ requirements.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Winkler T, Rinner B et al (2014) Security and privacy protection in visual sensor networks: a survey. ACM Comput Surv (CSUR) 47(1):2–42

    Article  Google Scholar 

  2. Sun Y et al (2016) Internet of things and big data analytics for smart and connected communities. IEEE Access 4(2016):766–773

    Article  Google Scholar 

  3. Sun Y, Jara AJ (2014) An extensible and active semantic model of information organizing for the internet of things. Pers Ubiquitous Comput (PUC) 18(8):1821–1833

    Article  Google Scholar 

  4. Guo J, Sun Y et al (2014) Square-root unscented Kalman filtering-based localization and tracking in the internet of things. Pers Ubiquitous Comput (PUC) 18(4):987–996

    Article  Google Scholar 

  5. Long J et al (2015) An energy-efficient and sink-location privacy enhanced scheme for WSNs through ring based routing. J Parallel Distrib Comput 81:47–65

    Article  Google Scholar 

  6. Sun Y et al (2014) Data security and privacy in cloud computing. Int J Distrib Sens Netw 2014(190903):1–9

    Google Scholar 

  7. Xi Y, Schwiebert L, Shi W (2006) Preserving source location privacy in monitoring-based wireless sensor networks. In: IEEE international parallel and distributed processing symposium (IPDPS 2006), pp 1–8

  8. Shaikh RA et al (2010) Achieving network level privacy in wireless sensor networks. Sensors 10(3):1447–1472

    Article  Google Scholar 

  9. Akyildiz IF et al (2002) Wireless sensor networks: a survey. Comput Netw 38(4):393–422

    Article  Google Scholar 

  10. Conti M, Willemsen J, Crispo B (2013) Providing source location privacy in wireless sensor networks: a survey. IEEE Commun Surv Tutor 15(3):1238–1280

    Article  Google Scholar 

  11. Chen H, Lou W (2015) On protecting end-to-end location privacy against local eavesdropper in wireless sensor networks. Pervasive Mob Comput (PMC) 16:36–50

    Article  Google Scholar 

  12. Li Y, Ren J, Wu J (2012) Quantitative measurement and design of source-location privacy schemes for wireless sensor networks. IEEE Trans Parallel Distrib Syst (TPDS) 23(7):1302–1311

    Article  Google Scholar 

  13. Kamat P et al (2005) Enhancing source-Location privacy in sensor network routing. In: IEEE international conference distributed computing systems (ICDCS 2005), pp 599–608

  14. Yao L et al (2015) Protecting source–location privacy based on multirings in wireless sensor networks. Concurr Comput Pract Exp 27:3863–3876

    Article  Google Scholar 

  15. Ren J, Tang D (2011) Combining source-location privacy and routing efficiency in wireless sensor networks. In: IEEE global telecommunications conference (GLOBECOM 2011), pp 1–5

  16. Rios R, Lopez J (2011) Exploiting context-awareness to enhance source-location privacy in wireless sensor networks. Comput J 54(10):1603–1615

    Article  Google Scholar 

  17. Lightfoot L, Li Y, Ren J (2010) Preserving source-location privacy in wireless sensor network using STaR routing. In: IEEE global telecommunications conference (GLOBECOM 2010), pp 1–5

  18. Yao J, Wen G (2008) Preserving source-location privacy in energy-constrained wireless sensor networks. In: IEEE international conference distributed computing systems (ICDCS2008), pp 412–416

  19. Mehta K, Liu D, Wright M (2012) Protecting location privacy in sensor networks against a global eavesdropper. IEEE Trans Mob Comput (TMC) 11(2):320–336

    Article  Google Scholar 

  20. Alomair B et al (2013) Toward a statistical framework for source anonymity in sensor networks. IEEE Trans Mob Comput (TMC) 12(2):248–260

    Article  Google Scholar 

  21. Shao M et al (2008) towards statistically strong source anonymity for sensor networks. In: IEEE international conference on computer communications (INFOCOM 2008), pp 51–55

  22. Zhang Y et al (2010) All proxy scheme for event source anonymity in wireless sensor networks. In: IEEE international conference on intelligent sensors, sensor networks and information processing (ISSNIP 2010), pp 263–268

  23. Jhumka A, Bradbury M, Leeke M (2012) Towards understanding source location privacy in wireless sensor networks through fake sources. In: IEEE international conference on trust, security and privacy in computing and communications (TrustCom 2012), pp 760–768

  24. Ortolani S et al (2011) Events privacy in WSNs: a new model and its application. In: IEEE international symposium world of wireless, mobile and multimedia networks (WoWMoM 2011), pp 1–9

  25. Thomason A et al (2013) Evaluating the impact of broadcast rates and collisions on fake source protocols for source location privacy. In: IEEE international conference on trust, security and privacy in computing and communications (TrustCom 2013), pp 667–674

  26. Mahmoud MM, Shen X (2012) A cloud-based scheme for protecting source-location privacy against hotspot-locating attack in wireless sensor networks. IEEE Trans Parallel Distrib Syst 23(10):1805–1818

    Article  Google Scholar 

  27. Mahmoud ME, Shen X (2012) Secure and efficient source location privacy-preserving scheme for wireless sensor networks. In: IEEE international conference on communications (ICC2012), pp 1123–1127

  28. Guo M et al (2015) In-network trajectory privacy preservation. ACM Comput Surv (CSUR) 48(2):23–29

    Article  Google Scholar 

  29. Roy PK et al (2015) Source location privacy using fake source and phantom routing (FSAPR) technique in wireless sensor networks. Procedia Comput Sci 57:936–941

    Article  Google Scholar 

Download references

Acknowledgments

This work was partially supported by the National Key Research Development Program of China (Grant No. 2016YFB0502201), the National Natural Science Foundation of China NSFC (Grant Nos. 41127901-06, 61572370, 61450110441, 61572374, U1135005), Development Program of China “863 Project” (Grant No. 2015AA016004), the Natural Science Foundation of Hubei Province of China (Grant No. 2014CFB191) and the CERNET Next Generation Internet’s Technology Innovation Project (NGII20150612).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Xiaoguang Niu or Xu Chen.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Niu, X., Zhang, Y., Yao, Y. et al. An energy-efficient source-anonymity protocol in surveillance systems. Pers Ubiquit Comput 20, 771–783 (2016). https://doi.org/10.1007/s00779-016-0949-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00779-016-0949-1

Keywords

Navigation