Abstract
Recently, Wireless Sensor Networks (WSNs) have been extensively employed in several tactical applications out of which target detection, habit monitoring, and earthquake monitoring. The open characteristic nature of WSNs makes it vulnerable to be attacked by an eavesdropper who aims at disrupting the network operation or access confidential information. Consequently, ensuring the security and privacy in WSNs is considered an essential issue and definitely cannot be left without proper investigations. There are two types of threats that may occur for the WSNs privacy, that are, contextual and content privacy. Location privacy is considered an example of contextual privacy. In this paper, three source privacy protection schemes, which are based on clustering methodology, are proposed to protect contextual privacy. These schemes are dynamic shortest path (DSP) scheme, dynamic tree (DT) scheme, and hybrid scheme. Interestingly, a grid-based clustering technique is adopted to divide the network into several square clusters. Matlab simulations are used to evaluate the performance of the three proposed schemes in terms of latency, energy consumption, and safety period. The results undoubtedly confirm the effectiveness of the proposed schemes. Very high safety period is achieved and an adequate amount of energy is consumed. Furthermore, acceptable latency is achieved when compared to the shortest path scheme.
Similar content being viewed by others
References
Darabkh KA, Al-Rawashdeh WS, Al-Zubi RT, Alnabelsi SH (2017) C-DTB-CHR: Centralized Density- and Threshold-based Cluster Head Replacement Protocols for Wireless Sensor Networks. J Supercomput 73(12):5332–5353
Shurman MM, Al-Mistarihi MF, Darabkh KA (2016) Dynamic Distribution of Security Keys and IP Addresses Coalition Protocol for Mobile Ad Hoc Networks. AUTOMATIKA – Journal for Control, Measurement, Electronics, Computing and Communications 5(4):1020–1034
Darabkh KA, Abu-Jaradeh B, Jafar I (2011) Incorporating Automatic Repeat Request and Thresholds with Variable Complexity Decoding Algorithms over Wireless Networks: Queuing Analysis. IET Commun 5(10):1377–1393
Al-Mistarihi MF, Mohaisen R, Sharaqa A, Shurman MM, Darabkh KA (2015) Performance Evaluation of Multiuser Diversity in Multiuser Two-Hop Cooperative Multi-Relay Wireless Networks using MRC over Rayleigh Fading Channels. Int J Commun Syst 28(1):71–90
Darabkh KA (2017) Fast and Upper Bounded Fano Decoding Algorithm: Queuing Analysis. Transactions on Emerging Telecommunications Technologies 28(1):1–12
Al-Zubi R, Hawa M, Al-Sukkar G, Darabkh KA (2014) Markov-Based Distributed Approach For Mitigating Self-Coexistence Problem in IEEE 802.22 WRANs. Comput J 57(12):1765–1775
Darabkh KA, Jafar I, Al Sukkar G, Abandah G, Al-Zubi R (2012) An Improved Queuing Model for Packet Retransmission Policy and Variable Latency Decoders. IET Commun 6(18):3315–3328
Khalifeh AF, Al-Tamimi A-K, Darabkh KA (2017) Perceptual Evaluation of Audio Quality Under Lossy Networks. Proc. International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET 2017). Chennai, India
Hlayel MM, Hayajneh AM, Al-Mistarihi MF, Shurman M, Darabkh KA (2014) Closed-form Expression of Bit Error Rate in Dual-Hop Dual-Branch Mixed Relaying Cooperative Networks with Best-Path Selection over Rayleigh Fading Channels. Proc. IEEE International Multi-Conference on Systems, Signals & Devices, Conference on Communication & Signal Processing. Castelldefels-Barcelona, Spain
Darabkh KA, Abu-Jaradeh B (2010) Bounded Fano Decoders over Intermediate Hops Excluding Packet Retransmission. Proc. IEEE 24th International Conference on Advanced Information Networking and Applications (AINA 2010). Perth, Australia 299–303
Darabkh KA, Abu-Jaradeh B (2010) Buffering Study over Intermediate Hops including Packet Retransmission.Proc. IEEE International Conference on Multimedia Computing and Information Technology (MCIT-2010). Sharjah, U.A.E: 45–48
Darabkh KA, Aygun RS (2006) Quality of Service Evaluation of Error Control for TCP/IP-Based Systems in Packet Switching ATM Networks. Proc. International Conference on Internet Computing (ICOMP'06). Las Vegas, Nevada: 243–248
Hawa M, Darabkh KA, Khalaf LD, Rahhal JS (2015) Dynamic Resource Allocation Using Load Estimation in Distributed Cognitive Radio Systems. AEÜ - Int J Electron Commun 69(12):1833–1846
Darabkh KA, Ibeid H, Jafar IF, Al-Zubi RT (2016) A generic buffer occupancy expression for stop-and-wait hybrid automatic repeat request protocol over unstable channels. Telecommun Syst 63(2):205–221
Shurman M, Awad N, Al-Mistarihi MF, Darabkh KA (2014) LEACH Enhancements for Wireless Sensor Networks Based on Energy Model. Proc. IEEE International Multi-Conference on Systems, Signals & Devices, Conference on Communication & Signal Processing. Castelldefels-Barcelona, Spain
Hawa M, Darabkh KA, Al-Zubi R, Al-Sukkar G (2016) A Self-Learning MAC Protocol for Energy Harvesting and Spectrum Access in Cognitive Radio Sensor Networks. Journal of Sensors: 1–18
Khalifeh AF, AlQudah M, Darabkh KA(2017) Optimizing the Beacon and SuperFrame Orders in IEEE 802.15.4 for Real-time Notification in Wireless Sensor Networks. Proc. International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET 2017). Chennai, India
Darabkh KA, Alsukour O (2015) Novel Protocols for Improving the Performance of ODMRP and EODMRP over Mobile Ad hoc Networks. International Journal of Distributed Sensor Networks: 1–18
Shurman M, Al-Mistarihi M, Darabkh KA, Ababnah A (2013) Hierarchical Clustering Using Genetic Algorithm in Wireless Sensor Networks. Proc. of 36th IEEE International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO 2013): 479–483
Darabkh KA, Albtoush WY, Jafar IF (2017) Improved Clustering Algorithms for Target Tracking in Wireless Sensor Networks. J Supercomput 73(5):1952–1977
Darabkh KA, Al-Rawashdeh WS, Hawa M, Saifan R, Khalifeh AF(2017) A Novel Clustering Protocol for Wireless Sensor Networks. Proc. International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET 2017). Chennai, India
Yick J, Mukherjee B, Ghosal D (2008) Wireless sensor network survey. Comput Netw 52:2292–2330
Chen X, Makki K, Yen K, Pissinou N (2009) Sensor network security: a survey. IEEE Commun Surv Tutorials 11(2):52–73
Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor networks: a survey. Comput Netw 38:393–422
Khemapech I, Duncan I, Miller A (2005) A Survey of Wireless Sensor Networks Technology
Gupta SK, Sinha P (2014) Overview of Wireless Sensor Network: A Survey. Int J Adv Res Comput Commun Eng 3(1):5201–5207
Buratti C, Conti A, Dardari D, Verdone R (2009) An Overview on Wireless Sensor Networks Technology and Evolution. Sensors 9:6869–6896
Tarannum S (2010) Energy conservation Challenges in Wireless Sensor Networks: A Comprehensive Study. Wirel Sens Netw 2:483–491
Sen J (2009) A Survey on Wireless Sensor Network Security. Int J Commun Netw Inf Secur 1(2):55–78
Pathan AK, Lee HW, Hong CS (2006) Security in Wireless Sensor Networks: Issues and Challenges. Proc. ICACT2006:1043–1048
Malik MY (2011) An Outline of Security in Wireless Sensor Networks: Threats, Countermeasures and Implementations. Wireless Sensor Networks and Energy Efficiency: Protocols, Routing and Management
Abuhelaleh MA, Elleithy KM (2010) Security in Wireless Sensor Networks: Key Management Module in SOOAWSN. Int J Netw SecurAppl 2(4):67–78
Chen H, Lou W (2014) On protecting end-to-end Location Privacy against Local Eavesdropper in Wireless Sensor Networks. Elsevier, pervasive mob comput 16:36–50
Zeng Y, Cao J, Zhang S, Guo S, Xie L (2010) Random-walk based approach to detect clone attacks in wireless sensor networks. IEEE J Sel Areas Commun 28(5):677–691
KhanWZ, AalsalemMY, SaadNM, XaingY, LuanTH (2014) Detecting replicated nodes in Wireless Sensor Networks using random walks and network division. Proc. IEEE Wireless Communications and Networking Conference, WCNC2014: 2623–2628
Zhang L (2006) A self-adjusting directed random walk approach for enhancing source-location privacy in sensor network routing. Proc. International conference on Wireless communications and mobile computing, IWCMC’06: 33–38
Chen H, Lou W (2010) From nowhere to somewhere: protecting end-to-end location privacy in wireless sensor networks. Proc. IEEE 29th International Performance Computing and Communications Conference, IPCCC 2010: 1–8
Li Y, Ren J (2009) Providing source-location privacy in wireless sensor networks. Proc. International Conference on Wireless Algorithms, Systems and Applications, WASA 2009: 338–347
Kamat P, Zhang Y, Trappe W, Ozturk C (2005) Enhancing source location privacy in sensor network routing. Proc. 25th IEEE International Conference on Distributed Computing Systems, ICDCS 2005. Los Alamitos, CA, USA: 599–608
Ozturk C, Zhang Y, Trappe W (2004) Source-location privacy in energy-constrained sensor network routing. Proc. 2nd ACM workshop on Security of Ad hoc and Sensor Networks, SASN ‘04: 88–93
Spachos P, Song L, Hatzinakos D (2010) Opportunistic routing for enhanced source-location privacy in wireless sensor networks. Proc. IEEE 25th Biennial Symposium on Communications, QBSC 2010: 315–318
Wei-ping W, Liang C, Jian-xin W (2008) A source-location privacy protocol in wsn based on locational angle.Proc. IEEE International Conference on Communications, ICC’08. Piscataway, NJ, USA: 1630–1634
Luo X, Ji X, Park M (2010) Location privacy against traffic analysis attacks in wireless sensor networks. Proc. IEEE International Conference on Information Science and Applications, ICISA 2010: 1–6
Xiong K, Thuente D (2006) Secure Localization Schemes in Sensor Networks. IEEE International Symposium on High Capacity Optical Networks and Enabling Technologies
Tan W, Xu K, Wang D (2014) An anti-tracking source-location privacy protection protocol in WSNs based on path extension. IEEE Internet Things J 1(5):461–471
Long J, Dong M, Ota K, Liu A (2014) Achieving Source Location Privacy and Network Lifetime Maximization Through Tree-Based Diversionary Routing in Wireless Sensor Networks. IEEE Access 2:633–651
Li Y and Ren J(2010) Source-Location Privacy through Dynamic Routing in Wireless Sensor Networks. Proc. IEEE INFOCOM
Zhang JD, Chow CY (2015) REAL: A Reciprocal Protocol for Location Privacy in Wireless Sensor Networks. IEEE TransDependable Secure Comput 12(4):458–471
Bai L, Yan Y, Qian S (2017) A source-location privacy protection algorithm in WSNs based on node distance. Proc. 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD): 2772–2776
Tang D, Gu J, Yu Y, Yang Y, Han W, Ma X (2018) Source-Location Privacy Based on Dynamic Mix-Ring in Wireless Sensor Networks. Proc.International Conference on Computing, Networking and Communications (ICNC): Communications and Information Security Symposium: 327–331
Wang N, Zeng J(2017) All-Direction Random Routing for Source-Location Privacy Protecting against Parasitic Sensor Networks. Sensors 17(3)
Lilian CM, Seokjoo S (2018) Strategic Location-Based Random Routing for Source Location Privacy in Wireless Sensor Networks. Sensors 18(7)
Huang C, Ma M, Liu Y, Liu A(2017) Preserving Source Location Privacy for Energy Harvesting WSNs. Sensors 17(4)
Raja RA, Valli S (2017) An Approach to Defend Global Eavesdropper in Sensor Networks. Wirel Pers Commun 96(2):2761–2777
Darabkh KA, Al-Rawashdeh WS, Hawa M, Saifan R (2018) MT-CHR: A Modified Threshold-based Cluster Head Replacement Protocol for Wireless Sensor Networks,” Computers and Electrical Engineering, https://doi.org/10.1016/j.compeleceng.2018.01.032, 2018
Anfeng L et al. (2013) Deployment guidelines for achieving maximum lifetime and avoiding energy holes in sensor network. Information Sciences: 197–226
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Al-Mistarihi, M.F., Tanash, I.M., Yaseen, F.S. et al. Protecting Source Location Privacy in a Clustered Wireless Sensor Networks against Local Eavesdroppers. Mobile Netw Appl 25, 42–54 (2020). https://doi.org/10.1007/s11036-018-1189-6
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11036-018-1189-6