skip to main content
research-article

Preserving Smart Sink-Location Privacy with Delay Guaranteed Routing Scheme for WSNs

Published: 26 May 2017 Publication History

Abstract

A Semi Random Circle routing for mobile Sink joint Ray Routing for data (SRCRR) scheme is proposed for preserving sink-location privacy with a delay guaranteed. In the SRCRR scheme, the data are directionally routed along ray paths and stored at intermediate nodes probabilistically. The Sink moves in a semirandom circular pattern to collect data from the local nodes occasionally, which guarantees that the data will be collected with an acceptable delay and prevents attackers from predicting their locations and movements. The experimental results indicate that the performance of the SRCRR scheme is better than that of the previous schemes.

References

[1]
K. Bicakci, I. E. Bagci, and B. Tavli. 2011. Lifetime bounds of wireless sensor networks preserving perfect sink unobservability. IEEE Communications Letters 15, 2 (2011), 205--207.
[2]
G. F. Chai, M. Xu, W. Y. Xu, and Z. Y. Lin. 2012. Enhancing sink-location privacy in wireless sensor networks through k-anonymity. International Journal of Distributed Sensor Networks.
[3]
Z. Chen, A. Liu, and Z. Li, et al. 2016. Distributed duty cycle control for delay improvement in wireless sensor networks. Peer-to-Peer Networking and Applications 10, 3 (2017), 559--578. 2016.
[4]
K. Cho, M. H. Jo, T. Y. Kwon, H. H. Chen, and D. H. Lee. 2013. Classification and experimental analysis for clones detection approaches in wireless sensor networks. IEEE Systems Journal 7, 1 (2013), 26--35.
[5]
M. Dong, K. Ota, and A. Liu. 2016a. RMER: Reliable and energy efficient data collection for large-scale wireless sensor networks. IEEE Internet of Things Journal, 3, 4 (2016), 511--519.
[6]
M. Dong X. Liu, and Z Qian. 2015. QoE-ensured price competition model for emerging mobile networks. IEEE Wireless Communications 22, 4 (2015), 50--57.
[7]
S. Gao, H. Zhang, and S. K. Da. 2011. Efficient data collection in wireless sensor networks with path-constrained mobile sinks. IEEE Transactions on Mobile Computing 10, 4 (2011), 592--608.
[8]
Y. Huang, M. Zhao, and C. Xue. 2015. Joint WCET and update activity minimization for cyber-physical systems. ACM Transactions on Embedded Computing Systems (TECS) 14, 1 (2015), 1--6.
[9]
J. Hu, M. Xie, C. Pan, Q. Zhuge, E. H. M. Sha, and C. Xue. 2015. Low overhead software wear leveling for hybrid PCM+ DRAM main memory on embedded systems. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 23, 4 (2015), 654--663.
[10]
Y. Hu, M. Dong, K. Ota, A. Liu, and M. Guo. 2016. Mobile target detection in wireless sensor networks with adjustable sensing frequency. IEEE System Journal 10, 3 (2016) 1160--1171.
[11]
Y. Hu and A. Liu. 2015. An efficient heuristic subtraction deployment strategy to guarantee quality of event detection for WSNs. The Computer Journal 58, 8 (2015), 1747--1762.
[12]
S. Jason and M. Wolf. 2015. Tailoring design for embedded computer vision applications. Computer 48, 5 (2015), 58--62.
[13]
Y. Jian, S. Chen, Z. Zhang, and L. Zhang. 2008. A novel scheme for protecting receiver's location privacy in wireless sensor networks. IEEE Transactions on Wireless Communications 7, 10 (2008), 3769--3779.
[14]
P. Kamat, Y. Zhang, W. Trappe, et al. 2005. Enhancing source-location privacy in sensor network routing. In Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS’05). 599--608.
[15]
B. Kemal, G. Hakan, T. Bulent, and B. I. Ethem. 2011. Maximizing lifetime of event-unobservable wireless sensor networks, Computer Standards and Interfaces 33, 4 (2011), 401--410.
[16]
D. Lee, M. Wolf, and S. S. Bhattacharyya. 2013. High-performance and low-energy buffer mapping method for multiprocessor DSP systems. ACM Transactions on Embedded Computing Systems (TECS). 12, 3 (2013), 82.
[17]
X. Liu, M. Dong, K. Ota, L. T. Yang, and A. Liu. 2016a. Trace malicious source to guarantee cyber security for mass monitor critical infrastructure. Journal of Computer and System Sciences. 2016.
[18]
X. Liu, M. Dong, K. Ota, P. Hung, and A. Liu. 2016c. Service pricing decision in cyber-physical systems: Insights from game theory. IEEE Transactions on Services Computing 9, 2 (2016), 186--198.
[19]
N. Li, N. Zhang, S. K. Das, and B. Thuraisingham. 2009. Privacy preservation in wireless sensor networks: A state-of-the-art survey. Ad Hoc Networks 7, 8 (2009), 1501--1514.
[20]
W. F. Liang and J. L. Xu. 2013. Network lifetime maximization for time-sensitive data gathering in wireless sensor networks with a mobile sink. Wireless Communications and Mobile Computing 13, 14 (2013), 1263--1280.
[21]
Y. Liu, M. Dong, K. Ota, and A. Liu. 2016b. Activetrust: Secure and trustable routing in wireless sensor networks. IEEE Transactions on Information Forensics and Security 11, 9 (2016), 2013--2027.
[22]
A. Liu, Q. Zhang, and Z. Li, et al. 2016d. A green and reliable communication modeling for industrial internet of things. Computers 8 Electrical Engineering.
[23]
Z. H. Liu and W. Y. Xu. 2012. Determining sink location through zeroing-in attackers in wireless sensor networks. Wireless Networks 18, 3 (2012), 335--349.
[24]
J. Long, M. Dong, K. Ot, and K. A. Liu. 2014. Achieving source location privacy and network life-time maximization through tree-based diversionary routing in WSNs. IEEE Access 2, 633--651.
[25]
M. E. Mahmoud and X. M. Shen. 2012. A cloud-based scheme for protecting source-location privacy against hotspot-locating attack in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems 23, 10 (2012), 1805--1818.
[26]
K. Mehta, D. Liu, and M. Wright. 2007. Location privacy in sensor networks against a global eavesdropper. In Proceedings of IEEE International Conference on Network Protocols (ICNP’07), 314--323.
[27]
Y. J. Mo, B. Wang, W. Y. Liu, and L. T. Yang. 2013. A Sink-oriented layered clustering protocol for wireless sensor networks. Mobile Networks and Applications 18, 5 (2013), 639--650.
[28]
E. C.-H. Ngai and I. Rodhe. 2013. On providing location privacy for mobile sinks in wireless sensor networks. Wireless Networks 19, 1 (2013), 115--130.
[29]
OMNeT++ simulator. 2013. Homepage. Retrieved from http://www.omnetpp.org/>.
[30]
R. Rios and J. Lopez. 2011. Analysis of location privacy solutions in wireless sensor networks. IET Communications 5, 17 (2011), 2518--2532.
[31]
M. Shao, Y. Yang, S. Zhu, and G. H. Cao. 2008. Towards statistically strong source anonymity for sensor networks. In Proceedings of IEEE INFOCOM 2008, 51--55.
[32]
F. M. Tashtarian and M. H. Y. Moghaddama. 2015. ODT: Optimal deadline-based trajectory for mobile sinks in WSN: A decision tree and dynamic programming approach. Computer Networks 77 (2015), 128--143.
[33]
H. D. Wang, B. Sheng, and Q. Li. 2009. Privacy-aware routing in sensor networks, Computer Networks 53, 9 (2009), 1512--1529.
[34]
R. Xie, A. Liu, and J. Gao. 2016. A residual energy aware schedule scheme for WSNs employing adjustable awake/sleep duty cycle. Wireless Personal Communications 90, 4 (2016), 1859--1887.
[35]
Y. Yang, M. Shao, S. Zhu, B. Urgaonkar, and G. Cao. 2008. Towards event source unobservability with minimum network traffic. In Proceedings of the 1st ACM Conference on Wireless Network Security, 77--88.
[36]
K. U. Zhang and Y. Ozturk. 2005. Enhancing source-location privacy in sensor network routing. In Proceedings of the 25th IEEE International Conference on Distributed Computing Systems, 599--608.

Cited By

View all
  • (2022)Efficient Data Collection in IoT Networks Using Trajectory Encoded With Geometric ShapesIEEE Transactions on Sustainable Computing10.1109/TSUSC.2020.30442927:4(799-813)Online publication date: 1-Oct-2022
  • (2022)Energy-Aware Cross-Layer Technique for Countering Traffic Analysis Attacks on Wireless Sensor NetworkIEEE Access10.1109/ACCESS.2022.323036210(131036-131052)Online publication date: 2022
  • (2021)Node Location Privacy Protection in Unattended Wireless Sensor NetworksMathematical Problems in Engineering10.1155/2021/55393822021(1-17)Online publication date: 30-May-2021
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Embedded Computing Systems
ACM Transactions on Embedded Computing Systems  Volume 16, Issue 3
Special Issue on Embedded Computing for IoT, Special Issue on Big Data and Regular Papers
August 2017
610 pages
ISSN:1539-9087
EISSN:1558-3465
DOI:10.1145/3072970
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Journal Family

Publication History

Published: 26 May 2017
Accepted: 01 August 2016
Revised: 01 May 2016
Received: 01 December 2015
Published in TECS Volume 16, Issue 3

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Preserving sink-location privacy
  2. data collection
  3. delay
  4. routing
  5. security

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

  • National Natural Science Foundation of China
  • The National Basic Research Program of China (973 Program)

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)5
  • Downloads (Last 6 weeks)0
Reflects downloads up to 02 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Efficient Data Collection in IoT Networks Using Trajectory Encoded With Geometric ShapesIEEE Transactions on Sustainable Computing10.1109/TSUSC.2020.30442927:4(799-813)Online publication date: 1-Oct-2022
  • (2022)Energy-Aware Cross-Layer Technique for Countering Traffic Analysis Attacks on Wireless Sensor NetworkIEEE Access10.1109/ACCESS.2022.323036210(131036-131052)Online publication date: 2022
  • (2021)Node Location Privacy Protection in Unattended Wireless Sensor NetworksMathematical Problems in Engineering10.1155/2021/55393822021(1-17)Online publication date: 30-May-2021
  • (2021)Traffic Analysis Through Spatial and Temporal Correlation: Threat and CountermeasureIEEE Access10.1109/ACCESS.2021.30708419(54126-54151)Online publication date: 2021
  • (2020)Evolutionary game–based trajectory design algorithm for mobile sink in wireless sensor networksInternational Journal of Distributed Sensor Networks10.1177/155014772091100016:3(155014772091100)Online publication date: 6-Mar-2020
  • (2020)Distributed Energy-Aware Reliable Routing and TDMA Link Scheduling in Wireless Sensor Networks2020 29th International Conference on Computer Communications and Networks (ICCCN)10.1109/ICCCN49398.2020.9209621(1-10)Online publication date: Aug-2020
  • (2019)Generation of in-bounds inputs for arrays in memory-unsafe languagesProceedings of the 2019 IEEE/ACM International Symposium on Code Generation and Optimization10.5555/3314872.3314890(136-148)Online publication date: 16-Feb-2019
  • (2019)Multi-branch Source Location Privacy Protection Scheme Based on Random Walk in WSNs2019 IEEE 4th International Conference on Cloud Computing and Big Data Analysis (ICCCBDA)10.1109/ICCCBDA.2019.8725631(543-547)Online publication date: Apr-2019
  • (2019)Intelligent charge scheduling of electric vehicles in residential areasThe Journal of Engineering10.1049/joe.2018.91662019:23(8995-9000)Online publication date: 24-Oct-2019
  • (2018)Learning-based synchronous approach from forwarding nodes to reduce the delay for Industrial Internet of ThingsEURASIP Journal on Wireless Communications and Networking10.1186/s13638-017-1015-z2018:1Online publication date: 9-Jan-2018
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media