ABSTRACT
The popularity of Wireless sensor network (WSN) has emerged in the 21st century. It is one of the emerging technologies, which comprises of a collection of sensor nodes that are linked to each other through a network. This paper digs deep into the security of location privacy. Further, it highlights how the protocols allow electronic devices to communicate with one another safely through protection of data and location. There are different types of adversaries such as undirected random paths, directed random paths and network loop methods. These adversaries can threaten the security, thus understanding them priory is essential in the development of a better protocol, as each one has its strengths and weaknesses. Three protocols are compared and analyzed: Phantom Routing, Rumor Routing and Greedy Random Walk protocol. The best features from each protocol are selected and placed in an enhanced protocol. This work leads to a proposal for an energy-aware privacy preservation protocol, named “Phantom++”.
- E. Suganya, S. Sountharrajan, S. K. Shandilya, and M. Karthiga, “IoT in Agriculture Investigation on Plant Diseases and Nutrient Level Using Image Analysis Techniques,” Internet of Things in Biomedical Engineering, 01-Nov-2019. [Online]. Available: https://www.sciencedirect.com/science/article/pii/B9780128173565000073. [Accessed: 10-Nov-2020].Google Scholar
- Rios, R. and Lopez, J., 2020. Analysis Of Location Privacy Solutions In Wireless Sensor Networks. [online] Nics.uma.es. Available at: <https://www.nics.uma.es/pub/papers/Rios2011a_1.pdf>[Accessed 22 November 2020].Google Scholar
- Y. Rao, G. Abhinav, K. Mahesh, S. Mastanvali and N. Sirisha, “Location Privacy Protection in Wireless Sensor Networks”, Qis College of Engineering and Technology, 2020 [Online]. Available: http://www.joics.org/gallery/ics-2678.pdf. [Accessed: 12-Oct-2020]Google Scholar
- Chen, H. and Lou, W., n.d. From Nowhere To Somewhere: Protecting End-To-End Location Privacy In Wireless Sensor Networks. Hong Kong. [online] Nics.uma.es. Available at: [Accessed 22 November 2020].Google Scholar
- Christensson, Per. "Protocol Definition." TechTerms. (March 29, 2019). [Online]. Available: https://techterms.com/definition/protocol. [Accessed: 10-Nov-2020].Google Scholar
- M. Rouse, A. Irei , and D. Udiminue, “What is a Network Protocol? - Definition from WhatIs.com,” SearchNetworking, 17-Jul-2019. [Online]. Available: https://searchnetworking.techtarget.com/definition/protocol. [Accessed: 10-Nov-2020].Google Scholar
- Chinnu, G. and Dhinakaran, N., 2012. [online] Research.ijcaonline.org. Available at: <https://research.ijcaonline.org/volume56/number5/pxc3882889.pdf>[Accessed 22 November 2020].Google Scholar
- The Code affirms an obligation of computing professionals to use their skills for the benefit of society. (n.d.). Retrieved November 23, 2020, from https://www.acm.org/code-of-ethicsGoogle Scholar
- Watt, A. (2014, August 14). 16. Risk Management Planning – Project Management. Pressbooks. https://opentextbc.ca/projectmanagement/chapter/chapter-16-risk-management-planning-project-management/Google Scholar
- Chinnu, G. and Dhinakaran, N., 2012. [online] Research.ijcaonline.org. Available at: <https://research.ijcaonline.org/volume56/number5/pxc3882889.pdf>[Accessed 22 November 2020].Google Scholar
- Y. Xi, L. Schwiebert, and W. Shi, “Preserving Source Location Privacy in Monitoring-based Wireless Sensor Networks”, Wayne State University, January 2006 [Online]. Available: https://www.researchgate.net/publication/220949726_Preserving_source_location_privacy_in_monitoring-based_wireless_sensor_networks. [Accessed: 14-Sep-2020] Google ScholarDigital Library
- Kumar, V., Jain, A. and Barwal, P., 2014. Wireless Sensor Networks: Security Issues, Challenges And Solutions. [online] http://www.irphouse.com. Available at: <https://www.researchgate.net/publication/331299729_Wireless_Sensor_Network_Challenges_and_Solutions>[Accessed 23 November 2020].Google Scholar
- Kavitha, T. and Sridharan, D., 2014. Security Vulnerabilities In Wireless Sensor Networks: A Survey. [online] : https://www.researchgate.net/publication/266591710. Available at: <https://www.researchgate.net/publication/266591710_Security_Vulnerabilities_In_Wireless_Sensor_Networks_A_Survey>[Accessed 23 November 2020].Google Scholar
- N. Ababneh, and S. Selvadouri “TOPOLOGY CONTROL ALGORITHMS FOR WIRELESS SENSOR NETWORKS: AN OVERVIEW,” International Journal on Wireless & Optical Communications. [Online]. Available: https://www.academia.edu/170067/TOPOLOGY_CONTROL_ALGORITHMS_FOR_WIRELESS_SENSOR_NETWORKS_AN_OVERVIEW. [Accessed: 25-Jan-2021].Google Scholar
- N. Ababneh, A. M. Ortiz, N. Timmons, and J. Morisson, “Google Scholar
- H. H. S. Ullah, S. G. M. Chen, W. S. IF. Akyildiz, D. Z. J. Liu, A. S. D. Santos, Z. M. W. Masri, Y.-L. K. C-C. Hu, A. P. C. WB. Heinzelman, N. T. Q. Tang, J. G. K. Sohrabi, and B. B. B. Latre, “A cross-layer QoS-aware optimization protocol for guaranteed data streaming over wireless body area networks,” Telecommunication Systems, 01-Jan-1970. [Online]. Available: https://link.springer.com/article/10.1007%2Fs11235-014-9901-8. [Accessed: 25-Jan-2021].Google Scholar
- N. Ababneh, H. Labiod, and N. Boukhatem, “Evaluation of routing protocols for VANETs in urban environments,” INFONA. [Online]. Available: https://www.infona.pl/resource/bwmeta1.element.ieee-art-000005469808. [Accessed: 25-Jan-2021].Google Scholar
Index Terms
- Grid‐Based Source Location Privacy Protection Schemes in IoT Wireless Sensor Networks
Recommendations
Providing Source-Location Privacy in Wireless Sensor Networks
WASA '09: Proceedings of the 4th International Conference on Wireless Algorithms, Systems, and ApplicationsWireless sensor networks (WSN) have been widely used in many areas for unattended event monitoring. Mainly due to lack of a protected physical boundary, wireless communications are vulnerable to unauthorized detection, interception and and even node ...
Efficient anonymity schemes for clustered wireless sensor networks
In this paper, we propose two simple and efficient schemes for establishing anonymity in Clustered Wireless Sensor Networks (CWSNs). The first scheme Simple Anonymity Scheme (SAS), uses a range of pseudonyms as identifiers for a node to ensure ...
Preserving source-location privacy in wireless sensor networks
SECON'09: Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and NetworksWireless sensor networks (WSN) have the potential to be widely used in many areas for unattended event monitoring. Mainly due to lack of a protected physical boundary, wireless communications are vulnerable to unauthorized interception and detection. ...
Comments