skip to main content
10.1145/3456146.3456152acmotherconferencesArticle/Chapter ViewAbstractPublication PagesdsdeConference Proceedingsconference-collections
research-article

Grid‐Based Source Location Privacy Protection Schemes in IoT Wireless Sensor Networks

Published:08 July 2021Publication History

ABSTRACT

The popularity of Wireless sensor network (WSN) has emerged in the 21st century. It is one of the emerging technologies, which comprises of a collection of sensor nodes that are linked to each other through a network. This paper digs deep into the security of location privacy. Further, it highlights how the protocols allow electronic devices to communicate with one another safely through protection of data and location. There are different types of adversaries such as undirected random paths, directed random paths and network loop methods. These adversaries can threaten the security, thus understanding them priory is essential in the development of a better protocol, as each one has its strengths and weaknesses. Three protocols are compared and analyzed: Phantom Routing, Rumor Routing and Greedy Random Walk protocol. The best features from each protocol are selected and placed in an enhanced protocol. This work leads to a proposal for an energy-aware privacy preservation protocol, named “Phantom++”.

References

  1. E. Suganya, S. Sountharrajan, S. K. Shandilya, and M. Karthiga, “IoT in Agriculture Investigation on Plant Diseases and Nutrient Level Using Image Analysis Techniques,” Internet of Things in Biomedical Engineering, 01-Nov-2019. [Online]. Available: https://www.sciencedirect.com/science/article/pii/B9780128173565000073. [Accessed: 10-Nov-2020].Google ScholarGoogle Scholar
  2. Rios, R. and Lopez, J., 2020. Analysis Of Location Privacy Solutions In Wireless Sensor Networks. [online] Nics.uma.es. Available at: <https://www.nics.uma.es/pub/papers/Rios2011a_1.pdf>[Accessed 22 November 2020].Google ScholarGoogle Scholar
  3. Y. Rao, G. Abhinav, K. Mahesh, S. Mastanvali and N. Sirisha, “Location Privacy Protection in Wireless Sensor Networks”, Qis College of Engineering and Technology, 2020 [Online]. Available: http://www.joics.org/gallery/ics-2678.pdf. [Accessed: 12-Oct-2020]Google ScholarGoogle Scholar
  4. Chen, H. and Lou, W., n.d. From Nowhere To Somewhere: Protecting End-To-End Location Privacy In Wireless Sensor Networks. Hong Kong. [online] Nics.uma.es. Available at: [Accessed 22 November 2020].Google ScholarGoogle Scholar
  5. Christensson, Per. "Protocol Definition." TechTerms. (March 29, 2019). [Online]. Available: https://techterms.com/definition/protocol. [Accessed: 10-Nov-2020].Google ScholarGoogle Scholar
  6. M. Rouse, A. Irei , and D. Udiminue, “What is a Network Protocol? - Definition from WhatIs.com,” SearchNetworking, 17-Jul-2019. [Online]. Available: https://searchnetworking.techtarget.com/definition/protocol. [Accessed: 10-Nov-2020].Google ScholarGoogle Scholar
  7. Chinnu, G. and Dhinakaran, N., 2012. [online] Research.ijcaonline.org. Available at: <https://research.ijcaonline.org/volume56/number5/pxc3882889.pdf>[Accessed 22 November 2020].Google ScholarGoogle Scholar
  8. The Code affirms an obligation of computing professionals to use their skills for the benefit of society. (n.d.). Retrieved November 23, 2020, from https://www.acm.org/code-of-ethicsGoogle ScholarGoogle Scholar
  9. Watt, A. (2014, August 14). 16. Risk Management Planning – Project Management. Pressbooks. https://opentextbc.ca/projectmanagement/chapter/chapter-16-risk-management-planning-project-management/Google ScholarGoogle Scholar
  10. Chinnu, G. and Dhinakaran, N., 2012. [online] Research.ijcaonline.org. Available at: <https://research.ijcaonline.org/volume56/number5/pxc3882889.pdf>[Accessed 22 November 2020].Google ScholarGoogle Scholar
  11. Y. Xi, L. Schwiebert, and W. Shi, “Preserving Source Location Privacy in Monitoring-based Wireless Sensor Networks”, Wayne State University, January 2006 [Online]. Available: https://www.researchgate.net/publication/220949726_Preserving_source_location_privacy_in_monitoring-based_wireless_sensor_networks. [Accessed: 14-Sep-2020] Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Kumar, V., Jain, A. and Barwal, P., 2014. Wireless Sensor Networks: Security Issues, Challenges And Solutions. [online] http://www.irphouse.com. Available at: <https://www.researchgate.net/publication/331299729_Wireless_Sensor_Network_Challenges_and_Solutions>[Accessed 23 November 2020].Google ScholarGoogle Scholar
  13. Kavitha, T. and Sridharan, D., 2014. Security Vulnerabilities In Wireless Sensor Networks: A Survey. [online] : https://www.researchgate.net/publication/266591710. Available at: <https://www.researchgate.net/publication/266591710_Security_Vulnerabilities_In_Wireless_Sensor_Networks_A_Survey>[Accessed 23 November 2020].Google ScholarGoogle Scholar
  14. N. Ababneh, and S. Selvadouri “TOPOLOGY CONTROL ALGORITHMS FOR WIRELESS SENSOR NETWORKS: AN OVERVIEW,” International Journal on Wireless & Optical Communications. [Online]. Available: https://www.academia.edu/170067/TOPOLOGY_CONTROL_ALGORITHMS_FOR_WIRELESS_SENSOR_NETWORKS_AN_OVERVIEW. [Accessed: 25-Jan-2021].Google ScholarGoogle Scholar
  15. N. Ababneh, A. M. Ortiz, N. Timmons, and J. Morisson, “Google ScholarGoogle Scholar
  16. H. H. S. Ullah, S. G. M. Chen, W. S. IF. Akyildiz, D. Z. J. Liu, A. S. D. Santos, Z. M. W. Masri, Y.-L. K. C-C. Hu, A. P. C. WB. Heinzelman, N. T. Q. Tang, J. G. K. Sohrabi, and B. B. B. Latre, “A cross-layer QoS-aware optimization protocol for guaranteed data streaming over wireless body area networks,” Telecommunication Systems, 01-Jan-1970. [Online]. Available: https://link.springer.com/article/10.1007%2Fs11235-014-9901-8. [Accessed: 25-Jan-2021].Google ScholarGoogle Scholar
  17. N. Ababneh, H. Labiod, and N. Boukhatem, “Evaluation of routing protocols for VANETs in urban environments,” INFONA. [Online]. Available: https://www.infona.pl/resource/bwmeta1.element.ieee-art-000005469808. [Accessed: 25-Jan-2021].Google ScholarGoogle Scholar

Index Terms

  1. Grid‐Based Source Location Privacy Protection Schemes in IoT Wireless Sensor Networks
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            DSDE '21: 2021 4th International Conference on Data Storage and Data Engineering
            February 2021
            165 pages
            ISBN:9781450389303
            DOI:10.1145/3456146

            Copyright © 2021 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 8 July 2021

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Research
            • Refereed limited

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format .

          View HTML Format