Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 4/2014

01.12.2014

Algorithms for promoting anonymity of BS and for prolonging network lifetime of WSN

verfasst von: Joy Iong-Zong Chen, Chu-Hsing Lin

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 4/2014

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Two novel algorithms called AERO (aware of energy residue oriented) and free-AERO are proposed in this work. They are adopted in boosting the anonymity of a mobile base station (BS) and prolonging the overall lifetime of WSN (wireless sensor network). Without including in our proposed is the trivial one fixed-BS. Generally, BS play an important role of gathering data from all sensor nodes deployed over a wide WSN region. Thus, not only the BS location can be protected accordingly by the calculation of obtained data, but it makes more difficult for a malicious entity to violate the network. To complete the aforementioned objectives are the primary motivation of the proposed algorithms. On the other hand, the contribution of the proposed two algorithms is both going to boost BS anonymity and to prolong network lifetime for a WSN. Entropy and GSAT test are adopted as the criteria in system performance comparison for the deployment of AERO and free-AERO algorithms. Two scenarios with 3 × 3 and 5 × 5 cells are conducted in the simulation. Experimental results show that the proposed methods definitely boost BS anonymity and greatly prolong the network lifetime very well. Several results are illustrated and compared to previous studies for validation. When the scale of the nodes in the network becomes larger (i.e., as much as double), the method becomes more effective. The frequency of BS movement can also be adjusted with different values, 30 min, 60 min, or 90 min, to improve BS anonymity as needed.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Paolo B, Prashant P, Vince WC, Stefano C, Alberto G, Fun Hu Y (2007) Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards. Comput Commun 5(30):1655–1695 Paolo B, Prashant P, Vince WC, Stefano C, Alberto G, Fun Hu Y (2007) Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards. Comput Commun 5(30):1655–1695
2.
Zurück zum Zitat Raji F, Ladani BT (2010) Anonymity and security for autonomous mobile agents. IET Inf Secur 12(4):397–410 Raji F, Ladani BT (2010) Anonymity and security for autonomous mobile agents. IET Inf Secur 12(4):397–410
3.
Zurück zum Zitat Yun Z, Yuguang F, Yanchao Z (2008) Securing wireless sensor networks: A survey. IEEE Commun 3(10):6–28 Yun Z, Yuguang F, Yanchao Z (2008) Securing wireless sensor networks: A survey. IEEE Commun 3(10):6–28
4.
Zurück zum Zitat Uday A, Mohamed Y (2010) ‘Increasing base-station anonymity in wireless sensor networks’. Ad Hoc Netw (8): 791–809 Uday A, Mohamed Y (2010) ‘Increasing base-station anonymity in wireless sensor networks’. Ad Hoc Netw (8): 791–809
5.
Zurück zum Zitat Jing D, Richard H, Shivakant M (2006) Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks. Elsevier Pervasive Mob Comput J 4(2):159–186 Jing D, Richard H, Shivakant M (2006) Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks. Elsevier Pervasive Mob Comput J 4(2):159–186
6.
Zurück zum Zitat Nezhad AA, Ali M, Dimitris M (2008) Location privacy and anonymity preserving routing for wireless sensor networks. Comput Netw 52:3433–3452MATH Nezhad AA, Ali M, Dimitris M (2008) Location privacy and anonymity preserving routing for wireless sensor networks. Comput Netw 52:3433–3452MATH
7.
Zurück zum Zitat Wang H, Sheng B, Li Q (2009) Privacy-aware routing in sensor networks. Comput Netw 53:1512–1529MATH Wang H, Sheng B, Li Q (2009) Privacy-aware routing in sensor networks. Comput Netw 53:1512–1529MATH
8.
Zurück zum Zitat Pfitzmann A, Hansen M (2010) ‘A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity, management’. Work draft Anon Terminol 8(34) Pfitzmann A, Hansen M (2010) ‘A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity, management’. Work draft Anon Terminol 8(34)
9.
Zurück zum Zitat Deng J, Han R, Mishra S (2003) ‘Enhancing base station security in wireless sensor networks’, Technical Report CU-CS951-03. Department of Computer Science, Univ. of Colorado, 4 Deng J, Han R, Mishra S (2003) ‘Enhancing base station security in wireless sensor networks’, Technical Report CU-CS951-03. Department of Computer Science, Univ. of Colorado, 4
10.
Zurück zum Zitat Deng J, Han R, Mishra S (2005) ‘Countermeasures against Traffic Analysis Attacks in Wireless Sensor Networks’. Secur Priv Emerg Areas Commun Netw 9 Deng J, Han R, Mishra S (2005) ‘Countermeasures against Traffic Analysis Attacks in Wireless Sensor Networks’. Secur Priv Emerg Areas Commun Netw 9
11.
Zurück zum Zitat Jian Y, Chen SG, Zhang Z, Zhang L (2007) ‘Protecting receiver-location privacy in wireless sensor networks’. Comput Commun (INFOCOM 2007) (5): 1955–1963 Jian Y, Chen SG, Zhang Z, Zhang L (2007) ‘Protecting receiver-location privacy in wireless sensor networks’. Comput Commun (INFOCOM 2007) (5): 1955–1963
12.
Zurück zum Zitat Basagni S, Carosi A, Melachrinoudis E, Petrioli C, Wang ZM (2008) Controlled sink mobility for prolonging wireless sensor networks lifetime. Wirel Netw 14:831–858 Basagni S, Carosi A, Melachrinoudis E, Petrioli C, Wang ZM (2008) Controlled sink mobility for prolonging wireless sensor networks lifetime. Wirel Netw 14:831–858
13.
Zurück zum Zitat Yang Y, Fonoage MI, Cardei M (2010) Improving network lifetime with mobile wireless sensor networks. Comput Commun 33:409–419 Yang Y, Fonoage MI, Cardei M (2010) Improving network lifetime with mobile wireless sensor networks. Comput Commun 33:409–419
14.
Zurück zum Zitat Young SY, Xia Y (2010) ‘Maximizing the lifetime of wireless sensor networks with mobile sink in delay-tolerant applications’. IEEE Trans mob comput 9(9) Young SY, Xia Y (2010) ‘Maximizing the lifetime of wireless sensor networks with mobile sink in delay-tolerant applications’. IEEE Trans mob comput 9(9)
15.
Zurück zum Zitat Mirela M, Mihaela C (2008) Using sink mobility to increase wireless sensor networks lifetime. World of Wireless, Mobile and Multimedia Networks, USA, pp 1–10 Mirela M, Mihaela C (2008) Using sink mobility to increase wireless sensor networks lifetime. World of Wireless, Mobile and Multimedia Networks, USA, pp 1–10
16.
Zurück zum Zitat Yang T, Ikeda M, Mino G, Barolli L, Durresi A, Xhafa F (2010) ‘Performance evaluation of wireless sensor networks for mobile sink considering consumed energy metric’. IEEE International Conference on Advanced Information Networking and Applications Workshops, Perth. Australia, pp 245–250 Yang T, Ikeda M, Mino G, Barolli L, Durresi A, Xhafa F (2010) ‘Performance evaluation of wireless sensor networks for mobile sink considering consumed energy metric’. IEEE International Conference on Advanced Information Networking and Applications Workshops, Perth. Australia, pp 245–250
17.
Zurück zum Zitat Manoj KJ, Lawrence O, Bo S, Makki SK (2011) ‘Hot spot aware energy efficient clustering approach for wireless sensor networks’. IEEE Consumer Communications and Networking Conference, Las Vegas, USA, pp 585–589 Manoj KJ, Lawrence O, Bo S, Makki SK (2011) ‘Hot spot aware energy efficient clustering approach for wireless sensor networks’. IEEE Consumer Communications and Networking Conference, Las Vegas, USA, pp 585–589
18.
Zurück zum Zitat Shah RC, Roy S, Jain S, Brunette W (2003) ‘Data MULEs: Modeling a three-tier architecture for sparse sensor networks’. IEEE International Workshop on Sensor Network Protocols and Applications, pp 30–41 Shah RC, Roy S, Jain S, Brunette W (2003) ‘Data MULEs: Modeling a three-tier architecture for sparse sensor networks’. IEEE International Workshop on Sensor Network Protocols and Applications, pp 30–41
19.
Zurück zum Zitat Kim HS, Abdelzaher TF, Kwon WH (2003) Minimum energy asynchronous dissemination to mobile sinks in wireless sensor networks. Embedded Networked Sensor Systems, Los Angeles, pp 193–204 Kim HS, Abdelzaher TF, Kwon WH (2003) Minimum energy asynchronous dissemination to mobile sinks in wireless sensor networks. Embedded Networked Sensor Systems, Los Angeles, pp 193–204
20.
Zurück zum Zitat Lai S, Ravindran B (2011) Achieving max-min lifetime and fairness with rate allocation for data aggregation in sensor networks. Ad Hoc Netw 9:821–834 Lai S, Ravindran B (2011) Achieving max-min lifetime and fairness with rate allocation for data aggregation in sensor networks. Ad Hoc Netw 9:821–834
21.
Zurück zum Zitat Shannon CE (1948) A mathematical theory of communication. Bell Syst Tech J 27:623–656MathSciNet Shannon CE (1948) A mathematical theory of communication. Bell Syst Tech J 27:623–656MathSciNet
22.
Zurück zum Zitat Selman B, Levesque H, Mitchell D (1992) ‘A new method for solving hard satisfiability problems’, Proceedings of 10th National Conference on Artificial Intelligence (AAAI’92), San Jose, CA, pp 440–446 Selman B, Levesque H, Mitchell D (1992) ‘A new method for solving hard satisfiability problems’, Proceedings of 10th National Conference on Artificial Intelligence (AAAI’92), San Jose, CA, pp 440–446
Metadaten
Titel
Algorithms for promoting anonymity of BS and for prolonging network lifetime of WSN
verfasst von
Joy Iong-Zong Chen
Chu-Hsing Lin
Publikationsdatum
01.12.2014
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 4/2014
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-012-0194-y

Weitere Artikel der Ausgabe 4/2014

Peer-to-Peer Networking and Applications 4/2014 Zur Ausgabe

Premium Partner