Skip to main content
Top
Published in: Wireless Networks 2/2023

25-10-2022 | Original Paper

Congestion avoidance with source location privacy using octopus-based dynamic routing protocol in WSN

Authors: Mintu Singh, Maheshwari Prasad Singh

Published in: Wireless Networks | Issue 2/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Wireless sensor network (WSN) is a collection of geographically distributed sensor nodes (SNs) responsible for data collection and transmission over the Internet. Since the SNs associated with the network are placed in harsh environments, conventional security measures become inadequate to assure secure transmission. This article proposes an efficient dynamic routing protocol that addresses this issue with privacy solutions and congestion avoidance. Clustering is one of the most popular approaches followed in WSNs to preserve privacy efficiently. This work uses the K-medoid clustering technique to build a clustering based source location privacy model. An optimal node is elected as the cluster head for each cluster using the proposed adaptive jellyfish search optimizer algorithm. Then, the optimal path for the data transmission process is obtained using the proposed octopus structure-based routing scheme. The proposed method is implemented using the NS2 platform, and the comparative analysis against the existing methods proved its efficacy in various performance metrics.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Wang, N., Fu, J., Zeng, J., & Bhargava, B. K. (2018). Source-location privacy full protection in wireless sensor networks. Information Sciences, 444, 105–121.CrossRefMATH Wang, N., Fu, J., Zeng, J., & Bhargava, B. K. (2018). Source-location privacy full protection in wireless sensor networks. Information Sciences, 444, 105–121.CrossRefMATH
2.
go back to reference Conti, M., Willemsen, J., & Crispo, B. (2013). Providing source location privacy in wireless sensor networks: A survey. IEEE Communications Surveys & Tutorials, 15(3), 1238–1280.CrossRef Conti, M., Willemsen, J., & Crispo, B. (2013). Providing source location privacy in wireless sensor networks: A survey. IEEE Communications Surveys & Tutorials, 15(3), 1238–1280.CrossRef
3.
go back to reference Lightfoot, L., Li, Y., & Ren, J. (2016). STaR: Design and quantitative measurement of source-location privacy for wireless sensor networks. Security and Communication Networks, 9(3), 220–228.CrossRef Lightfoot, L., Li, Y., & Ren, J. (2016). STaR: Design and quantitative measurement of source-location privacy for wireless sensor networks. Security and Communication Networks, 9(3), 220–228.CrossRef
4.
go back to reference Berdibek, A., & Saginbekov, S. (2019). A routing protocol for source location privacy in wireless sensor networks with multiple sources. In Proceedings of the 15th ACM international symposium on QoS and security for wireless and mobile networks, (pp. 93–99). Berdibek, A., & Saginbekov, S. (2019). A routing protocol for source location privacy in wireless sensor networks with multiple sources. In Proceedings of the 15th ACM international symposium on QoS and security for wireless and mobile networks, (pp. 93–99).
5.
go back to reference Baroutis, N., & Younis, M. (2017). Load-conscious maximization of base-station location privacy in wireless sensor networks. Computer Networks, 124, 126–139.CrossRef Baroutis, N., & Younis, M. (2017). Load-conscious maximization of base-station location privacy in wireless sensor networks. Computer Networks, 124, 126–139.CrossRef
6.
go back to reference Han, G., Wang, H., Jiang, J., Zhang, W., & Chan, S. (2018). CASLP: A confused arc-based source location privacy protection scheme in WSNs for IoT. IEEE Communications Magazine, 56(9), 42–47.CrossRef Han, G., Wang, H., Jiang, J., Zhang, W., & Chan, S. (2018). CASLP: A confused arc-based source location privacy protection scheme in WSNs for IoT. IEEE Communications Magazine, 56(9), 42–47.CrossRef
7.
go back to reference Han, G., Xu, M., He, Y., Jiang, J., Ansere, J. A., & Zhang, W. (2019). A dynamic ring-based routing scheme for source location privacy in wireless sensor networks. Information Sciences, 504, 308–323.CrossRef Han, G., Xu, M., He, Y., Jiang, J., Ansere, J. A., & Zhang, W. (2019). A dynamic ring-based routing scheme for source location privacy in wireless sensor networks. Information Sciences, 504, 308–323.CrossRef
8.
go back to reference Bradbury, M., Jhumka, A., & Leeke, M. (2018). Hybrid online protocols for source location privacy in wireless sensor networks. Journal of Parallel and Distributed Computing, 115, 67–81.CrossRef Bradbury, M., Jhumka, A., & Leeke, M. (2018). Hybrid online protocols for source location privacy in wireless sensor networks. Journal of Parallel and Distributed Computing, 115, 67–81.CrossRef
9.
go back to reference Chow, C. Y., Mokbel, M. F., & He, T. (2010). A privacy-preserving location monitoring system for wireless sensor networks. IEEE Transactions on Mobile Computing, 10(1), 94–107.CrossRef Chow, C. Y., Mokbel, M. F., & He, T. (2010). A privacy-preserving location monitoring system for wireless sensor networks. IEEE Transactions on Mobile Computing, 10(1), 94–107.CrossRef
10.
go back to reference Nassiri, A., Razzaque, M.A., & Abdullah, A.H. (2016). Isolated adversary zone for source location privacy in wireless sensor networks. In 2016 international wireless communications and mobile computing conference (IWCMC) IEEE. (pp. 108–113). Nassiri, A., Razzaque, M.A., & Abdullah, A.H. (2016). Isolated adversary zone for source location privacy in wireless sensor networks. In 2016 international wireless communications and mobile computing conference (IWCMC) IEEE. (pp. 108–113).
11.
go back to reference Escolar, S., Chessa, S., & Carretero, J. (2014). Energy management in solar cells powered wireless sensor networks for quality of service optimization. Personal and ubiquitous computing, 18(2), 449–464.CrossRef Escolar, S., Chessa, S., & Carretero, J. (2014). Energy management in solar cells powered wireless sensor networks for quality of service optimization. Personal and ubiquitous computing, 18(2), 449–464.CrossRef
12.
go back to reference Liu, A., Zhang, Q., Li, Z., Choi, Y. J., Li, J., & Komuro, N. (2017). A green and reliable communication modeling for industrial Internet of things. Computers & Electrical Engineering, 58, 364–381.CrossRef Liu, A., Zhang, Q., Li, Z., Choi, Y. J., Li, J., & Komuro, N. (2017). A green and reliable communication modeling for industrial Internet of things. Computers & Electrical Engineering, 58, 364–381.CrossRef
13.
go back to reference Long, J., Dong, M., Ota, K., & Liu, A. (2014). Achieving source location privacy and network lifetime maximization through tree-based diversionary routing in wireless sensor networks. IEEE Access, 2, 633–651.CrossRef Long, J., Dong, M., Ota, K., & Liu, A. (2014). Achieving source location privacy and network lifetime maximization through tree-based diversionary routing in wireless sensor networks. IEEE Access, 2, 633–651.CrossRef
14.
go back to reference Mahmoud, M. M., & Shen, X. (2011). A cloud-based scheme for protecting source-location privacy against hotspot-locating attack in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 23(10), 1805–1818.CrossRef Mahmoud, M. M., & Shen, X. (2011). A cloud-based scheme for protecting source-location privacy against hotspot-locating attack in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 23(10), 1805–1818.CrossRef
15.
go back to reference Liu, Y., Dong, M., Ota, K., & Liu, A. (2016). ActiveTrust: Secure and trustable routing in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 11(9), 2013–2027.CrossRef Liu, Y., Dong, M., Ota, K., & Liu, A. (2016). ActiveTrust: Secure and trustable routing in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 11(9), 2013–2027.CrossRef
16.
go back to reference Lu, R., Lin, X., Liang, X., & Shen, X. (2011). A dynamic privacy-preserving key management scheme for location-based services in VANETs. IEEE Transactions on Intelligent Transportation Systems, 13(1), 127–139.CrossRef Lu, R., Lin, X., Liang, X., & Shen, X. (2011). A dynamic privacy-preserving key management scheme for location-based services in VANETs. IEEE Transactions on Intelligent Transportation Systems, 13(1), 127–139.CrossRef
17.
go back to reference Huang, C., Ma, M., Liu, Y., & Liu, A. (2017). Preserving source location privacy for energy harvesting WSNs. Sensors, 17(4), 724.CrossRef Huang, C., Ma, M., Liu, Y., & Liu, A. (2017). Preserving source location privacy for energy harvesting WSNs. Sensors, 17(4), 724.CrossRef
18.
go back to reference Mutalemwa, L.C., & Shin, S. (2017). A new diversional routing scheme to preserve source location privacy in wireless sensor networks. In: Proceedings of the 3rd international conference on next generation computing (ICNGC2017b), Kaohsiung, Taiwan, (pp. 21–23). Mutalemwa, L.C., & Shin, S. (2017). A new diversional routing scheme to preserve source location privacy in wireless sensor networks. In: Proceedings of the 3rd international conference on next generation computing (ICNGC2017b), Kaohsiung, Taiwan, (pp. 21–23).
19.
go back to reference Mutalemwa, L. C., & Shin, S. (2018). Strategic location-based random routing for source location privacy in wireless sensor networks. Sensors, 18(7), 2291.CrossRef Mutalemwa, L. C., & Shin, S. (2018). Strategic location-based random routing for source location privacy in wireless sensor networks. Sensors, 18(7), 2291.CrossRef
20.
go back to reference Roy, P.K., Singh, J.P., & Kumar, P. (2016). An efficient privacy preserving protocol for source location privacy in wireless sensor networks. In 2016 international conference on wireless communications, signal processing and networking (WiSPNET), IEEE (pp. 1093–1097). Roy, P.K., Singh, J.P., & Kumar, P. (2016). An efficient privacy preserving protocol for source location privacy in wireless sensor networks. In 2016 international conference on wireless communications, signal processing and networking (WiSPNET), IEEE (pp. 1093–1097).
21.
go back to reference Christopher, V. B., & Jasper, J. (2020). Jellyfish dynamic routing protocol with mobile sink for location privacy and congestion avoidance in wireless sensor networks. Journal of Systems Architecture, 112, 101840.CrossRef Christopher, V. B., & Jasper, J. (2020). Jellyfish dynamic routing protocol with mobile sink for location privacy and congestion avoidance in wireless sensor networks. Journal of Systems Architecture, 112, 101840.CrossRef
22.
go back to reference Gu, C., Bradbury, M., & Jhumka, A. (2019). Phantom walkabouts: A customizable source location privacy aware routing protocol for wireless sensor networks. Concurrency and Computation: Practice and Experience, 31(20), e5304.CrossRef Gu, C., Bradbury, M., & Jhumka, A. (2019). Phantom walkabouts: A customizable source location privacy aware routing protocol for wireless sensor networks. Concurrency and Computation: Practice and Experience, 31(20), e5304.CrossRef
23.
go back to reference Han, G., Wang, H., Miao, X., Liu, L., Jiang, J., & Peng, Y. (2019). A dynamic multipath scheme for protecting source-location privacy using multiple sinks in WSNs intended for IIoT. IEEE Transactions on Industrial Informatics, 16(8), 5527–5538.CrossRef Han, G., Wang, H., Miao, X., Liu, L., Jiang, J., & Peng, Y. (2019). A dynamic multipath scheme for protecting source-location privacy using multiple sinks in WSNs intended for IIoT. IEEE Transactions on Industrial Informatics, 16(8), 5527–5538.CrossRef
24.
go back to reference He, Y., Han, G., Wang, H., Ansere, J. A., & Zhang, W. (2019). A sector-based random routing scheme for protecting the source location privacy in WSNs for the Internet of Things. Future Generation Computer Systems, 96, 438–448.CrossRef He, Y., Han, G., Wang, H., Ansere, J. A., & Zhang, W. (2019). A sector-based random routing scheme for protecting the source location privacy in WSNs for the Internet of Things. Future Generation Computer Systems, 96, 438–448.CrossRef
25.
go back to reference Jan, N., & Khan, S. (2019). Energy-efficient source location privacy protection for network lifetime maximization against local eavesdropper in wireless sensor network (EeSP). Transactions on Emerging Telecommunications Technologies, 33, e3703. Jan, N., & Khan, S. (2019). Energy-efficient source location privacy protection for network lifetime maximization against local eavesdropper in wireless sensor network (EeSP). Transactions on Emerging Telecommunications Technologies, 33, e3703.
26.
go back to reference Yadav, S.L., Ujjwal, R.L., Kumar, S., Kaiwartya, O., Kumar, M., & Kashyap, P.K. (2021). Traffic and energy aware optimization for congestion control in next generation wireless sensor networks. Journal of Sensors. Yadav, S.L., Ujjwal, R.L., Kumar, S., Kaiwartya, O., Kumar, M., & Kashyap, P.K. (2021). Traffic and energy aware optimization for congestion control in next generation wireless sensor networks. Journal of Sensors.
27.
go back to reference Moharamkhani, E., Zadmehr, B., Memarian, S., Saber, M. J., & Shokouhifar, M. (2021). Multi-objective fuzzy knowledge-based bacterial foraging optimization for congestion control in clustered wireless sensor networks. International Journal of Communication Systems, 34(16), e4949.CrossRef Moharamkhani, E., Zadmehr, B., Memarian, S., Saber, M. J., & Shokouhifar, M. (2021). Multi-objective fuzzy knowledge-based bacterial foraging optimization for congestion control in clustered wireless sensor networks. International Journal of Communication Systems, 34(16), e4949.CrossRef
28.
go back to reference Prakash, P. S., Kavitha, D., & Reddy, P. C. (2022). Multi-objective approach to improve network lifetime and congestion control routing for wireless sensor networks. Computer Assisted Methods in Engineering and Science, 29(1–2), 49–69. Prakash, P. S., Kavitha, D., & Reddy, P. C. (2022). Multi-objective approach to improve network lifetime and congestion control routing for wireless sensor networks. Computer Assisted Methods in Engineering and Science, 29(1–2), 49–69.
29.
go back to reference Dogra, P., and Kumar, R. (2020). Fuzzy K-Medoid Clustering Strategy for Heterogeneous and Dynamic Data for IoT Scenario. In: Proceedings of International Conference on IoT Inclusive Life (ICIIL 2019), NITTTR Chandigarh, India (pp. 279–290) Springer, Singapore. Dogra, P., and Kumar, R. (2020). Fuzzy K-Medoid Clustering Strategy for Heterogeneous and Dynamic Data for IoT Scenario. In: Proceedings of International Conference on IoT Inclusive Life (ICIIL 2019), NITTTR Chandigarh, India (pp. 279–290) Springer, Singapore.
30.
go back to reference Chou, J. S., & Truong, D. N. (2021). A novel metaheuristic optimizer inspired by behavior of jellyfish in ocean. Applied Mathematics and Computation, 389, 125535.CrossRefMATH Chou, J. S., & Truong, D. N. (2021). A novel metaheuristic optimizer inspired by behavior of jellyfish in ocean. Applied Mathematics and Computation, 389, 125535.CrossRefMATH
31.
go back to reference Mukherjee, A., & De, D. (2018). Octopus algorithm for wireless personal communications. Wireless Personal Communications, 101(1), 531–565.CrossRef Mukherjee, A., & De, D. (2018). Octopus algorithm for wireless personal communications. Wireless Personal Communications, 101(1), 531–565.CrossRef
32.
go back to reference Airehrour, D., Gutierrez, J. A., & Ray, S. K. (2019). SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things. Future Generation Computer Systems, 93, 860–876.CrossRef Airehrour, D., Gutierrez, J. A., & Ray, S. K. (2019). SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things. Future Generation Computer Systems, 93, 860–876.CrossRef
33.
go back to reference Edla, D. R., Kongara, M. C., & Cheruku, R. (2019). A PSO based routing with novel fitness function for improving lifetime of WSNs. Wireless Personal Communications, 104(1), 73–89.CrossRef Edla, D. R., Kongara, M. C., & Cheruku, R. (2019). A PSO based routing with novel fitness function for improving lifetime of WSNs. Wireless Personal Communications, 104(1), 73–89.CrossRef
34.
go back to reference Binu, G. S., & Shajimohan, B. (2020). A novel heuristic based energy efficient routing strategy in wireless sensor network. Peer-to-Peer Networking and Applications, 13(6), 1853–1871.CrossRef Binu, G. S., & Shajimohan, B. (2020). A novel heuristic based energy efficient routing strategy in wireless sensor network. Peer-to-Peer Networking and Applications, 13(6), 1853–1871.CrossRef
35.
go back to reference Haseeb, K., Almustafa, K. M., Jan, Z., Saba, T., & Tariq, U. (2020). Secure and energy-aware heuristic routing protocol for wireless sensor network. IEEE Access, 8, 163962–163974.CrossRef Haseeb, K., Almustafa, K. M., Jan, Z., Saba, T., & Tariq, U. (2020). Secure and energy-aware heuristic routing protocol for wireless sensor network. IEEE Access, 8, 163962–163974.CrossRef
36.
go back to reference Hidoussi, F., Toral-Cruz, H., Boubiche, D. E., Martínez-Peláez, R., Velarde-Alvarado, P., Barbosa, R., & Chan, F. (2017). PEAL: Power efficient and adaptive latency hierarchical routing protocol for cluster-based WSN. Wireless Personal Communications, 96(4), 4929–4945.CrossRef Hidoussi, F., Toral-Cruz, H., Boubiche, D. E., Martínez-Peláez, R., Velarde-Alvarado, P., Barbosa, R., & Chan, F. (2017). PEAL: Power efficient and adaptive latency hierarchical routing protocol for cluster-based WSN. Wireless Personal Communications, 96(4), 4929–4945.CrossRef
37.
go back to reference Zhao, X., and Wang, N. (2010, May). An unequal layered clustering approach for large scale wireless sensor networks. In 2010 2nd International Conference on Future Computer and Communication (Vol. 1, pp. V1–750) IEEE Zhao, X., and Wang, N. (2010, May). An unequal layered clustering approach for large scale wireless sensor networks. In 2010 2nd International Conference on Future Computer and Communication (Vol. 1, pp. V1–750) IEEE
38.
go back to reference Mao, S., Zhao, C., Zhou, Z., & Ye, Y. (2013). An improved fuzzy unequal clustering algorithm for wireless sensor network. Mobile Networks and Applications, 18(2), 206–214.CrossRef Mao, S., Zhao, C., Zhou, Z., & Ye, Y. (2013). An improved fuzzy unequal clustering algorithm for wireless sensor network. Mobile Networks and Applications, 18(2), 206–214.CrossRef
39.
go back to reference Robinson, Y. H., Julie, E. G., Saravanan, K., & Kumar, R. (2020). DRP: Dynamic routing protocol in wireless sensor networks. Wireless Personal Communications, 111(1), 313–329.CrossRef Robinson, Y. H., Julie, E. G., Saravanan, K., & Kumar, R. (2020). DRP: Dynamic routing protocol in wireless sensor networks. Wireless Personal Communications, 111(1), 313–329.CrossRef
Metadata
Title
Congestion avoidance with source location privacy using octopus-based dynamic routing protocol in WSN
Authors
Mintu Singh
Maheshwari Prasad Singh
Publication date
25-10-2022
Publisher
Springer US
Published in
Wireless Networks / Issue 2/2023
Print ISSN: 1022-0038
Electronic ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-022-03165-9

Other articles of this Issue 2/2023

Wireless Networks 2/2023 Go to the issue