Skip to main content
Erschienen in: Mobile Networks and Applications 1/2020

15.12.2018

Protecting Source Location Privacy in a Clustered Wireless Sensor Networks against Local Eavesdroppers

verfasst von: Mamoun F. Al-Mistarihi, Islam M. Tanash, Fedaa S. Yaseen, Khalid A. Darabkh

Erschienen in: Mobile Networks and Applications | Ausgabe 1/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Recently, Wireless Sensor Networks (WSNs) have been extensively employed in several tactical applications out of which target detection, habit monitoring, and earthquake monitoring. The open characteristic nature of WSNs makes it vulnerable to be attacked by an eavesdropper who aims at disrupting the network operation or access confidential information. Consequently, ensuring the security and privacy in WSNs is considered an essential issue and definitely cannot be left without proper investigations. There are two types of threats that may occur for the WSNs privacy, that are, contextual and content privacy. Location privacy is considered an example of contextual privacy. In this paper, three source privacy protection schemes, which are based on clustering methodology, are proposed to protect contextual privacy. These schemes are dynamic shortest path (DSP) scheme, dynamic tree (DT) scheme, and hybrid scheme. Interestingly, a grid-based clustering technique is adopted to divide the network into several square clusters. Matlab simulations are used to evaluate the performance of the three proposed schemes in terms of latency, energy consumption, and safety period. The results undoubtedly confirm the effectiveness of the proposed schemes. Very high safety period is achieved and an adequate amount of energy is consumed. Furthermore, acceptable latency is achieved when compared to the shortest path scheme.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Weitere Produktempfehlungen anzeigen
Literatur
1.
Zurück zum Zitat Darabkh KA, Al-Rawashdeh WS, Al-Zubi RT, Alnabelsi SH (2017) C-DTB-CHR: Centralized Density- and Threshold-based Cluster Head Replacement Protocols for Wireless Sensor Networks. J Supercomput 73(12):5332–5353CrossRef Darabkh KA, Al-Rawashdeh WS, Al-Zubi RT, Alnabelsi SH (2017) C-DTB-CHR: Centralized Density- and Threshold-based Cluster Head Replacement Protocols for Wireless Sensor Networks. J Supercomput 73(12):5332–5353CrossRef
2.
Zurück zum Zitat Shurman MM, Al-Mistarihi MF, Darabkh KA (2016) Dynamic Distribution of Security Keys and IP Addresses Coalition Protocol for Mobile Ad Hoc Networks. AUTOMATIKA – Journal for Control, Measurement, Electronics, Computing and Communications 5(4):1020–1034 Shurman MM, Al-Mistarihi MF, Darabkh KA (2016) Dynamic Distribution of Security Keys and IP Addresses Coalition Protocol for Mobile Ad Hoc Networks. AUTOMATIKA – Journal for Control, Measurement, Electronics, Computing and Communications 5(4):1020–1034
3.
Zurück zum Zitat Darabkh KA, Abu-Jaradeh B, Jafar I (2011) Incorporating Automatic Repeat Request and Thresholds with Variable Complexity Decoding Algorithms over Wireless Networks: Queuing Analysis. IET Commun 5(10):1377–1393MathSciNetCrossRef Darabkh KA, Abu-Jaradeh B, Jafar I (2011) Incorporating Automatic Repeat Request and Thresholds with Variable Complexity Decoding Algorithms over Wireless Networks: Queuing Analysis. IET Commun 5(10):1377–1393MathSciNetCrossRef
4.
Zurück zum Zitat Al-Mistarihi MF, Mohaisen R, Sharaqa A, Shurman MM, Darabkh KA (2015) Performance Evaluation of Multiuser Diversity in Multiuser Two-Hop Cooperative Multi-Relay Wireless Networks using MRC over Rayleigh Fading Channels. Int J Commun Syst 28(1):71–90CrossRef Al-Mistarihi MF, Mohaisen R, Sharaqa A, Shurman MM, Darabkh KA (2015) Performance Evaluation of Multiuser Diversity in Multiuser Two-Hop Cooperative Multi-Relay Wireless Networks using MRC over Rayleigh Fading Channels. Int J Commun Syst 28(1):71–90CrossRef
5.
Zurück zum Zitat Darabkh KA (2017) Fast and Upper Bounded Fano Decoding Algorithm: Queuing Analysis. Transactions on Emerging Telecommunications Technologies 28(1):1–12CrossRef Darabkh KA (2017) Fast and Upper Bounded Fano Decoding Algorithm: Queuing Analysis. Transactions on Emerging Telecommunications Technologies 28(1):1–12CrossRef
6.
Zurück zum Zitat Al-Zubi R, Hawa M, Al-Sukkar G, Darabkh KA (2014) Markov-Based Distributed Approach For Mitigating Self-Coexistence Problem in IEEE 802.22 WRANs. Comput J 57(12):1765–1775CrossRef Al-Zubi R, Hawa M, Al-Sukkar G, Darabkh KA (2014) Markov-Based Distributed Approach For Mitigating Self-Coexistence Problem in IEEE 802.22 WRANs. Comput J 57(12):1765–1775CrossRef
7.
Zurück zum Zitat Darabkh KA, Jafar I, Al Sukkar G, Abandah G, Al-Zubi R (2012) An Improved Queuing Model for Packet Retransmission Policy and Variable Latency Decoders. IET Commun 6(18):3315–3328MathSciNetCrossRef Darabkh KA, Jafar I, Al Sukkar G, Abandah G, Al-Zubi R (2012) An Improved Queuing Model for Packet Retransmission Policy and Variable Latency Decoders. IET Commun 6(18):3315–3328MathSciNetCrossRef
8.
Zurück zum Zitat Khalifeh AF, Al-Tamimi A-K, Darabkh KA (2017) Perceptual Evaluation of Audio Quality Under Lossy Networks. Proc. International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET 2017). Chennai, India Khalifeh AF, Al-Tamimi A-K, Darabkh KA (2017) Perceptual Evaluation of Audio Quality Under Lossy Networks. Proc. International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET 2017). Chennai, India
9.
Zurück zum Zitat Hlayel MM, Hayajneh AM, Al-Mistarihi MF, Shurman M, Darabkh KA (2014) Closed-form Expression of Bit Error Rate in Dual-Hop Dual-Branch Mixed Relaying Cooperative Networks with Best-Path Selection over Rayleigh Fading Channels. Proc. IEEE International Multi-Conference on Systems, Signals & Devices, Conference on Communication & Signal Processing. Castelldefels-Barcelona, Spain Hlayel MM, Hayajneh AM, Al-Mistarihi MF, Shurman M, Darabkh KA (2014) Closed-form Expression of Bit Error Rate in Dual-Hop Dual-Branch Mixed Relaying Cooperative Networks with Best-Path Selection over Rayleigh Fading Channels. Proc. IEEE International Multi-Conference on Systems, Signals & Devices, Conference on Communication & Signal Processing. Castelldefels-Barcelona, Spain
10.
Zurück zum Zitat Darabkh KA, Abu-Jaradeh B (2010) Bounded Fano Decoders over Intermediate Hops Excluding Packet Retransmission. Proc. IEEE 24th International Conference on Advanced Information Networking and Applications (AINA 2010). Perth, Australia 299–303 Darabkh KA, Abu-Jaradeh B (2010) Bounded Fano Decoders over Intermediate Hops Excluding Packet Retransmission. Proc. IEEE 24th International Conference on Advanced Information Networking and Applications (AINA 2010). Perth, Australia 299–303
11.
Zurück zum Zitat Darabkh KA, Abu-Jaradeh B (2010) Buffering Study over Intermediate Hops including Packet Retransmission.Proc. IEEE International Conference on Multimedia Computing and Information Technology (MCIT-2010). Sharjah, U.A.E: 45–48 Darabkh KA, Abu-Jaradeh B (2010) Buffering Study over Intermediate Hops including Packet Retransmission.Proc. IEEE International Conference on Multimedia Computing and Information Technology (MCIT-2010). Sharjah, U.A.E: 45–48
12.
Zurück zum Zitat Darabkh KA, Aygun RS (2006) Quality of Service Evaluation of Error Control for TCP/IP-Based Systems in Packet Switching ATM Networks. Proc. International Conference on Internet Computing (ICOMP'06). Las Vegas, Nevada: 243–248 Darabkh KA, Aygun RS (2006) Quality of Service Evaluation of Error Control for TCP/IP-Based Systems in Packet Switching ATM Networks. Proc. International Conference on Internet Computing (ICOMP'06). Las Vegas, Nevada: 243–248
13.
Zurück zum Zitat Hawa M, Darabkh KA, Khalaf LD, Rahhal JS (2015) Dynamic Resource Allocation Using Load Estimation in Distributed Cognitive Radio Systems. AEÜ - Int J Electron Commun 69(12):1833–1846CrossRef Hawa M, Darabkh KA, Khalaf LD, Rahhal JS (2015) Dynamic Resource Allocation Using Load Estimation in Distributed Cognitive Radio Systems. AEÜ - Int J Electron Commun 69(12):1833–1846CrossRef
14.
Zurück zum Zitat Darabkh KA, Ibeid H, Jafar IF, Al-Zubi RT (2016) A generic buffer occupancy expression for stop-and-wait hybrid automatic repeat request protocol over unstable channels. Telecommun Syst 63(2):205–221CrossRef Darabkh KA, Ibeid H, Jafar IF, Al-Zubi RT (2016) A generic buffer occupancy expression for stop-and-wait hybrid automatic repeat request protocol over unstable channels. Telecommun Syst 63(2):205–221CrossRef
15.
Zurück zum Zitat Shurman M, Awad N, Al-Mistarihi MF, Darabkh KA (2014) LEACH Enhancements for Wireless Sensor Networks Based on Energy Model. Proc. IEEE International Multi-Conference on Systems, Signals & Devices, Conference on Communication & Signal Processing. Castelldefels-Barcelona, Spain Shurman M, Awad N, Al-Mistarihi MF, Darabkh KA (2014) LEACH Enhancements for Wireless Sensor Networks Based on Energy Model. Proc. IEEE International Multi-Conference on Systems, Signals & Devices, Conference on Communication & Signal Processing. Castelldefels-Barcelona, Spain
16.
Zurück zum Zitat Hawa M, Darabkh KA, Al-Zubi R, Al-Sukkar G (2016) A Self-Learning MAC Protocol for Energy Harvesting and Spectrum Access in Cognitive Radio Sensor Networks. Journal of Sensors: 1–18CrossRef Hawa M, Darabkh KA, Al-Zubi R, Al-Sukkar G (2016) A Self-Learning MAC Protocol for Energy Harvesting and Spectrum Access in Cognitive Radio Sensor Networks. Journal of Sensors: 1–18CrossRef
17.
Zurück zum Zitat Khalifeh AF, AlQudah M, Darabkh KA(2017) Optimizing the Beacon and SuperFrame Orders in IEEE 802.15.4 for Real-time Notification in Wireless Sensor Networks. Proc. International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET 2017). Chennai, India Khalifeh AF, AlQudah M, Darabkh KA(2017) Optimizing the Beacon and SuperFrame Orders in IEEE 802.15.4 for Real-time Notification in Wireless Sensor Networks. Proc. International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET 2017). Chennai, India
18.
Zurück zum Zitat Darabkh KA, Alsukour O (2015) Novel Protocols for Improving the Performance of ODMRP and EODMRP over Mobile Ad hoc Networks. International Journal of Distributed Sensor Networks: 1–18CrossRef Darabkh KA, Alsukour O (2015) Novel Protocols for Improving the Performance of ODMRP and EODMRP over Mobile Ad hoc Networks. International Journal of Distributed Sensor Networks: 1–18CrossRef
19.
Zurück zum Zitat Shurman M, Al-Mistarihi M, Darabkh KA, Ababnah A (2013) Hierarchical Clustering Using Genetic Algorithm in Wireless Sensor Networks. Proc. of 36th IEEE International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO 2013): 479–483 Shurman M, Al-Mistarihi M, Darabkh KA, Ababnah A (2013) Hierarchical Clustering Using Genetic Algorithm in Wireless Sensor Networks. Proc. of 36th IEEE International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO 2013): 479–483
20.
Zurück zum Zitat Darabkh KA, Albtoush WY, Jafar IF (2017) Improved Clustering Algorithms for Target Tracking in Wireless Sensor Networks. J Supercomput 73(5):1952–1977CrossRef Darabkh KA, Albtoush WY, Jafar IF (2017) Improved Clustering Algorithms for Target Tracking in Wireless Sensor Networks. J Supercomput 73(5):1952–1977CrossRef
21.
Zurück zum Zitat Darabkh KA, Al-Rawashdeh WS, Hawa M, Saifan R, Khalifeh AF(2017) A Novel Clustering Protocol for Wireless Sensor Networks. Proc. International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET 2017). Chennai, India Darabkh KA, Al-Rawashdeh WS, Hawa M, Saifan R, Khalifeh AF(2017) A Novel Clustering Protocol for Wireless Sensor Networks. Proc. International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET 2017). Chennai, India
22.
Zurück zum Zitat Yick J, Mukherjee B, Ghosal D (2008) Wireless sensor network survey. Comput Netw 52:2292–2330CrossRef Yick J, Mukherjee B, Ghosal D (2008) Wireless sensor network survey. Comput Netw 52:2292–2330CrossRef
23.
Zurück zum Zitat Chen X, Makki K, Yen K, Pissinou N (2009) Sensor network security: a survey. IEEE Commun Surv Tutorials 11(2):52–73CrossRef Chen X, Makki K, Yen K, Pissinou N (2009) Sensor network security: a survey. IEEE Commun Surv Tutorials 11(2):52–73CrossRef
24.
Zurück zum Zitat Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor networks: a survey. Comput Netw 38:393–422CrossRef Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor networks: a survey. Comput Netw 38:393–422CrossRef
25.
Zurück zum Zitat Khemapech I, Duncan I, Miller A (2005) A Survey of Wireless Sensor Networks Technology Khemapech I, Duncan I, Miller A (2005) A Survey of Wireless Sensor Networks Technology
26.
Zurück zum Zitat Gupta SK, Sinha P (2014) Overview of Wireless Sensor Network: A Survey. Int J Adv Res Comput Commun Eng 3(1):5201–5207 Gupta SK, Sinha P (2014) Overview of Wireless Sensor Network: A Survey. Int J Adv Res Comput Commun Eng 3(1):5201–5207
27.
Zurück zum Zitat Buratti C, Conti A, Dardari D, Verdone R (2009) An Overview on Wireless Sensor Networks Technology and Evolution. Sensors 9:6869–6896CrossRef Buratti C, Conti A, Dardari D, Verdone R (2009) An Overview on Wireless Sensor Networks Technology and Evolution. Sensors 9:6869–6896CrossRef
28.
Zurück zum Zitat Tarannum S (2010) Energy conservation Challenges in Wireless Sensor Networks: A Comprehensive Study. Wirel Sens Netw 2:483–491CrossRef Tarannum S (2010) Energy conservation Challenges in Wireless Sensor Networks: A Comprehensive Study. Wirel Sens Netw 2:483–491CrossRef
29.
Zurück zum Zitat Sen J (2009) A Survey on Wireless Sensor Network Security. Int J Commun Netw Inf Secur 1(2):55–78 Sen J (2009) A Survey on Wireless Sensor Network Security. Int J Commun Netw Inf Secur 1(2):55–78
30.
Zurück zum Zitat Pathan AK, Lee HW, Hong CS (2006) Security in Wireless Sensor Networks: Issues and Challenges. Proc. ICACT2006:1043–1048 Pathan AK, Lee HW, Hong CS (2006) Security in Wireless Sensor Networks: Issues and Challenges. Proc. ICACT2006:1043–1048
31.
Zurück zum Zitat Malik MY (2011) An Outline of Security in Wireless Sensor Networks: Threats, Countermeasures and Implementations. Wireless Sensor Networks and Energy Efficiency: Protocols, Routing and Management Malik MY (2011) An Outline of Security in Wireless Sensor Networks: Threats, Countermeasures and Implementations. Wireless Sensor Networks and Energy Efficiency: Protocols, Routing and Management
32.
Zurück zum Zitat Abuhelaleh MA, Elleithy KM (2010) Security in Wireless Sensor Networks: Key Management Module in SOOAWSN. Int J Netw SecurAppl 2(4):67–78 Abuhelaleh MA, Elleithy KM (2010) Security in Wireless Sensor Networks: Key Management Module in SOOAWSN. Int J Netw SecurAppl 2(4):67–78
33.
Zurück zum Zitat Chen H, Lou W (2014) On protecting end-to-end Location Privacy against Local Eavesdropper in Wireless Sensor Networks. Elsevier, pervasive mob comput 16:36–50CrossRef Chen H, Lou W (2014) On protecting end-to-end Location Privacy against Local Eavesdropper in Wireless Sensor Networks. Elsevier, pervasive mob comput 16:36–50CrossRef
34.
Zurück zum Zitat Zeng Y, Cao J, Zhang S, Guo S, Xie L (2010) Random-walk based approach to detect clone attacks in wireless sensor networks. IEEE J Sel Areas Commun 28(5):677–691CrossRef Zeng Y, Cao J, Zhang S, Guo S, Xie L (2010) Random-walk based approach to detect clone attacks in wireless sensor networks. IEEE J Sel Areas Commun 28(5):677–691CrossRef
35.
Zurück zum Zitat KhanWZ, AalsalemMY, SaadNM, XaingY, LuanTH (2014) Detecting replicated nodes in Wireless Sensor Networks using random walks and network division. Proc. IEEE Wireless Communications and Networking Conference, WCNC2014: 2623–2628 KhanWZ, AalsalemMY, SaadNM, XaingY, LuanTH (2014) Detecting replicated nodes in Wireless Sensor Networks using random walks and network division. Proc. IEEE Wireless Communications and Networking Conference, WCNC2014: 2623–2628
36.
Zurück zum Zitat Zhang L (2006) A self-adjusting directed random walk approach for enhancing source-location privacy in sensor network routing. Proc. International conference on Wireless communications and mobile computing, IWCMC’06: 33–38 Zhang L (2006) A self-adjusting directed random walk approach for enhancing source-location privacy in sensor network routing. Proc. International conference on Wireless communications and mobile computing, IWCMC’06: 33–38
37.
Zurück zum Zitat Chen H, Lou W (2010) From nowhere to somewhere: protecting end-to-end location privacy in wireless sensor networks. Proc. IEEE 29th International Performance Computing and Communications Conference, IPCCC 2010: 1–8 Chen H, Lou W (2010) From nowhere to somewhere: protecting end-to-end location privacy in wireless sensor networks. Proc. IEEE 29th International Performance Computing and Communications Conference, IPCCC 2010: 1–8
38.
Zurück zum Zitat Li Y, Ren J (2009) Providing source-location privacy in wireless sensor networks. Proc. International Conference on Wireless Algorithms, Systems and Applications, WASA 2009: 338–347 Li Y, Ren J (2009) Providing source-location privacy in wireless sensor networks. Proc. International Conference on Wireless Algorithms, Systems and Applications, WASA 2009: 338–347
39.
Zurück zum Zitat Kamat P, Zhang Y, Trappe W, Ozturk C (2005) Enhancing source location privacy in sensor network routing. Proc. 25th IEEE International Conference on Distributed Computing Systems, ICDCS 2005. Los Alamitos, CA, USA: 599–608 Kamat P, Zhang Y, Trappe W, Ozturk C (2005) Enhancing source location privacy in sensor network routing. Proc. 25th IEEE International Conference on Distributed Computing Systems, ICDCS 2005. Los Alamitos, CA, USA: 599–608
40.
Zurück zum Zitat Ozturk C, Zhang Y, Trappe W (2004) Source-location privacy in energy-constrained sensor network routing. Proc. 2nd ACM workshop on Security of Ad hoc and Sensor Networks, SASN ‘04: 88–93 Ozturk C, Zhang Y, Trappe W (2004) Source-location privacy in energy-constrained sensor network routing. Proc. 2nd ACM workshop on Security of Ad hoc and Sensor Networks, SASN ‘04: 88–93
41.
Zurück zum Zitat Spachos P, Song L, Hatzinakos D (2010) Opportunistic routing for enhanced source-location privacy in wireless sensor networks. Proc. IEEE 25th Biennial Symposium on Communications, QBSC 2010: 315–318 Spachos P, Song L, Hatzinakos D (2010) Opportunistic routing for enhanced source-location privacy in wireless sensor networks. Proc. IEEE 25th Biennial Symposium on Communications, QBSC 2010: 315–318
42.
Zurück zum Zitat Wei-ping W, Liang C, Jian-xin W (2008) A source-location privacy protocol in wsn based on locational angle.Proc. IEEE International Conference on Communications, ICC’08. Piscataway, NJ, USA: 1630–1634 Wei-ping W, Liang C, Jian-xin W (2008) A source-location privacy protocol in wsn based on locational angle.Proc. IEEE International Conference on Communications, ICC’08. Piscataway, NJ, USA: 1630–1634
43.
Zurück zum Zitat Luo X, Ji X, Park M (2010) Location privacy against traffic analysis attacks in wireless sensor networks. Proc. IEEE International Conference on Information Science and Applications, ICISA 2010: 1–6 Luo X, Ji X, Park M (2010) Location privacy against traffic analysis attacks in wireless sensor networks. Proc. IEEE International Conference on Information Science and Applications, ICISA 2010: 1–6
44.
Zurück zum Zitat Xiong K, Thuente D (2006) Secure Localization Schemes in Sensor Networks. IEEE International Symposium on High Capacity Optical Networks and Enabling Technologies Xiong K, Thuente D (2006) Secure Localization Schemes in Sensor Networks. IEEE International Symposium on High Capacity Optical Networks and Enabling Technologies
45.
Zurück zum Zitat Tan W, Xu K, Wang D (2014) An anti-tracking source-location privacy protection protocol in WSNs based on path extension. IEEE Internet Things J 1(5):461–471CrossRef Tan W, Xu K, Wang D (2014) An anti-tracking source-location privacy protection protocol in WSNs based on path extension. IEEE Internet Things J 1(5):461–471CrossRef
46.
Zurück zum Zitat Long J, Dong M, Ota K, Liu A (2014) Achieving Source Location Privacy and Network Lifetime Maximization Through Tree-Based Diversionary Routing in Wireless Sensor Networks. IEEE Access 2:633–651CrossRef Long J, Dong M, Ota K, Liu A (2014) Achieving Source Location Privacy and Network Lifetime Maximization Through Tree-Based Diversionary Routing in Wireless Sensor Networks. IEEE Access 2:633–651CrossRef
47.
Zurück zum Zitat Li Y and Ren J(2010) Source-Location Privacy through Dynamic Routing in Wireless Sensor Networks. Proc. IEEE INFOCOM Li Y and Ren J(2010) Source-Location Privacy through Dynamic Routing in Wireless Sensor Networks. Proc. IEEE INFOCOM
48.
Zurück zum Zitat Zhang JD, Chow CY (2015) REAL: A Reciprocal Protocol for Location Privacy in Wireless Sensor Networks. IEEE TransDependable Secure Comput 12(4):458–471CrossRef Zhang JD, Chow CY (2015) REAL: A Reciprocal Protocol for Location Privacy in Wireless Sensor Networks. IEEE TransDependable Secure Comput 12(4):458–471CrossRef
49.
Zurück zum Zitat Bai L, Yan Y, Qian S (2017) A source-location privacy protection algorithm in WSNs based on node distance. Proc. 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD): 2772–2776 Bai L, Yan Y, Qian S (2017) A source-location privacy protection algorithm in WSNs based on node distance. Proc. 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD): 2772–2776
50.
Zurück zum Zitat Tang D, Gu J, Yu Y, Yang Y, Han W, Ma X (2018) Source-Location Privacy Based on Dynamic Mix-Ring in Wireless Sensor Networks. Proc.International Conference on Computing, Networking and Communications (ICNC): Communications and Information Security Symposium: 327–331 Tang D, Gu J, Yu Y, Yang Y, Han W, Ma X (2018) Source-Location Privacy Based on Dynamic Mix-Ring in Wireless Sensor Networks. Proc.International Conference on Computing, Networking and Communications (ICNC): Communications and Information Security Symposium: 327–331
51.
Zurück zum Zitat Wang N, Zeng J(2017) All-Direction Random Routing for Source-Location Privacy Protecting against Parasitic Sensor Networks. Sensors 17(3)CrossRef Wang N, Zeng J(2017) All-Direction Random Routing for Source-Location Privacy Protecting against Parasitic Sensor Networks. Sensors 17(3)CrossRef
52.
Zurück zum Zitat Lilian CM, Seokjoo S (2018) Strategic Location-Based Random Routing for Source Location Privacy in Wireless Sensor Networks. Sensors 18(7) Lilian CM, Seokjoo S (2018) Strategic Location-Based Random Routing for Source Location Privacy in Wireless Sensor Networks. Sensors 18(7)
53.
Zurück zum Zitat Huang C, Ma M, Liu Y, Liu A(2017) Preserving Source Location Privacy for Energy Harvesting WSNs. Sensors 17(4)CrossRef Huang C, Ma M, Liu Y, Liu A(2017) Preserving Source Location Privacy for Energy Harvesting WSNs. Sensors 17(4)CrossRef
54.
Zurück zum Zitat Raja RA, Valli S (2017) An Approach to Defend Global Eavesdropper in Sensor Networks. Wirel Pers Commun 96(2):2761–2777CrossRef Raja RA, Valli S (2017) An Approach to Defend Global Eavesdropper in Sensor Networks. Wirel Pers Commun 96(2):2761–2777CrossRef
56.
Zurück zum Zitat Anfeng L et al. (2013) Deployment guidelines for achieving maximum lifetime and avoiding energy holes in sensor network. Information Sciences: 197–226 Anfeng L et al. (2013) Deployment guidelines for achieving maximum lifetime and avoiding energy holes in sensor network. Information Sciences: 197–226
Metadaten
Titel
Protecting Source Location Privacy in a Clustered Wireless Sensor Networks against Local Eavesdroppers
verfasst von
Mamoun F. Al-Mistarihi
Islam M. Tanash
Fedaa S. Yaseen
Khalid A. Darabkh
Publikationsdatum
15.12.2018
Verlag
Springer US
Erschienen in
Mobile Networks and Applications / Ausgabe 1/2020
Print ISSN: 1383-469X
Elektronische ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-018-1189-6

Weitere Artikel der Ausgabe 1/2020

Mobile Networks and Applications 1/2020 Zur Ausgabe

Neuer Inhalt