Skip to main content

Enhancing Source Location Privacy in Energy-Constrained Wireless Sensor Networks

  • Conference paper
Proceedings of International Conference on Computer Science and Information Technology

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 255))

Abstract

Research community has done much work to tackle the privacy preservation problem of wireless sensor networks in recent years. Many privacy-related issues have been addressed by security mechanism; however, location privacy problem has not been addressed effectively. The location privacy problem, which allows an adversary to determine the location of nodes of interest to him, is quite different from content privacy which could be protected by encryption and authentication. In this paper, an enhanced directed random walk (EDROW) technique is proposed. This approach introduces a ring, which makes an adversary to backtrack to the origin of the sensor communication more difficult, to enhance the directed random walk route. The results of simulation demonstrate that the enhanced directed random walk technique is a powerful approach for preserving source location privacy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ozturk, C., Zhang, Y., Trappe, W.: Source-location privacy in energy-constrained sensor network routing. In: Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, pp. 88–93 (2004)

    Google Scholar 

  2. Kamat, P., Zhang, Y., Trappe, W., Ozturk, C.: Enhancing source-location privacy in sensor network routing. In: Proceedings of 25th IEEE International Conference on Distributed Computing Systems (ICDCS 2005), pp. 599–608 (2005)

    Google Scholar 

  3. Ozturk, C., Zhang, Y., Trappe, W., Ott, M.: Source-location privacy for networks of energy-constrained sensors. In: Proceedings of Second IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems, pp. 68–72 (2004)

    Google Scholar 

  4. Mehta, K., Liu, D., Wright, M.: Location privacy in sensor networks against a global eavesdropper. In: IEEE International Conference on Network Protocols (ICNP 2007), pp. 314–323 (2007)

    Google Scholar 

  5. Wei-ping, W., Liang, C., Jian-xin, W.: A source-location privacy protocol in WSN based on locational angle. In: IEEE International Conference on Communications (ICC’08), pp. 1630–1634 (2008)

    Google Scholar 

  6. Suarez-Tangil, G., Palomar, E., Ramos, B., Ribagorda, A.: An experimental comparison of source location privacy methods for power optimization in WSNs. In: Proceedings of the 3rd WSEAS International Conference on Advances in Sensors, Signals and Materials, pp. 79–84 (2010)

    Google Scholar 

  7. Lightfoot, L., Li, Y., Ren, J.: Preserving source-location privacy in wireless sensor network using STaR routing. In: IEEE Global Telecommunications Conference (GLOBECOM 2010), pp. 1–5 (2010)

    Google Scholar 

  8. Wang, H., Sheng, B., Li, Q.: Privacy-aware routing in sensor networks. Comput. Netw. 53, 1512–1529 (2009)

    Article  MATH  Google Scholar 

  9. Zhang, L.: A self-adjusting directed random walk approach for enhancing source-location privacy in sensor network routing. In: Proceedings of the 2006 International Conference on Wireless Communications and Mobile Computing, pp. 33–38 (2006)

    Google Scholar 

  10. Spachos, P., Song, L., Bui, F.M., Hatzinakos, D.: Improving source-location privacy through opportunistic routing in wireless sensor networks. In: 2011 IEEE Symposium on Computers and Communications (ISCC), pp. 815–820 (2011)

    Google Scholar 

  11. Li, N., Raj, M., Liu, D., Wright, M., Das, S.K.: Using data mules to preserve source location privacy in wireless sensor networks. In: Distributed Computing and Networking, pp. 309–324. Springer (2012)

    Google Scholar 

  12. Yao, J., Wen, G.: Preserving source-location privacy in energy-constrained wireless sensor networks. In: 28th International Conference on Distributed Computing Systems Workshops (ICDCS’08), pp. 412–416 (2008)

    Google Scholar 

  13. Traynor, P., Kumar, R., Choi, H., Cao, G., Zhu, S., La Porta, T.: Efficient hybrid security mechanisms for heterogeneous sensor networks. IEEE Trans. Mobile Comput. 6, 663–677 (2007)

    Article  Google Scholar 

  14. Chan, H., Perrig, A.: PIKE: Peer intermediaries for key establishment in sensor networks. In: INFOCOM 2005. Proceedings of 24th Annual Joint Conference of the IEEE Computer and Communications Societies, pp. 524–535 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guangbao Tan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer India

About this paper

Cite this paper

Tan, G., Li, W., Song, J. (2014). Enhancing Source Location Privacy in Energy-Constrained Wireless Sensor Networks. In: Patnaik, S., Li, X. (eds) Proceedings of International Conference on Computer Science and Information Technology. Advances in Intelligent Systems and Computing, vol 255. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1759-6_34

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-1759-6_34

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-1758-9

  • Online ISBN: 978-81-322-1759-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics