Location Privacy Protection for Sink Node in WSN Based on K Anonymous False Packets Injection
In wireless sensor networks, the convergence node (sink node) is the center of the network, all network data will be transmitted to the sink node, it will process and extract effective information, which leads to the uneven distribution of traffic. An external attacker who can monitor traffic will find the location of the convergent node and attack it according to this feature. In order to protect the location of the sink node in the wireless sensor network, a privacy protection protocol based on K anonymous false packet injection (KAFP) is proposed. The protocol randomly generates K false sink nodes, transmits real data to the sink node and transmits false data to the false sink node. By hiding the location of the sink node, the security time is increased. Theoretical analysis and simulation experiment results show that KAFP can protect privacy of convergent nodes at lower energy consumption when the value of K is properly selected.
KeywordsWireless sensor network Sink node Location privacy protection K anonymous False packet injection
This work is supported by the National Natural Science Foundation of China (nos. 61762030).
- 3.Peng, H., Chen, H., Zhang, X.Y.: Location privacy preservation in wireless sensor networks. J. Softw. 26(3), 617–639 (2015)Google Scholar
- 4.Qian, P., Wu, M.: Survey on privacy preservation in IoT. Appl. Res. Comput. 30(1), 14–21 (2013)Google Scholar
- 5.Wang, S.: Location privacy protection in wireless sensor networks. Central South University, HuNan (2009)Google Scholar
- 6.Deng, J., Han, R., Mishra, S.: Intrusion tolerance and anti traffic analysis strategies for wireless sensor networks. IEEE Comput. Soc. 32(5), 637–646 (2004)Google Scholar
- 8.Deng, J., Han, R., Mishra, S.: Countermeasures against traffic analysis attacks in wireless sensor networks. In: First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Washington, DC, USA, pp. 113–126 (2005)Google Scholar
- 10.Zhang, K.: Research on sink-location privacy protection in wireless sensor networks. Anhun University (2014)Google Scholar
- 11.Chen H.L., Lou, W.: From nowhere to somewhere: protecting end-to-end location privacy in wireless sensor networks. In: Performance Computing and Communications Conference, Albuquerque, New Mexico, USA, pp. 1–8 (2010)Google Scholar
- 12.Li, Z.: An energy-efficient and preserving sink-location privacy scheme for WSNs. Central South University, HuNan (2012)Google Scholar
- 13.Nezhad, A.A., Makrakis, D., Miri, A.: Anonymous topology discovery for multi-hop wireless sensor networks. In: Proceedings of the 3rd ACM Workshop on Qos and Security for Wireless and Mobile Networks, New York, USA, pp. 78–85 (2007)Google Scholar
- 15.Li, P.Y., Zhang, Z.X.: Protocol algorithm design of location privacy preserving for Sink node based on security area. J. Syst. Simul. 27(12), 2973–2980 (2015)Google Scholar