Location Privacy Protection for Sink Node in WSN Based on K Anonymous False Packets Injection

  • Ling SongEmail author
  • Wei Ma
  • Jin Ye
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 950)


In wireless sensor networks, the convergence node (sink node) is the center of the network, all network data will be transmitted to the sink node, it will process and extract effective information, which leads to the uneven distribution of traffic. An external attacker who can monitor traffic will find the location of the convergent node and attack it according to this feature. In order to protect the location of the sink node in the wireless sensor network, a privacy protection protocol based on K anonymous false packet injection (KAFP) is proposed. The protocol randomly generates K false sink nodes, transmits real data to the sink node and transmits false data to the false sink node. By hiding the location of the sink node, the security time is increased. Theoretical analysis and simulation experiment results show that KAFP can protect privacy of convergent nodes at lower energy consumption when the value of K is properly selected.


Wireless sensor network Sink node Location privacy protection K anonymous False packet injection 



This work is supported by the National Natural Science Foundation of China (nos. 61762030).


  1. 1.
    Ren, F.Y., Huang, H.N., Lin, C.: Wireless sensor networks. J. Softw. 14(7), 1282–1291 (2003). (in Chinese with English abstract)zbMATHGoogle Scholar
  2. 2.
    Fan, Y.J., Chen, H., Zhang, X.Y.: Data privacy preservation in wireless sensor networks. Chin. J. Comput. 35(6), 1132–1147 (2012)MathSciNetCrossRefGoogle Scholar
  3. 3.
    Peng, H., Chen, H., Zhang, X.Y.: Location privacy preservation in wireless sensor networks. J. Softw. 26(3), 617–639 (2015)Google Scholar
  4. 4.
    Qian, P., Wu, M.: Survey on privacy preservation in IoT. Appl. Res. Comput. 30(1), 14–21 (2013)Google Scholar
  5. 5.
    Wang, S.: Location privacy protection in wireless sensor networks. Central South University, HuNan (2009)Google Scholar
  6. 6.
    Deng, J., Han, R., Mishra, S.: Intrusion tolerance and anti traffic analysis strategies for wireless sensor networks. IEEE Comput. Soc. 32(5), 637–646 (2004)Google Scholar
  7. 7.
    Jian, Y., Chen, S.G., Zhang, Z., et al.: A novel scheme for protecting receiver’s location privacy in wireless sensor networks. IEEE Trans. Wirel. Commun. 7(10), 3769–3779 (2008)CrossRefGoogle Scholar
  8. 8.
    Deng, J., Han, R., Mishra, S.: Countermeasures against traffic analysis attacks in wireless sensor networks. In: First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Washington, DC, USA, pp. 113–126 (2005)Google Scholar
  9. 9.
    Deng, J., Han, R., Mishra, S.: Decorrelating wireless sensor network to inhibit traffic analysis attacks. Pervasive Mob. Comput. 2(2), 159–186 (2005)CrossRefGoogle Scholar
  10. 10.
    Zhang, K.: Research on sink-location privacy protection in wireless sensor networks. Anhun University (2014)Google Scholar
  11. 11.
    Chen H.L., Lou, W.: From nowhere to somewhere: protecting end-to-end location privacy in wireless sensor networks. In: Performance Computing and Communications Conference, Albuquerque, New Mexico, USA, pp. 1–8 (2010)Google Scholar
  12. 12.
    Li, Z.: An energy-efficient and preserving sink-location privacy scheme for WSNs. Central South University, HuNan (2012)Google Scholar
  13. 13.
    Nezhad, A.A., Makrakis, D., Miri, A.: Anonymous topology discovery for multi-hop wireless sensor networks. In: Proceedings of the 3rd ACM Workshop on Qos and Security for Wireless and Mobile Networks, New York, USA, pp. 78–85 (2007)Google Scholar
  14. 14.
    Yang, Y., Shao, M., Zhu, S., et al.: Towards statistically strong source anonymity for sensor networks. ACM Trans. Sens. Netw. 9(3), 34 (2013)CrossRefGoogle Scholar
  15. 15.
    Li, P.Y., Zhang, Z.X.: Protocol algorithm design of location privacy preserving for Sink node based on security area. J. Syst. Simul. 27(12), 2973–2980 (2015)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.Guangxi UniversityNanningChina
  2. 2.Guangxi Key Laboratory of Multimedia Communications and Network TechnologyNanningChina

Personalised recommendations