Achieving source location privacy and network lifetime maximization through tree-based diversionary routing in wireless sensor networks

115Citations
Citations of this article
43Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Wireless sensor networks (WSNs) have been proliferating due to their wide applications in both military and commercial use. However, one critical challenge to WSNs implementation is source location privacy. In this paper, we propose a novel tree-based diversionary routing scheme for preserving source location privacy using hide and seek strategy to create diversionary or decoy routes along the path to the sink from the real source, where the end of each diversionary route is a decoy (fake source node), which periodically emits fake events. Meanwhile, the proposed scheme is able to maximize the network lifetime of WSNs. The main idea is that the lifetime of WSNs depends on the nodes with high energy consumption or hotspot, and then the proposed scheme minimizes energy consumption in hotspot and creates redundancy diversionary routes in nonhotspot regions with abundant energy. Hence, it achieves not only privacy preservation, but also network lifetime maximization. Furthermore, we systematically analyze the energy consumption in WSNs, and provide guidance on the number of diversionary routes, which can be created in different regions away from the sink. In addition, we identify a novel attack against phantom routing, which is widely used for source location privacy preservation, namely, direction-oriented attack. We also perform a comprehensive analysis on how the direction-oriented attack can be defeated by the proposed scheme. Theoretical and experimental results show that our scheme is very effective to improve the privacy protection while maximizing the network lifetime.

References Powered by Scopus

Wireless sensor networks: A survey

13966Citations
N/AReaders
Get full text

The Byzantine Generals Problem

4277Citations
N/AReaders
Get full text

Source-location privacy in energy-constrained sensor network routing

342Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Routing protocols for wireless sensor networks: What the literature says?

111Citations
N/AReaders
Get full text

PTAS: Privacy-preserving Thin-client Authentication Scheme in blockchain-based PKI

98Citations
N/AReaders
Get full text

A survey on location privacy protection in Wireless Sensor Networks

82Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Long, J., Dong, M., Ota, K., & Liu, A. (2014). Achieving source location privacy and network lifetime maximization through tree-based diversionary routing in wireless sensor networks. IEEE Access, 2, 633–651. https://doi.org/10.1109/ACCESS.2014.2332817

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 26

74%

Professor / Associate Prof. 5

14%

Lecturer / Post doc 3

9%

Researcher 1

3%

Readers' Discipline

Tooltip

Computer Science 20

61%

Engineering 10

30%

Agricultural and Biological Sciences 2

6%

Environmental Science 1

3%

Save time finding and organizing research with Mendeley

Sign up for free