Title :
Source-Location Privacy through Dynamic Routing in Wireless Sensor Networks
Author :
Li, Yun ; Ren, Jian
Author_Institution :
Dept. of Electr. & Comput. Eng., Michigan State Univ., East Lansing, MI, USA
Abstract :
Wireless sensor networks (WSNs) have the potential to be widely used in many areas for unattended event monitoring. Mainly due to lack of a protected physical boundary, wireless communications are vulnerable to unauthorized interception and detection. Privacy is becoming one of the major issues that jeopardize the successful deployment of wireless sensor networks. While confidentiality of the message can be ensured through content encryption, it is much more difficult to adequately address the source-location privacy. For WSNs, source-location privacy service is further complicated by the fact that the sensor nodes consist of low-cost and low-power radio devices, computationally intensive cryptographic algorithms and large scale broadcasting-based protocols are not suitable for WSNs. In this paper, we propose source-location privacy schemes through routing to randomly selected intermediate node(s) before the message is transmitted to the SINK node. We first describe routing through a single a single randomly selected intermediate node away from the source node. Our analysis shows that this scheme can provide great local source-location privacy. We also present routing through multiple randomly selected intermediate nodes based on angle and quadrant to further improve the global source location privacy. While providing source-location privacy for WSNs, our simulation results also demonstrate that the proposed schemes are very efficient in energy consumption, and have very low transmission latency and high message delivery ratio. Our protocols can be used for many practical applications.
Keywords :
authorisation; cryptographic protocols; data privacy; telecommunication network routing; telecommunication security; wireless sensor networks; SINK node; WSN; computationally intensive cryptographic algorithms; content encryption; dynamic routing; energy consumption; global source location privacy; large scale broadcasting-based protocols; low-cost radio devices; low-power radio devices; message confidentiality; message delivery ratio; multiple randomly selected intermediate nodes; protected physical boundary; sensor nodes; single randomly selected intermediate node; source-location privacy schemes; source-location privacy service; transmission latency; unattended event monitoring; unauthorized detection; unauthorized interception; wireless communications; wireless sensor networks; Cryptographic protocols; Cryptography; Large-scale systems; Monitoring; Privacy; Protection; Radio broadcasting; Routing; Wireless communication; Wireless sensor networks;
Conference_Titel :
INFOCOM, 2010 Proceedings IEEE
Conference_Location :
San Diego, CA
Print_ISBN :
978-1-4244-5836-3
DOI :
10.1109/INFCOM.2010.5462096