• DocumentCode
    67700
  • Title

    Achieving Source Location Privacy and Network Lifetime Maximization Through Tree-Based Diversionary Routing in Wireless Sensor Networks

  • Author

    Jun Long ; Mianxiong Dong ; Ota, Kaoru ; Anfeng Liu

  • Author_Institution
    Sch. of Inf. Sci. & Eng., Central South Univ., Changsha, China
  • Volume
    2
  • fYear
    2014
  • fDate
    2014
  • Firstpage
    633
  • Lastpage
    651
  • Abstract
    Wireless sensor networks (WSNs) have been proliferating due to their wide applications in both military and commercial use. However, one critical challenge to WSNs implementation is source location privacy. In this paper, we propose a novel tree-based diversionary routing scheme for preserving source location privacy using hide and seek strategy to create diversionary or decoy routes along the path to the sink from the real source, where the end of each diversionary route is a decoy (fake source node), which periodically emits fake events. Meanwhile, the proposed scheme is able to maximize the network lifetime of WSNs. The main idea is that the lifetime of WSNs depends on the nodes with high energy consumption or hotspot, and then the proposed scheme minimizes energy consumption in hotspot and creates redundancy diversionary routes in nonhotspot regions with abundant energy. Hence, it achieves not only privacy preservation, but also network lifetime maximization. Furthermore, we systematically analyze the energy consumption in WSNs, and provide guidance on the number of diversionary routes, which can be created in different regions away from the sink. In addition, we identify a novel attack against phantom routing, which is widely used for source location privacy preservation, namely, direction-oriented attack. We also perform a comprehensive analysis on how the direction-oriented attack can be defeated by the proposed scheme. Theoretical and experimental results show that our scheme is very effective to improve the privacy protection while maximizing the network lifetime.
  • Keywords
    telecommunication network routing; telecommunication security; trees (mathematics); wireless sensor networks; WSN implementation; decoy routes; direction-oriented attack; energy consumption minimization; fake source node; hide and seek strategy; hotspot; network lifetime maximization; nonhotspot regions; phantom routing; privacy protection improvement; source location privacy preservation; tree-based diversionary routing scheme; wireless sensor networks; Energy consumption; Position measurement; Privacy; Routing protocols; Source location; Wireless sensor networks; Wireless sensor networks; network lifetime; performance optimization; source location privacy; tree based routing; wireless sensor networks;
  • fLanguage
    English
  • Journal_Title
    Access, IEEE
  • Publisher
    ieee
  • ISSN
    2169-3536
  • Type

    jour

  • DOI
    10.1109/ACCESS.2014.2332817
  • Filename
    6842655