Source location privacy in a cluster-based wireless sensor networks against local adversary

Islam M. Tanash, Fedaa S. Yaseen, M. Al-Mistarihi, Basheer Al-Duwairi, M. Shurman
{"title":"Source location privacy in a cluster-based wireless sensor networks against local adversary","authors":"Islam M. Tanash, Fedaa S. Yaseen, M. Al-Mistarihi, Basheer Al-Duwairi, M. Shurman","doi":"10.1109/IACS.2017.7921996","DOIUrl":null,"url":null,"abstract":"Wireless Sensor Networks (WSNs) have been popular nowadays as they provide low-cost solutions of a wide-range of real life challenges. WSN consists of a group of infrastructure-less wireless nodes that works together to deliver physical or environmental monitored data from source to sink. In general, WSNs are vulnerable to wireless attacks due to the open nature of the wireless networks. Also, WSNs suffer from unbalanced energy consumption which reduces the network life time due to the creation of the energy-hole. Two types of threats may occur for the WSNs privacy, which are; contextual and content privacy; location privacy is considered as an example for contextual privacy, where an eavesdropper tries to find the location of the source or sink. Hence, ensuring the security and privacy in WSNs is considered as an essential issue. In this paper, we avoid energy-hole creation and protect source location privacy (SLP) via proposing two source privacy protection schemes based on clustering, which are dynamic shortest path scheme (DSP) and Dynamic tree scheme (DT). We adopted grid-based clustering technique to divide the network to several square clusters. Matlab simulation evaluates the performance of the two proposed schemes in terms of safety period.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 8th International Conference on Information and Communication Systems (ICICS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IACS.2017.7921996","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

Abstract

Wireless Sensor Networks (WSNs) have been popular nowadays as they provide low-cost solutions of a wide-range of real life challenges. WSN consists of a group of infrastructure-less wireless nodes that works together to deliver physical or environmental monitored data from source to sink. In general, WSNs are vulnerable to wireless attacks due to the open nature of the wireless networks. Also, WSNs suffer from unbalanced energy consumption which reduces the network life time due to the creation of the energy-hole. Two types of threats may occur for the WSNs privacy, which are; contextual and content privacy; location privacy is considered as an example for contextual privacy, where an eavesdropper tries to find the location of the source or sink. Hence, ensuring the security and privacy in WSNs is considered as an essential issue. In this paper, we avoid energy-hole creation and protect source location privacy (SLP) via proposing two source privacy protection schemes based on clustering, which are dynamic shortest path scheme (DSP) and Dynamic tree scheme (DT). We adopted grid-based clustering technique to divide the network to several square clusters. Matlab simulation evaluates the performance of the two proposed schemes in terms of safety period.
基于集群的无线传感器网络中针对本地对手的源位置隐私
无线传感器网络(wsn)如今已经很受欢迎,因为它们为广泛的现实生活挑战提供了低成本的解决方案。WSN由一组无基础设施的无线节点组成,这些节点协同工作,将物理或环境监测数据从源发送到接收器。一般来说,由于无线网络的开放性,wsn容易受到无线攻击。此外,由于能量空洞的产生,无线传感器网络的能量消耗不平衡,从而减少了网络的寿命。无线传感器网络的隐私可能会受到两种类型的威胁,它们是;上下文和内容隐私;位置隐私被认为是上下文隐私的一个例子,其中窃听者试图找到源或接收器的位置。因此,确保无线传感器网络的安全性和隐私性是一个至关重要的问题。本文通过提出两种基于聚类的源隐私保护方案,即动态最短路径方案(DSP)和动态树方案(DT),避免了能量洞的产生并保护了源位置隐私(SLP)。我们采用基于网格的聚类技术将网络划分为多个方形聚类。Matlab仿真从安全周期的角度对两种方案的性能进行了评价。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信