{"title":"Awareness based gannet optimization for source location privacy preservation with multiple assets in wireless sensor networks","authors":"Mintu Singh, Maheshwari Prasad Singh","doi":"10.1002/cpe.8191","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>The wireless sensor network (WSN) has been assimilated into modern society and is utilized in many crucial application domains, including animal monitoring, border surveillance, asset monitoring, and so forth. These technologies aid in protecting the place of the event's occurrence from the adversary. Maintaining privacy concerning the source location is challenging due to the sensor nodes' limitations and efficient routing strategies. Hence, this research introduces a novel source location privacy preservation using the awareness-based Gannet with random-Dijkstra's algorithm (AGO-RD). The network is initialized by splitting the hotspot and non-hotspot region optimally using the proposed awareness-based Gannet (AGO) algorithm. Here, the multi-objective fitness function is utilized to initialize the network based on factors like throughput, energy consumption, latency, and entropy. Then, the information is forwarded to the phantom node in the non-hotspot region to preserve the source location's privacy, which is far from the sink node. The proposed random-Dijkstra algorithm is utilized to route the information from the phantom node to the sink with more security. Analysis of the proposed AGO-RD-based source location privacy preservation technique in terms of delay, throughput, network lifetime, and energy consumption accomplished the values of 6.52 ms, 95.68%, 7109.9 rounds, and 0.000125 μJ.</p>\n </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"36 21","pages":""},"PeriodicalIF":1.5000,"publicationDate":"2024-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Concurrency and Computation-Practice & Experience","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/cpe.8191","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, SOFTWARE ENGINEERING","Score":null,"Total":0}
引用次数: 0
Abstract
The wireless sensor network (WSN) has been assimilated into modern society and is utilized in many crucial application domains, including animal monitoring, border surveillance, asset monitoring, and so forth. These technologies aid in protecting the place of the event's occurrence from the adversary. Maintaining privacy concerning the source location is challenging due to the sensor nodes' limitations and efficient routing strategies. Hence, this research introduces a novel source location privacy preservation using the awareness-based Gannet with random-Dijkstra's algorithm (AGO-RD). The network is initialized by splitting the hotspot and non-hotspot region optimally using the proposed awareness-based Gannet (AGO) algorithm. Here, the multi-objective fitness function is utilized to initialize the network based on factors like throughput, energy consumption, latency, and entropy. Then, the information is forwarded to the phantom node in the non-hotspot region to preserve the source location's privacy, which is far from the sink node. The proposed random-Dijkstra algorithm is utilized to route the information from the phantom node to the sink with more security. Analysis of the proposed AGO-RD-based source location privacy preservation technique in terms of delay, throughput, network lifetime, and energy consumption accomplished the values of 6.52 ms, 95.68%, 7109.9 rounds, and 0.000125 μJ.
期刊介绍:
Concurrency and Computation: Practice and Experience (CCPE) publishes high-quality, original research papers, and authoritative research review papers, in the overlapping fields of:
Parallel and distributed computing;
High-performance computing;
Computational and data science;
Artificial intelligence and machine learning;
Big data applications, algorithms, and systems;
Network science;
Ontologies and semantics;
Security and privacy;
Cloud/edge/fog computing;
Green computing; and
Quantum computing.