{"title":"雪花:无线传感器网络中有效的源位置隐私方案","authors":"Sain Saginbekov , Dossay Oryspayev","doi":"10.1016/j.comnet.2025.111277","DOIUrl":null,"url":null,"abstract":"<div><div>A Wireless Sensor Network (WSN) can be used in various applications such as asset monitoring, where the location privacy of the asset is of paramount importance. If such applications do not use a scheme that protects the nodes’ location privacy, an adversary may easily locate the monitored asset. In this paper, we propose two schemes that protect the location privacy of assets from a global adversary. Both schemes are adaptive, energy-efficient, and delay-efficient. The first scheme, called Snowflake, divides the nodes into two types. The first type of nodes transmit packets frequently while the second type of nodes transmit packets less frequently. This approach allows us to improve the performance of the scheme. The second scheme, called Snowflake-S, divides the network area into sectors to reduce the packet overhead further. The simulation results show that our schemes outperform an existing algorithm.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"265 ","pages":"Article 111277"},"PeriodicalIF":4.4000,"publicationDate":"2025-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Snowflakes: Efficient schemes for source location privacy in Wireless Sensor Networks\",\"authors\":\"Sain Saginbekov , Dossay Oryspayev\",\"doi\":\"10.1016/j.comnet.2025.111277\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>A Wireless Sensor Network (WSN) can be used in various applications such as asset monitoring, where the location privacy of the asset is of paramount importance. If such applications do not use a scheme that protects the nodes’ location privacy, an adversary may easily locate the monitored asset. In this paper, we propose two schemes that protect the location privacy of assets from a global adversary. Both schemes are adaptive, energy-efficient, and delay-efficient. The first scheme, called Snowflake, divides the nodes into two types. The first type of nodes transmit packets frequently while the second type of nodes transmit packets less frequently. This approach allows us to improve the performance of the scheme. The second scheme, called Snowflake-S, divides the network area into sectors to reduce the packet overhead further. The simulation results show that our schemes outperform an existing algorithm.</div></div>\",\"PeriodicalId\":50637,\"journal\":{\"name\":\"Computer Networks\",\"volume\":\"265 \",\"pages\":\"Article 111277\"},\"PeriodicalIF\":4.4000,\"publicationDate\":\"2025-04-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computer Networks\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S1389128625002452\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Networks","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1389128625002452","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
Snowflakes: Efficient schemes for source location privacy in Wireless Sensor Networks
A Wireless Sensor Network (WSN) can be used in various applications such as asset monitoring, where the location privacy of the asset is of paramount importance. If such applications do not use a scheme that protects the nodes’ location privacy, an adversary may easily locate the monitored asset. In this paper, we propose two schemes that protect the location privacy of assets from a global adversary. Both schemes are adaptive, energy-efficient, and delay-efficient. The first scheme, called Snowflake, divides the nodes into two types. The first type of nodes transmit packets frequently while the second type of nodes transmit packets less frequently. This approach allows us to improve the performance of the scheme. The second scheme, called Snowflake-S, divides the network area into sectors to reduce the packet overhead further. The simulation results show that our schemes outperform an existing algorithm.
期刊介绍:
Computer Networks is an international, archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in the computer communications networking area. The audience includes researchers, managers and operators of networks as well as designers and implementors. The Editorial Board will consider any material for publication that is of interest to those groups.