A source location privacy preservation scheme in WSN-assisted IoT network by randomized ring and confounding transmission

Wireless sensor network (WSN) based applications have become regular in our daily lives, and their integration with the Internet of Things (IoT) makes them even more productive and convenient. However, the inclusion of massive devices, which form the core of IoT, raises plenty of security concerns....

Full description

Saved in:
Bibliographic Details
Published inWireless networks Vol. 28; no. 2; pp. 827 - 852
Main Authors Shukla, Anurag, Singh, Deepak, Sajwan, Mohit, Verma, Abhishek, Kumar, Ajit
Format Journal Article
LanguageEnglish
Published New York Springer US 01.02.2022
Springer Nature B.V
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Wireless sensor network (WSN) based applications have become regular in our daily lives, and their integration with the Internet of Things (IoT) makes them even more productive and convenient. However, the inclusion of massive devices, which form the core of IoT, raises plenty of security concerns. Many security strategies to handle data privacy have been proposed in previous work. However, very few of these schemes addressed the confidentiality of the sensor node's position. The goal of this study is to ensure source node location privacy by source location privacy preservation technique by randomized ring routing and confounding transmission (SLP-RRRCT). Random routing with confusing transmission benefits the SLP-RRRCT by distracting the adversary backtracking process. After the random routing phase expires, packets are forwarded to the base station (BS) by neighbour grid-based ring routing. During the development of SLP-RRRCT, we concentrated on the privacy of sensor node position, sensor energy usage, network lifetime, and packet routing randomization. Through a simulation experiment and theoretical analysis, we have observed that the proposed SLP-RRRCT provides better safety time, randomization in transmission delay, and large network lifetime than the compared techniques, i.e., baseline, probabilistic, phantom, source location protection protocol based on dynamic routing (SLPDR), and source location privacy protection scheme based on ring-loop routing (SLPRR).
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:1022-0038
1572-8196
DOI:10.1007/s11276-021-02876-9