Open Access   Article Go Back

An Anonymity Region Construction and Two Fold Location Protection Scheme for Improving Source and Sink Location Privacy in WSN

R. Jayanthi1 , M. Mohanraj2

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-2 , Page no. 724-730, Feb-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i2.724730

Online published on Feb 28, 2019

Copyright © R. Jayanthi, M. Mohanraj . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: R. Jayanthi, M. Mohanraj, “An Anonymity Region Construction and Two Fold Location Protection Scheme for Improving Source and Sink Location Privacy in WSN,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.724-730, 2019.

MLA Style Citation: R. Jayanthi, M. Mohanraj "An Anonymity Region Construction and Two Fold Location Protection Scheme for Improving Source and Sink Location Privacy in WSN." International Journal of Computer Sciences and Engineering 7.2 (2019): 724-730.

APA Style Citation: R. Jayanthi, M. Mohanraj, (2019). An Anonymity Region Construction and Two Fold Location Protection Scheme for Improving Source and Sink Location Privacy in WSN. International Journal of Computer Sciences and Engineering, 7(2), 724-730.

BibTex Style Citation:
@article{Jayanthi_2019,
author = {R. Jayanthi, M. Mohanraj},
title = {An Anonymity Region Construction and Two Fold Location Protection Scheme for Improving Source and Sink Location Privacy in WSN},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2019},
volume = {7},
Issue = {2},
month = {2},
year = {2019},
issn = {2347-2693},
pages = {724-730},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3734},
doi = {https://doi.org/10.26438/ijcse/v7i2.724730}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i2.724730}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3734
TI - An Anonymity Region Construction and Two Fold Location Protection Scheme for Improving Source and Sink Location Privacy in WSN
T2 - International Journal of Computer Sciences and Engineering
AU - R. Jayanthi, M. Mohanraj
PY - 2019
DA - 2019/02/28
PB - IJCSE, Indore, INDIA
SP - 724-730
IS - 2
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
304 201 downloads 114 downloads
  
  
           

Abstract

Generally, Wireless Sensor Networks (WSNs) refers to a spatially distributed autonomous network which consists of several sensor nodes. These nodes sense and transport the data to the sink node through adjacent nodes. Contextual privacy is the main challenging issue in WSN. The attacker node gathers information from traffic patterns between source and sink. The protection of source and sink location is very essential to prevent the attacker from gathering information. An all-direction random routing algorithm (ARR) was proposed to protect source-location from attacker node. This algorithm utilized agent nodes to establish a path between sources and sink nodes using only local decisions. ARR is efficiently protecting source location but it exposes direction information of sink. So in this paper, ARR is improved by injecting fake packets and random walk of real packets to hide direction information. Additionally, the anonymity of source and sink location is improved by Two-fold location privacy protection scheme where anonymity is constructed around the source and sink node based on geographic information to hide actual location. In anonymity region, packets are sent from a fake source node and received by fake sink node. The number of fake source and sink is selected based on traffic flow.

Key-Words / Index Term

Wireless Sensor Network, Contextual privacy, All-direction Random Routing algorithm, Improved All-direction Random Routing algorithm, Two-fold location privacy protecting

References

[1] X. Yi, A. Bouguettaya, D. Georgakopoulos, A. Song, J. Willemson, “Privacy protection for wireless medical sensor data”, IEEE transactions on dependable and secure computing, Vol.13, Issue.3, pp.369-380, 2016.
[2] K. Ravikumar, V. Manikandan, “Detection of Node Capture Attack in Wireless Sensor Networks”, International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.4, pp.56-61, 2018.
[3] M. Poonam, Mahajan, "WSN: Infrastructure and Applications", International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue.1, pp.6-10, 2018.
[4] C. Gentili, G. Valenza, M. Nardelli, A. Lanatà, G. Bertschy, L. Weiner, P. Pietrini, “Longitudinal monitoring of heartbeat dynamics predicts mood changes in bipolar patients: a pilot study”, Journal of affective disorders, Vol.209, pp.30-38, 2017.
[5] L. Ranganath, K.S. Kavya, B.M. Priyanka, A.M. Shruthi, C. VidyaRaj, “Security for Source Node Privacy in Wireless Sensor Networks”, International Research Journal of Engineering and Technology, Vol.4, Issue.4, pp.1307-1309, 2017.
[6] N. Wang, J. Zeng, “All-Direction Random Routing for Source-Location Privacy Protecting against Parasitic Sensor Networks”, Sensors, Vol.17, Issue.3, pp.1-18, 2017.
[7] R. Di Pietro, A. Viejo, “Location privacy and resilience in wireless sensor networks querying”, Computer Communications, Vol.34, Issue.3, pp.515-523, 2011.
[8] B. Chakraborty, S. Verma, K.P. Singh, “Staircase based differential privacy with branching mechanism for location privacy preservation in wireless sensor networks”, Computers & Security, Vol.77, pp.36-48, 2018.
[9] M. Bradbury, A. Jhumka, M. Leeke, “Hybrid online protocols for source location privacy in wireless sensor networks”, Journal of Parallel and Distributed Computing, Vol.115, pp.67-81, 2018.
[10] M. Raj, N. Li, D. Liu, M. Wright, S.K. Das, “Using data mules to preserve source location privacy in wireless sensor networks”, Pervasive and Mobile Computing, Vol.11, pp.244-260, 2014.
[11] P.K. Roy, J.P. Singh, P. Kumar, M.P. Singh, “Source location privacy using fake source and phantom routing (FSAPR) technique in wireless sensor networks”, Procedia Computer Science, Vol.57, pp.936-941, 2015.
[12] J. Deng, R. Han, S. Mishra, “Countermeasures against traffic analysis attacks in wireless sensor networks”, In 2005. SecureComm 2005. IEEE First International Conference on Security and Privacy for Emerging Areas in Communications Networks, pp.113-126, 2005.