IJERT-Securing the Location Privacy in wireless Sensor Networks (original) (raw)

An enhanced communication protocol for location privacy in WSN

2015

Wireless sensor network (WSN) is built of many sensor nodes. The sensors can sense a phenomenon, which will be represented in a form of data and sent to an aggregator for further processing. WSN is used in many applications, such as object tracking and security monitoring. The objects in many situations need physical and location protection. In addition to the source location privacy, sink location privacy should be provided. Providing an efficient location privacy solution would be challenging due to the open nature of the WSN. Anonymity is a key solution for location privacy. We present a network model that is protected against local, multilocal, and global adversaries that can launch sophisticated passive and active attacks against the WSN.

An Advanced Source Location Privacy Protection Scheme for WSNs

Zenodo (CERN European Organization for Nuclear Research), 2022

Wireless Sensor Network (WSN) is infrastructure-less. This is mainly used for target monitoring, target detection by setting in an ad-hoc style. So, in a wireless network target want to be protected. But the network cannot hide source permanently but it is capable of increasing the safety time. Both data privacy and location privacy are important to WSN security. In the case of data privacy there are many encrypting algorithm to protect data.But it is not possible in the case of source location privacy. When taking source location privacy there is source location privacy and sink location privacy.Source location privacy techniques will collapse generally by tracing back by the attacker.Hiding the source location is a crucial challenge in WSNs since the location of a source sensor gives contextual information about an event. In WSNs, a variety of approaches are utilised to safeguard the source location.One of these methods concealed the source location by using fakesources. Phantom nodes were utilised in another method to shield the source location. Although the current systems operate pretty well with the use of fake sources and phantom nodes.The efficient way to protect source location privacy is using of both phantom nodes and fake nodes.There is determination of fake source to protect from adversary which is chosen by randomly.So determining fake sources by path extension which helps to increase the safety time.PEM is done after the initialfake sources are determined, each of them will choose a newfake source from its neighbor. There by can increase the safety time.

A Survey Paper on Scalable & Routing Efficient Methods for Source Location Privacy in WSNs

International journal of engineering research and technology, 2014

The use of wireless sensor networks (WSNs) in many real time applications are growing significantly due to its wide range of benefits to end users. The major issue with WSNs is the security. Researchers have already presented various methods over WSN security, especially for privacy preservation. From the literature study, the privacy preserving security methods for WSN are having influence over the performance parameters like latency, energy efficiency, communication cost, throughput etc. WSNs are resource constrained, means sensor nodes having limited resources. Most existing methods use the PKI (public key infrastructure) for security purpose, but these methods consume more power of sensor nodes as well as not scalable. Thus to overcome these two limitations, recently the new privacy preservation method is introduced. This method proposed some criteria for the quantitative metrics source location privacy (SLP) for routing oriented methods in WSN. Using this method, the SLP is achieved with goal of efficient energy utilization via the two phase routing. It means SLP through the Routing to a randomly selected intermediate node (RSIN) and a network mixing ring (NMR). However this method is not scalable as required for most of real life applications, as well not evaluated for other performance metrics such as throughput, packet delivery ratio and end to end delay which are vital for any routing scheme in WSN. Therefore in this paper we are presenting the improved method with aim of achieving the network scalability and efficient routing performance while maintaining the source location privacy security.

Analysis of location privacy solutions in wireless sensor networks

IET Communications, 2011

Extensive work has been done on the protection of Wireless Sensor Networks (WSNs) from the hardware to the application layer. However, only recently, the privacy preservation problem has drawn the attention of the research community because of its challenging nature. This problem is exacerbated in the domain of WSNs due to the extreme resource limitation of sensor nodes. In this paper we focus on the location privacy problem in WSNs, which allows an adversary to determine the location of nodes of interest to him. We provide a taxonomy of solutions based on the power of the adversary and the main techniques proposed by the various solutions. In addition, we describe and analyse the advantages and disadvantages of different approaches. Finally, we discuss some open challenges and future directions of research.

Probabilistic receiver-location privacy protection in wireless sensor networks

Information Sciences, 2015

Wireless sensor networks (WSNs) are continually exposed to many types of attacks. Among these, the attacks targeted at the base station are the most devastating ones since this essential device processes and analyses all traffic generated in the network. Moreover, this feature can be exploited by a passive adversary to determine its location based on traffic analysis. This receiver-location privacy problem can be reduced by altering the traffic pattern of the network but the adversary may still be able to reach the base station if he gains access to the routing tables of a number of sensor nodes. In this paper we present HISP-NC (Homogenous Injection for Sink Privacy with Node Compromise protection), a receiverlocation privacy solution that consists of two complementary schemes which protect the location of the base station in the presence of traffic analysis and node compromise attacks. The HISP-NC data transmission protocol prevents traffic analysis by probabilistically hiding the flow of real traffic with moderate amounts of fake traffic. Moreover, HISP-NC includes a perturbation mechanism that modifies the routing tables of the nodes to introduce some level of uncertainty in attackers capable of retrieving the routing information from the nodes. Our scheme is validated both analytically and experimentally through extensive simulations.

On the Performance of Source Location Privacy Protocols with Multiple Source Nodes in WSNs

2021

Source location privacy (SLP) protection is essential in safety-critical monitoring wireless sensor networks. Therefore, a recent study presented some investigations on the performance of SLP protocols in various network configurations. However, the study failed to investigate the performance of the protocols under varied number of source nodes per event. In this study, we analyze the SLP performance and energy efficiency of the protocols under varied number of source nodes. Analysis results show that an increase in the number of source nodes per event can result in energy-inefficient communications and reduced levels of SLP protection. Keywords—source location privacy; wireless sensor network; routing protocol; energy efficiency; privacy protection.

Protecting Receiver-Location Privacy in Wireless Sensor Networks

2007

Due to the open nature of a sensor network, it is relatively easy for an adversary to eavesdrop and trace packet movement in the network in order to capture the receiver physically. After studying the adversary's behavior patterns, we present countermeasures to this problem. We propose a locationprivacy routing protocol (LPR) that is easy to implement and provides path diversity. Combining with fake packet injection, LPR is able to minimize the traffic direction information that an adversary can retrieve from eavesdropping. By making the directions of both incoming and outgoing traffic at a sensor node uniformly distributed, the new defense system makes it very hard for an adversary to perform analysis on locally gathered information and infer the direction to which the receiver locates. We evaluate our defense system based on three criteria: delivery time, privacy protection strength, and energy cost. The simulation results show that LPR with fake packet injection is capable of providing strong protection for the receiver's location privacy. Under similar energy cost, the safe time of the receiver provided by LPR is much longer than other methods, including Phantom routing [1] and DEFP [2]. The performance of our system can be tuned through a couple of parameters that determine the tradeoff between energy cost and the strength of location-privacy protection.

Location Privacy Issues in Wireless Sensor Networks

2009

We discuss location privacy issues in wireless sensor networks. We consider sensor nodes with more responsible roles and the need to protect locations of such nodes. Available countermeasures against various types of traffic analysis attacks are examined and their problems are identified. We do not propose new traffic analysis resistance technique. Instead, we draw attention to blanks in current situation and identify several open questions, which should be answered in order to ensure location privacy of nodes.

Preserving Receiver-Location Privacy in Wireless Sensor Networks

Lecture Notes in Computer Science, 2014

Wireless sensor networks (WSNs) are exposed to many different types of attacks. Among these, the most devastating attack is to compromise or destroy the base station since all communications are addressed exclusively to it. Moreover, this feature can be exploited by a passive adversary to determine the location of this critical device. This receiver-location privacy problem can be reduced by hindering traffic analysis but the adversary may still obtain location information by capturing a subset of sensor nodes in the field. This paper addresses, for the first time, these two problems together in a single solution.

Achieving Network Level Privacy in Wireless Sensor Networks

Sensors, 2010

Full network level privacy has often been categorized into four sub-categories: Identity, Route, Location and Data privacy. Achieving full network level privacy is a critical and challenging problem due to the constraints imposed by the sensor nodes (e.g., energy, memory and computation power), sensor networks (e.g., mobility and topology) and QoS issues (e.g., packet reach-ability and timeliness). In this paper, we proposed two new identity, route and location privacy algorithms and data privacy mechanism that addresses this problem. The proposed solutions provide additional trustworthiness and reliability at modest cost of memory and energy. Also, we proved that our proposed solutions provide protection against various privacy disclosure attacks, such as eavesdropping and hop-by-hop trace back attacks.