PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Achieving Reliability of Privacy-preserving Phantom Routing Protocols in Multi-hop Wireless Sensor Networks

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Due to the open nature of wireless channels and sensor node resource constraints, it is challenging to secure the communication in wireless sensor networks (WSNs) while simultaneously protecting the privacy of node location data. Therefore, a significant amount of research focusing on source location privacy (SLP) protocols has been conducted. The amount of research on SLP reliability, meanwhile, is insignificant. This study explores the operational features of various privacy-preserving phantom routing protocols and simulates WSNs with varied network configurations to investigate how different routing strategies affect SLP reliability. Safety period and capture ratio metrics are used to compute SLP reliability. Simulation results show that integration of phantom routing with fake packet distribution mechanisms adversely impacts SLP reliability. SLP reliability decreases also as the number of fake packet sources increases. Research proves that a protocol with many fake packet sources achieves SLP reliability for a mission duration of 940 rounds, while a protocol with no fake packet sources achieves SLP reliability for 1658 rounds.
Rocznik
Tom
Strony
104--112
Opis fizyczny
Bibliogr. 48 poz., rys., tab.
Twórcy
  • The Open University of Tanzania, Dar es Salaam, Tanzania
Bibliografia
  • [1] K.P.R. Krishna and R. Thirumuru, “Energy Efficient and Multi-hop Routing for Constrained Wireless Sensor Networks", Sustainable Computing: Informatics and Systems, vol. 38, art. no. 100866, 2023.
  • [2] M. Rathee et al., “Ant Colony Optimization Based Quality of Service Aware Energy Balancing Secure Routing Algorithm for Wireless Sensor Networks", IEEE Transactions on Engineering Management, vol. 68, no. 1, pp. 170-182, 2021.
  • [3] N. Wang, J. Fu, J. Li, and B.K. Bhargava, “Source-location Privacy Protection Based on Anonymity Cloud in Wireless Sensor Networks", IEEE Transactions on Information Forensics and Security, vol. 15, pp. 100-114, 2020.
  • [4] A. Chmielowiec, L. Klich, and W. Woś, “Energy Efficient ECC Authenticated Key Exchange Protocol for Star Topology Wireless Sensor Networks", Journal of Telecommunication and Information Technology, vol. 1, pp. 1-10, 2024.
  • [5] I. Butun, P. Osterberg, and H. Song, "Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures", IEEE Communications Surveys & Tutorials, vol. 22, no. 1, pp. 616-644, 2020.
  • [6] N. Hrovatin, A. Tošić, M. Mrissa, and J. Vičič, "A General Purpose Data and Query Privacy Preserving Protocol for Wireless Sensor Networks", IEEE Transactions on Information Forensics and Security, vol. 18, pp. 4883-4898, 2023.
  • [7] G. Han et al., "CPSLP: A Cloud-based Scheme for Protecting Source Location Privacy in Wireless Sensor Networks Using Multi-sinks", IEEE Transactions on Vehicular Technology, vol. 68, no. 3, pp. 2739-2750, 2019.
  • [8] N. Jan and S. Khan, "Energy‐efficient Source Location Privacy Protection for Network Lifetime Maximization against Local Eavesdropper in Wireless Sensor Network (EeSP)", Emerging Telecommunications Technologies, vol. 33, no. 2, art. no. 3703, 2022.
  • [9] L.C. Mutalemwa and S. Shin, "Novel Approaches to Realize the Reliability of Location Privacy Protocols in Monitoring Wireless Networks", IEEE Access, vol. 9, pp. 104820-104836, 2021.
  • [10] L.C. Mutalemwa, "On the Use of Wireless Technologies for Wildlife Monitoring: Wireless Sensor Network Routing Protocols", Tanzania Journal of Engineering and Technology, vol. 42, no. 2, pp. 113-133, 2023.
  • [11] G. Han, R. Xia, H. Wang, and A. Li, "Source Location Privacy Protection Algorithm Based on Polyhedral Phantom Routing in Underwater Acoustic Sensor Networks", IEEE Internet of Things Journal, pp. 8459-8472, 2023.
  • [12] S.A.H. Mohsan, A. Mazinani, N.Q.H. Othman, and H. Amjad, "Towards the Internet of Underwater Things: A Comprehensive Survey", Earth Science Informatics, vol. 15, no. 2, pp. 735-764, 2022.
  • [13] M. Singh and M.P. Singh, "Congestion Avoidance with Source Location Privacy Using Octopus-based Dynamic Routing Protocol in WSN", Wireless Networks, vol. 29, pp. 729-748, 2023.
  • [14] G. Kumar et al., "Dynamic Routing Approach for Enhancing Source Location Privacy in Wireless Sensor Networks", Wireless Networks, vol. 29, pp. 2591-607, 2023.
  • [15] M. Kamarei, A. Patooghy, A. Alsharif, and V. Hakami, "SiMple: A Unified Single and Multi-path Routing Algorithm for Wireless Sensor Networks with Source Location Privacy", IEEE Access, vol. 8, pp. 33818-33829, 2020.
  • [16] S. Chakraborty, N.K. Goyal, S. Mahapatra, and S. Soh, "Minimal Path-based Reliability Model for Wireless Sensor Networks with Multistate Nodes", IEEE Transactions on Reliability, vol. 69, no. 1, pp. 382-400, 2020.
  • [17] P. Mishra et al., "Reliability Evaluation of a Wireless Sensor Network in Terms of Network Delay and Transmission Probability for IoT Applications", Contemporary Mathematics, pp. 309-325, 2024.
  • [18] F. Dan et al., "An Accuracy-aware Energy-efficient Multipath Routing Algorithm for WSNs", Sensors, vol. 24, no. 1, art. no. 285, 2024.
  • [19] N. Sonnappa and K. Muniyegowda, "Privacy-aware Secured Discrete Framework in Wireless Sensor Network", International Journal of Electrical and Computer Engineering, vol. 14, no. 1, pp. 75-85, 2024.
  • [20] X. Xu, J. Tang, and H. Xiang, "Data Transmission Reliability Analysis of Wireless Sensor Networks for Social Network Optimization", Journal of Sensors, vol. 2022, art. no. 3842722, 2022.
  • [21] A.M. Alabdali, N. Gharaei, and A.A. Mashat, "A Framework for Energy-efficient Clustering with Utilizing Wireless Energy Balancer", IEEE Access, vol. 9, pp. 117823-117831, 2021.
  • [22] L.C. Mutalemwa and S. Shin, "Energy Balancing and Source Node Privacy Protection in Event Monitoring Wireless Networks", 2021 International Conference on Information Networking (ICOIN), Jeju Island, South Korea, 2021.
  • [23] C.-M. Yu et al., "BRATRA: Balanced Routing Algorithm with Transmission Range Adjustment for Energy Efficiency and Utilization Balance in WSNs", IEEE Internet of Things Journal, vol. 10, no. 2, pp. 1096-1111, 2023.
  • [24] J. Long, M. Dong, K. Ota, and A. Liu, "Achieving Source Location Privacy and Network Lifetime Maximization Through Tree-based Diversionary Routing in Wireless Sensor Networks", IEEE Access, vol. 2, pp. 633-651, 2014.
  • [25] H. Wang et al., "A Probabilistic Source Location Privacy Protection Scheme in Wireless Sensor Networks", IEEE Transaction on Vehicular Technology, vol. 68, no. 6, pp. 5917-5927, 2019.
  • [26] L.C. Mutalemwa and S. Shin, "Secure Routing Protocols for Source Node Privacy Protection in Multi-hop Communication Wireless Networks", Energies, vol. 13, no. 2, art. no. 292, 2020.
  • [27] C. Ozturk, Y. Zhang, and W. Trappe, "Source-location Privacy in Energy-constrained Sensor Network Routing", Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 88-93, 2004.
  • [28] Q. Wang, J. Zhan, X. Ouyang, and Y. Ren, "SPS and DPS: Two New Grid-based Source Location Privacy Protection Schemes in Wireless Sensor Networks", Sensors, vol. 19, no. 9, art. no. 2074, 2019.
  • [29] Z. Xiong et al., "A Ring-based Routing Scheme for Distributed Energy Resources Management in IIoT", IEEE Access, vol. 8, pp. 167490-167503, 2020.
  • [30] T. Hussain et al., "Improving Source Location Privacy in Social Internet of Things Using a Hybrid Phantom Routing Technique", Computers & Security, vol. 123, art. no. 102917, 2022.
  • [31] C. Gu, M. Bradbury, and A. Jhumka, "Phantom Walkabouts: A Customisable Source Location Privacy Aware Routing Protocol for Wireless Sensor Networks", Concurrency and Computation, Practice and Experience, vol. 31, no. 20, 2019.
  • [32] G. Han et al., "A Dynamic Multipath Scheme for Protecting Source-location Privacy Using Multiple Sinks in WSNs Intended for IIoT", IEEE Transactions on Industrial Informatics, vol. 16, no. 8, pp. 5527-5538, 2020.
  • [33] N. Jan, A. Al-Bayatti, N. Alalwan, and A. Alzahrani, "An Enhanced Source Location Privacy Based on Data Dissemination in Wireless Sensor Networks (DeLP)", Sensors, vol. 19, no. 9, art. no. 2050, 2019, DOI:.
  • [34] L. Mutalemwa, "Location Privacy Protection and Coverage Hole Effects in Event Monitoring Wireless Networks for Internet of Things Applications", Journal of ICT Systems, vol. 1, no. 2, pp. 52-70, 2023.
  • [35] P. Kamat, Y. Zhang, W. Trappe, and C. Ozturk, "Enhancing Source-location Privacy in Sensor Network Routing", 25th IEEE International Conference on Distributed Computing Systems (ICDCS’05), Columbus, USA, 2005.
  • [36] C. Gu, M. Bradbury, J. Kirton, and A. Jhumka, "A Decision Theoretic Framework for Selecting Source Location Privacy Aware Routing Protocols in Wireless Sensor Networks", Future Generation Computer Systems, vol. 87, pp. 514-526, 2018.
  • [37] W.-K. Yun and S.-J. Yoo, "Q-Learning-based Data-aggregation-aware Energy-efficient Routing Protocol for Wireless Sensor Networks", IEEE Access, vol. 9, pp. 10737-10750, 2021.
  • [38] N.R. Patel, S. Kumar, and S.K. Singh, "Energy and Collision Aware WSN Routing Protocol for Sustainable and Intelligent IoT Applications", IEEE Sensors Journal, vol. 21, no. 22, pp. 25282-25292, 2021.
  • [39] D. Thomas, R. Shankaran, M.A. Orgun, and S.C. Mukhopadhyay, "SEC 2: A Secure and Energy Efficient Barrier Coverage Scheduling for WSN-Based IoT Applications", IEEE Transactions on Green Communications Networking, vol. 5, no. 2, pp. 622-634, 2021.
  • [40] Y. Liu et al., "An Improved Energy-efficient Routing Protocol for Wireless Sensor Networks", Sensors, vol. 19, no. 20, art. no. 4579, 2019.
  • [41] G. Sudha and C. Tharini, "Trust-based Clustering and Best Route Selection Strategy for Energy Efficient Wireless Sensor Networks", Automatika, vol. 64, no. 3, pp. 634-641, 2023.
  • [42] V. Narayan, A.K. Daniel, and P. Chaturvedi, "E-FEERP: Enhanced Fuzzy Based Energy Efficient Routing Protocol for Wireless Sensor Network", Wireless Personal Communications, vol. 131, pp. 371-398, 2023.
  • [43] T.M. Behera et al., "CH Selection via Adaptive Threshold Design Aligned on Network Energy", IEEE Sensors Journal, vol. 21, no. 6, pp. 8491-8500, 2021.
  • [44] S. K. Chaurasiya et al., "An Energy-efficient Hybrid Clustering Technique (EEHCT) for IoT-Based Multilevel Heterogeneous Wireless Sensor Networks", IEEE Access, vol. 11, pp. 25941-25958, 2023.
  • [45] Z. Qu et al., "An Energy-efficient Dynamic Clustering Protocol for Event Monitoring in Large-scale WSN", IEEE Sensors Journal, vol. 21, no. 20, pp. 23614-23625, 2021.
  • [46] Q. We et al., "A Cluster-based Energy Optimization Algorithm in Wireless Sensor Networks with Mobile Sink", Sensors, vol. 21, no. 7, art. no. 2523, 2021.
  • [47] T. Shafique et al., "A Review of Energy Hole Mitigating Techniques in Multi-hop Many to One Communication and its Significance in IoT Oriented Smart City Infrastructure", IEEE Access, vol. 11, pp. 121340-121367, 2023.
  • [48] X. Liu and J. Wu, "A Method for Energy Balance and Data Transmission Optimal Routing in Wireless Sensor Networks", Sensors, vol. 19, no. 13, art. no. 3017, 2019.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-656f0ef0-8f5d-4341-a348-9a9c91c680ef
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.