Providing Source-Location Privacy in Wireless Sensor Networks

  • Authors:
  • Yun Li;Jian Ren

  • Affiliations:
  • Department of Electrical and Computer Engineering, Michigan State University, East Landing, USA 48864-1226;Department of Electrical and Computer Engineering, Michigan State University, East Landing, USA 48864-1226

  • Venue:
  • WASA '09 Proceedings of the 4th International Conference on Wireless Algorithms, Systems, and Applications
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Wireless sensor networks (WSN) have been widely used in many areas for unattended event monitoring. Mainly due to lack of a protected physical boundary, wireless communications are vulnerable to unauthorized detection, interception and and even node capture. Privacy is becoming one of the major issues that jeopardize the successful deployment and survivability of wireless sensor networks. While confidentiality of the message can be ensured through content encryption, it is much more difficult to adequately address the source-location privacy. For WSN, source-location privacy service is further complicated by the fact that the sensor nodes consist of low-cost and low-power radio devices, computationally intensive cryptographic algorithms (such as public-key cryptosystems) and large scale broadcasting-based protocols are not suitable for WSN. In this paper, we propose a two-step routing strategy for the messages to be routed from the actual source node to the SINK node through either a single, or multiple, randomly selected intermediate node(s) away from the source node so that it is to make it infeasible for the adversaries to trace back to the source node through hop-by-hop routing analysis. In the first protocol, the messages will be routed to a single intermediate node. This scheme can provide very good local source-location privacy. We also propose routing through multiple randomly selected intermediate nodes based on angle and quadrant to further improve the performance and security. While providing source-location privacy for WSN, our simulation results demonstrate that the proposed schemes are very efficient in energy consumption, and transmission latency. The proposed schemes can also assurance high message delivery ratio. Therefore, they can be used for many practical applications.