Many routing protocols have been proposed that provide slp, all of which provide a tradeoff between slp and energy. Wireless sensor networks wsns are rapidly emerging as an important new area in. Trappe, sourcelocation privacy in energyconstrained sensor network routing, in proc. Multiobjective load balancing clustering technique in wireless sensor networks, applied soft computing journal, 2019 ns2. Buttyan, designing a secure labelswitching routing protocol for wireless sensor networks. Such measures and attacks can be used to evaluate the degree of privacy protection of existing and forthcoming location anonymization techniques in. Mobile ad hoc networks consist of wireless hosts that communicate with each other in the absence of a fixed infrastructure. Normally the packetbased routing of sensor networks is based on. In their proposed scheme, a routingaware tree is constructed in which the leaf. Geographic and energyaware routing in wireless sensor networks. The detailed analysis to arrive at these conclusions will be given in sections ii and iii. Two further chapters offer in depth studies of secure and privacy preserving data protocols for wireless sensor and mesh. Sensor networks wsns used in the context of healthcare.
Sourcelocation privacy is to prevent event source tracking by adversaries and sinklocation. Location privacy in sensor networks against a global eavesdropper. We designed the novel privacy aware routing phase and utilized the trajectory dissimilarity between mobile nodes to mislead adversaries about the location where the message started its journey. This problem is exacerbated in the domain of wsns owing to the extreme resource limitation of sensor nodes. Indeed, the vulnerability of the wireless sensor networks to attacks comes principally from their inherent characteristics.
Pdf design and implementation of a trustaware routing. Source location privacy slp is an important property for a large class of securitycritical wireless sensor network wsn applications such as monitoring and tracking. Pdf the domain of wireless sensor networks wsns applications is. Thus, privacyaware routing techniques need to be developed for protecting the source node, while ensuring the data is delivered to the sink. Motivated by the observations, we propose a flexible routing strategy, known as phantom routing, which protects the sources location. An efficient security aware routing protocol for mobile ad. Privacyaware routing in sensor networks computer networks. Source location privacy slp is becoming an important property for a large class of securitycritical wireless sensor network applications such as monitoring and tracking. The work in 12 presents a proactive communication algorithm for context aware sensor network. In proceedings of the 3rd ieee international workshop on wireless and sensor networks security, october 2007. High speed data routing in vehicular sensor networks. Thus, privacy aware routing techniques need to be developed for protecting the source node, while ensuring the data is delivered to the sink.
Random parallel routing is a straightforward privacy aware routing scheme which is shown in fig. However, they cannot provide specific security features for mesh networks and are still vulnerable to various types of routing attacks such as gray hole, route redirection, spoofing, etc 12. Wireless sensor networks are deployed without predefined infrastructure and are generally left unattended. Trajectory privacy preservation in mobile wireless sensor networks by xinyu jin florida international university, 20 miami, florida professor niki pissinou, major professor in recent years, there has been an enormous growth of locationaware devices, such as gps embedded cell phones, mobile sensors and radiofrequency identi. In proceedings of the 28th international conference on distributed computing systems workshops. In addition, for dealing with sensor failure and reliable routing, we recommend the work in kannan et al. Experiments have been conducted to gauge the performance of the proposed protocols under different network. Extensive work has been done on the protection of wireless sensor networks wsns from the hardware to the application layer. Sain saginbekov, arshad jhumka and yerxan mademikhanov. Wrs routing allows the messages to be routed in a splicing network, which is more practical and natural for sensor networks and requires only a little deployment information. Three poweraware routing algorithms for sensor networks. Summary source location privacy slp is an important property for a. However, they do not assume about user data privacy, and we are unfamiliar about of any data aggregation protocol that focused on both privacy and trustworthiness problems.
Due to the multihop and decentralized network architecture. This scheme 1 equalizes traffic patterns of the sensor network to deal with eavesdropping and 2 minimizes the routing information of each sensor node to deal with node compromising. There have been a multitude of solutions proposed to ensure the security of the routing protocol and the privacy information in wmns. Efficient collision resolution for wireless sensor networks x ji, y he, j wang, w dong, x wu, y liu infocom, 2014 proceedings ieee, 961 969, 2014. While developing and evaluating our privacyaware routing protocols, we jointly consider issues of locationprivacy as well as the amount of energy consumed by the sensor network.
International journal of ad hoc and ubiquitous computing, 2009. Ieee internet of things journal 1 anypath routing protocol. Protecting the location privacy of source and sink nodes in a sensor network is an important problem. Nov 25, 2011 extensive work has been done on the protection of wireless sensor networks wsns from the hardware to the application layer. Accordingly, we propose a random schedule scheme to confuse the. Shenzhen, china 16 18 december 2015 ieee catalog number. Wensheng zhang and guohong cao, group rekeying for filtering false data in sensor networks. We also show how to mathematically analyze the performance in terms of location privacy. We then propose wrs, a suboptimal but practical privacyaware routing scheme, and provide simulation results. A lower bound on the number of nodes with multiple slots in wireless sensor networks with multiple sinks, proceedings sensornets 2017. Journal of wireless communications and mobile computing, 32, pages 187208, march 2003, pdf qun li, ron peterson, michael derosa and daniela rus. But utilizing activity awareness for energy e cient and resource optimizing networking is. Each node is willing to forward data to other nodes. Source location privacy slp is an important property for a large class of security.
A balanced power aware clustering and routing protocol for wireless sensor networks, ad hoc networks, 2019 ns2. Privacyaware sociopsychological trust and reputation model for. Wireless sensor networks wsns have been widely deployed to monitor valuable objects. These techniques include manual microprobing, laser cutting, focused. Final year project titles in wireless sensor networks. Deconstructing source location privacyaware routing protocols. In these applications, the sensor node senses the existence of objects and transmitting data packets to the sink node sn in a multi hop fashion. However, designing a routing protocol for underwater sensor networks is. Pdf pollakvirag award of the hungarian telecommunication scientific society g. A publickey based false data filtering scheme in sensor networks. To the best of our knowledge, this is one of the first works, if it is not the very first, to provide distributed and online trajectory privacy preservation mechanisms in mwsns. For various mobile sensing applications, some recent research 8 addresses trust and privacy simultaneously. A novel privacy aware secure routing protocol for hwmn. While developing and evaluating our privacy aware routing protocols, we jointly consider issues of location privacy as well as the amount of energy consumed by the sensor network.
More importantly, when considering this research issue, we observe that none of the available privacyaware cryptographic primitives can be applied directly. A survey on security and privacy in emerging sensor. Hybrid wireless mesh network hwmn is the most practical architecture in wireless mesh networks wmns, which provides a fusion of heterogeneous wireless networks, network connectivity and coverage to distributed users in a wide area to support applications in different domains, such as military, finance and healthcare. A typical sensor network application is to monitor objects, including wildlife, vehicles and events, in which information about an object is. Sourcelocation privacy in energyconstrained sensor network routing. Sourcelocation privacy in energyconstrained sensor. Optimalclusterbased source anonymity protocol in delaysensitive wireless sensor networks. In the seminal work on slp, phantom routing was proposed as a viable approach to address slp. Nowadays, as the next generation sensor networks, cyberphysical systems cpss refer to the complex networked systems that have both physical subsystems and cyber components, and the information flow between different subsystems and components is across a communication network, which forms a closedloop.
The sn is a powerful node with high performance and is used to collect all the information sensed by the sensor nodes. Wireless sensor networks wsns can be deployed for habitat monitoring and military surveillance 1. Security and privacy protection have been the primary concerns in pushing towards the success of wmns. Privacyaware routing in sensor networks electrical engineering. Towards tolerating mobile sink compromises in wireless sensor networks, acm mobihoc, may 2005. Some examples of the possible uses of ad hoc networking include soldiers on the battlefield, emergency disaster relief personnel, and networks of laptops. Mar 10, 2020 wireless sensor networks are deployed without predefined infrastructure and are generally left unattended. Request pdf on link quality aware routing for industrial wireless sensor networks wireless communication is susceptible to attenuation, multipath and interference. A predistribution and local collaborationbased approach, ieee infocom, march 2005.
Analysis of location privacy solutions in wireless sensor. Moreover, to support realtime services, wmns must also be equipped. However, recent work has shown some limitations of phantom routing such as poor data yield and low slp. As the data are transmitted over the air, it is very easy for an adversary to spy on traffic. A balanced poweraware clustering and routing protocol for wireless sensor networks, ad hoc networks, 2019 ns2.
Neighborhood view consistency in wireless sensor networks. Contextaware wireless sensor networks for assistedliving. Secure and privacyaware data collection in wireless. A decision theoretic framework for selecting source.
Alarmnet is a multiplatform, securityand privacy aware architecture integrating a wide spectrum of heterogeneous devices such as wireless sensor nodes, gateways, pdas, and backendsystems for data storage and analysis. Also, to meet the strict budgetary requirements, the sensor nodes tend. Hiding trajectory on the fly school of computing and. Traditional shortestpath oriented routing algorithms give adversaries the possibility to locate the target node in a certain area. We then propose wrs, a suboptimal but practical privacy aware routing scheme, and provide simulation results. Sasn 04 proceedings of the 2nd acm workshop on security of ad hoc and sensor networks pages 8893 washington dc, usa october 25 25, 2004 acm new york, ny, usa 2004 table of. On link quality aware routing for industrial wireless. Networkmanet security vamsi krishna kanuri naga swetha dasari reshma aravapalli manet a mobile adhoc network is a wireless adhoc network which is used to exchange information. Finally, we extend the discussion to an extreme adversary model, which allows the adversary to deploy an adversary sensor network to monitor the message routing activities.
However, only recently, the privacy preservation problem has drawn the attention of the research community because of its challenging nature. The scheme makes it hard for an adversary to deduce the sink by making the directions of both incoming. Secure and efficient source location privacypreserving. Cfp1530fpod 9781509003303 2015 11th international conference on mobile adhoc and. The security mechanism should ensure that no message in the network. A framework for integrated unicast and multicast routing in contextaware ordered meshes is presented in.
Two further chapters offer indepth studies of secure and privacypreserving data protocols for wireless sensor and mesh. Deconstructing source location privacyaware routing. A role based privacyaware secure routing protocol for. Alarmnet is a multiplatform, securityand privacyaware architecture integrating a wide spectrum of heterogeneous devices such as wireless sensor nodes, gateways, pdas, and backendsystems for data storage and analysis. Ieee international conference on dependable systems and networksdsn, 2004. Location privacy of the users carrying mobile devices is another aspect. Several papers have worked on different routing schemes for location privacy preservation, but little is known about the theoretical bounds for those schemes. International journal of distributed sensor networks. Random parallel routing is a straightforward privacyaware routing scheme which is shown in fig. Harry gao, seth utecht, gregory patrick, george hsieh, fengyuan xu, haodong wang, and qun li. In comparison, this paper presents the theoretical foundation in designing a privacyaware routing in sensor netw orks.
New generation sensor networks are found in a growing number of applications and have. In 4 author fake packet injection to preserve the location privacy of the sink. Ensuring security and privacy in wireless sensor networks. Pdf geographic and energyaware routing in wireless. Trajectory privacy preservation in mobile wireless sensor. Reactive behavior in selfreconfiguring sensor networks. It goes on to propose ways of securing routing in wireless mesh networks. Routing security issues in wireless sensor networks. Pdf routing security issues in wireless sensor networks. A wireless sensor network is a collection of numerous sensors. Security and privacy issues are of paramount importance to wmns for their wide deployment and for supporting serviceoriented applications. Wireless mesh networks wmns have emerged as a key technology for next generation wireless networks and provide a lowcost and convenient solution to the lastmile problem.
465 1057 1002 1027 1151 591 400 734 1312 114 1539 1142 1348 445 462 1121 400 128 404 981 1671 1027 784 1120 1272 274 806 1121 159 687 823 297 209 1054 1132 1486 848 541