Secure Routing Protocols for Source Node Privacy Protection in Multi-Hop Communication Wireless Networks

Author:

Mutalemwa Lilian C.ORCID,Shin SeokjooORCID

Abstract

Traffic analysis attacks are common in monitoring wireless sensor networks (WSNs). In the attacks, adversaries analyze the traffic pattern to obtain critical information such as the location information of a source node. Fake source packet routing protocols are often used to ensure source location privacy (SLP) protection. The protocols rely on broadcasting fake packets from fake sources concurrently with the transmission of real packets from the real source nodes to obfuscate the adversaries. However, fake source packet routing protocols have demonstrated some performance limitations including high energy consumption, low packet delivery ratio (PDR), and long end-to-end delay (EED). In this study, two existing fake source packet routing protocols are considered. Then two new phantom-based SLP routing protocols are proposed to address the limitations. Each proposed protocol introduces a two-level phantom routing strategy to ensure two adversary confusion phases. When the adversaries perform traffic analysis attacks on the packet routes, they encounter two levels of obfuscation. Simulation results establish that the proposed protocols have superior performance features. The protocols guarantee strong SLP protection throughout the WSN domain with controlled energy consumption, PDR, and EED. Furthermore, the proposed protocols achieve more practical results under varied network configurations.

Funder

Ministry of Oceans and Fisheries

National Research Foundation

Publisher

MDPI AG

Subject

Energy (miscellaneous),Energy Engineering and Power Technology,Renewable Energy, Sustainability and the Environment,Electrical and Electronic Engineering,Control and Optimization,Engineering (miscellaneous)

Cited by 18 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Hybrid Random Routing Protocol to Enhance the Performance of Routing Protocol in Source Location Privacy Using Ant Colony Optimization and Random Walk;2024 Fifteenth International Conference on Ubiquitous and Future Networks (ICUFN);2024-07-02

2. Awareness based gannet optimization for source location privacy preservation with multiple assets in wireless sensor networks;Concurrency and Computation: Practice and Experience;2024-06-19

3. A dynamic routing scheme for underwater acoustic sensor networks in submarine disaster applications;Frontiers in Marine Science;2024-06-07

4. A Novel CCAP Protocol to Increase Security with Energy Efficiency for Wireless Sensor Networks;2023 7th International Conference on Electronics, Communication and Aerospace Technology (ICECA);2023-11-22

5. Source Location Privacy Protection Algorithms in IoT Networks: A Survey;Advances in Intelligent Systems and Computing;2023

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3