PSSPR: A Source Location Privacy Protection Scheme Based on Sector Phantom Routing in WSNs

by   Yuling Chen, et al.

Source location privacy (SLP) protection is an emerging research topic in wireless sensor networks (WSNs). Because the source location represents the valuable information of the target being monitored and tracked, it is of great practical significance to achieve a high degree of privacy of the source location. Although many studies based on phantom nodes have alleviates the protection of source location privacy to some extent. It is urgent to solve the problems such as complicate the ac path between nodes, improve the centralized distribution of Phantom nodes near the source nodes and reduce the network communication overhead. In this paper, PSSPR routing is proposed as a visable approach to address SLP issues. We use the coordinates of the center node V to divide sector-domain, which act as important role in generating a new phantom nodes. The phantom nodes perform specified routing policies to ensure that they can choose various locations. In addition, the directed random route can ensure that data packets avoid the visible range when they move to the sink node hop by hop. Thus, the source location is protected. Theoretical analysis and simulation experiments show that this protocol achieves higher security of source node location with less communication overhead.


Trust Aware Privacy Preserving Routing Protocol for Wireless Adhoc Network

Wireless Ad-Hoc Networks are especially helpful and quite well for essen...

Neighborhood Information-based Probabilistic Algorithm for Network Disintegration

Many real-world applications can be modelled as complex networks, and su...

Coordinator Location Effects in AODV Routing Protocol in ZigBee Mesh Network

ZigBee mesh network is very important research field in computer network...

A Spectrum Aware Mobility Pattern Based Routing Protocol for CR-VANETs

Cognitive radio technology offers an important function in the efficient...

FedWalk: Communication Efficient Federated Unsupervised Node Embedding with Differential Privacy

Node embedding aims to map nodes in the complex graph into low-dimension...

Resilient Privacy Protection for Location-Based Services through Decentralization

Location-based Services (LBSs) provide valuable features but can also re...

DCFIT: Initial Trigger-Based PFC Deadlock Detection in the Data Plane

Recent data center applications rely on lossless networks to achieve hig...

Please sign up or login with your details

Forgot password? Click here to reset