Computer and Modernization

Previous Articles     Next Articles

A Multiple-phantom Node Source Location Privacy Preserving Protocol in WSN

  

  1. (College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China)
  • Received:2016-06-27 Online:2017-03-09 Published:2017-03-20

Abstract:

 In WSN applied for monitoring objects, attackers can get the location of source node by hop-by-hop traceback to data packet, which is an enormous threat to the safety of monitoring object. Thus, it is necessary to apply some appropriate strategies to protect the source location privacy. When existing route strategies based on phantom node select phantom node, these strategies concentrate on source data packet walking randomly or in constructed track, however, the locations of phantom nodes are not diversified and the walk paths overlap easily. During the network initialization phase, we selected two phantom nodes for every node through the triplet creation. The triplet creation method can ensure the two phantom nodes for every node are both outside the visible area by calculating the geographical location of node. During route work phase, source node chose a phantom node through random number and sent data packet, relay nodes transmit data packet by sector region division and selection. Theoretical analysis and simulation experiment shows that, the proposed strategy enhances safety of source node and ensures the balance of transmission delay.

Key words: wireless sensor network, source-location, privacy preserving, multiple-phantom node, sector-region division

CLC Number: