| Literature DB >> 22294881 |
Riaz Ahmed Shaikh1, Hassan Jameel, Brian J d'Auriol, Heejo Lee, Sungyoung Lee, Young-Jae Song.
Abstract
Full network level privacy has often been categorized into four sub-categories: Identity, Route, Location and Data privacy. Achieving full network level privacy is a critical and challenging problem due to the constraints imposed by the sensor nodes (e.g., energy, memory and computation power), sensor networks (e.g., mobility and topology) and QoS issues (e.g., packet reach-ability and timeliness). In this paper, we proposed two new identity, route and location privacy algorithms and data privacy mechanism that addresses this problem. The proposed solutions provide additional trustworthiness and reliability at modest cost of memory and energy. Also, we proved that our proposed solutions provide protection against various privacy disclosure attacks, such as eavesdropping and hop-by-hop trace back attacks.Entities:
Keywords: anonymity; eavesdropping; hop-by-hop trace back; privacy; routing; wireless sensor networks
Mesh:
Year: 2010 PMID: 22294881 PMCID: PMC3264433 DOI: 10.3390/s100301447
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Comparison of privacy preserving schemes.
| PFR [ | PSR [ | SAS &CAS [ | CEM [ | SIGF [ | GeRaF [ | SiFT [ | |
|---|---|---|---|---|---|---|---|
| Required information for routing | ID of destination | Routing table (e.g., destination ID, #of hops | Depending on a routing scheme | Depending on a routing scheme | Own, destination, & neighborhood locations | Own and destination location | Destination trajectory and own location |
| Transmission mechanism | 1st phase: Point-to-point; 2nd phase: Broadcast | Point-to-point | Depending on a routing scheme | Depending on a routing scheme | Point-to-point | Broadcast | Broadcast |
| Decision place for forwarding | 1st phase: Transmitter; 2nd phase: Receiver | Transmitter | Depending on a routing scheme | Depending on a routing scheme | Transmitter | Receiver | Receiver |
| Criteria for forwarding packet to next hop | 1st phase: random; 2nd phase: flooding | 1st phase: random; 2nd phase: shortest in terms of hops | Depending on a routing scheme | Depending on a routing scheme | Randomly select any trusted node lies in forwarding region | Node that is closer to the destination in terms of location | Node that is closer to the destination in terms of trajectory |
| Identity privacy | Not Available | Not Available | Available | Not Available | Not Available | Not Applicable | Not Applicable |
| Route privacy | Available | Available | Depending on a routing scheme | Depending on a routing scheme | Available | Available | Available |
| Location privacy | Available | Available | Not Available | Available | Available | Not Applicable | Not Applicable |
| Data privacy | Not Available | Not Available | Available | Available | Available | Not Applicable | Not Applicable |
Figure 1.Typical WSN scenario.
Figure 2.Neighbor node classification
IRL - Routing at Source Node.
| 1: | |
| 2: | |
| 3: | |
| 4: | |
| 5: | |
| 6: | |
| 7: | |
| 8: | |
| 9: | |
| 10: | Drop packet and Exit; |
| 11: | |
| 12: | |
| 13: | Set |
| 14: | Form pkt |
| 15: | Create Signature and save in buffer; |
| 16: | Forward packet to |
| 17: | Set timer
|
| 18: | |
| 19: | Signature remains in buffer; |
| 20: | |
| 21: | Signature removed from buffer; |
IRL - Routing at Intermediate Node.
| 1: | |
| 2: | |
| 3: | |
| 4: | |
| 5: | |
| 6: | Set |
| 7: | Remove signature from buffer; |
| 8: | |
| 9: | Drop packet and exit; |
| 10: | |
| 11: | |
| 12: | |
| 13: | |
| 14: | |
| 15: | |
| 16: | |
| 17: | |
| 18: | |
| 19: | |
| 20: | |
| 21: | |
| 22: | |
| 23: | Drop packet and Exit; |
| 24: | |
| 25: | |
| 26: | |
| 27: | |
| 28: | |
| 29: | |
| 30: | |
| 31: | |
| 32: | Drop packet and Exit; |
| 33: | |
| 34: | |
| 35: | |
| 36: | |
| 37: | |
| 38: | |
| 39: | |
| 40: | |
| 41: | Drop packet and Exit; |
| 42: | |
| 43: | |
| 44: | |
| 45: | Rest is same as |
Figure 3.Sample routing scenario of IRL scheme.
Figure 4.Three sample cycle detection and prevention scenarios.
Neighbor list table at sensor node.
| Neighbor nodeID (Integer) | Direction | Past interactions based on time window | Trust value | |||||
|---|---|---|---|---|---|---|---|---|
| Successful interactions ( | Unsuccessful interactions ( | |||||||
| 1 | 10 | ... | 5 | 4 | ... | 1 | 90 | |
| 2 | 2 | ... | 4 | 8 | ... | 2 | 25 | |
| ⋮ | ⋮ | ⋮ | ⋮ | ⋮ | ⋮ | ⋮ | ⋮ | ⋮ |
| M | 5 | … | 7 | 0 | … | 3 | 70 | |
Memory requirement in bits.
| PFR [ | (16+1) |
| PSR [ | (16+16+1) |
| SAS [ | |
| CAS [ | |
| IRL / r-IRL |
Figure 5.Memory consumption analysis: N= 100; K=8 bytes; Δt = 5; bytes; k = 8 bytes.
Simulation parameters.
| Network specific | Number of nodes | 300 |
| Distance b/w nodes | 50 units | |
| Mobility of nodes | zero | |
| Node specific | Sensor node’s Initial battery | 1 × 106J |
| Power consumption for trans. | 1.6W | |
| Power consumption for recv. | 1.2 W | |
| Idle power consumption | 1.15W | |
| Carrier sense threshold | 3.65 | |
| Receive power threshold | 1.55 | |
| Frequency | 9.14 | |
| Trans. & Recv. antenna gain | 1.0 | |
| Protocol & Application specific | Application | CBR |
| Reliability param. | 3 | |
| 10 |
Figure 6.Energy consumption analysis: simulation time: 5,000.
Figure 7.Path diversity of privacy schemes.
Figure 8.Probability of a packet to move in the backward direction.