| Literature DB >> 33266471 |
Fengyin Li1, Ying Wang1, Hongwei Ju2, Yanli Wang1, Zhaojie Wang1, Huiyu Zhou3.
Abstract
Anonymous technology is an effective way for protecting users' privacy. Anonymity in sensor networks is to prevent the unauthorized third party from revealing the identities of the communication parties. While, in unstable wireless sensor networks, frequent topology changes often lead to route-failure in anonymous communication. To deal with the problems of anonymous route-failure in unstable sensor networks, in this paper we propose a fully anonymous routing protocol with self-healing capability in unstable sensor networks by constructing a new key agreement scheme and proposing an anonymous identity scheme. The proposed protocol maintains full anonymity of sensor nodes with the self-healing capability of anonymous routes. The results from the performance analysis show that the proposed self-healing anonymity-focused protocol achieves full anonymity of source nodes, destination nodes, and communication association.Entities:
Keywords: anonymous identification scheme; anonymous routing protocol; diffie-hellman key exchange algorithm; self-healing capability; wireless sensor network
Year: 2020 PMID: 33266471 PMCID: PMC7700574 DOI: 10.3390/s20226683
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Routing Table Structure.
| The Serial Number Of The Destination | The Destination IP Address | The Number of Hops Required to Reach the Destination |
|---|---|---|
| The symbol of the legitimate destination serial number | ||
| Other status and routing symbol bits | ||
| Network Interface | ||
| Next hop | ||
| Survival time | ||
Figure 1Architecture of On-demand Anonymous Routing Protocol.
Symbols definition.
| Symbol | Meaning |
|---|---|
|
| Paired keys shared by node i and neighbor node |
|
| One-hop anonymous identity shared between node |
|
| The shared key between node |
|
| Data transferred from node |
| Hash functions | |
|
| Public key of destination node |
|
| Private key of destination node |
|
| A random number |
|
| The source node with address |
|
| The destination node with address |
|
| A symmetric key of |
|
| A unique Session ID used in RREQ and RREP processes |
|
| The key of |
|
| The real ID of node |
|
| security parameter |
| cyclic group | |
|
| prime order |
|
| generator |
Figure 2Route Establishment.
Figure 3Packet Structure of Encryption Route Information.
Figure 4RREQ Process.
Figure 5RREP Process.
Figure 6Self-healing Process of Anonymous Routes.
Performance Analysis.
| Protocol | Source Nodes Anonymity | Communications Association Anonymity | Destination Nodes Anonymity | Self-Healing |
|---|---|---|---|---|
|
| ✓ | ✓ | ✓ | ✓ |
|
| × | ✓ | × | × |
|
| × | × | ✓ | × |
Figure 7Location of Sensors and Adversaries and a Randomly Generated Network Topology.
Figure 8Real Position of Sensor Detected by Adversary.
Figure 9The Route Detected by Adversaries After Intercepting the Sensor’s True Identity.
Figure 10The Adversities Cannot Obtain the Route.
Figure 11The Error Occurs the Node B.
Figure 12Simulation Without Self-healing Capability.
Figure 13Simulation of Self-healing Capability with Shortcut.
Figure 14Simulation of Self-healing capability without shortcut.