Privacy Preservation of Sink Node Location in Wireless Sensor Network Using RFSN-RSA

Privacy Preservation of Sink Node Location in Wireless Sensor Network Using RFSN-RSA

Kolli V. Krishna KishorePondugala Sudheer Kumar Dondeti Venketasulu

Department of CSE, VFSTR, Vadlamudi, AP 522213, India

Corresponding Author Email: 
kishorekvk_1@yahoo.com
Page: 
57-63
|
DOI: 
https://doi.org/10.18280/ama_b.610201
Received: 
8 April 2018
| |
Accepted: 
12 June 2018
| | Citation

OPEN ACCESS

Abstract: 

Sink Node location privacy in sensor networks deployed in Industrial Internet of Things (IIOT) is one of the challenging tasks because of data security and protection.  In industrial sensor networks, sensor nodes transfer data packets from a source node to sink node (base station) by using the multi-hop technique.  Based on the nature of the sensor network, adversaries may easily track the sink node location by traffic analysis. There are many approaches to overcome this problem. In this paper, we proposed an approach to preserve the privacy of the sink node in addition to secured data transmission from adversaries attacks.  In our work, random fake sink node (RFSN) approach is used to mislead the adversary.  After forming the clusters, and cluster heads  (CH), one of the cluster head will be selected randomly as fake sink node (FSN), and all other CHs send fake data packets to this FSN to mislead adversary.  Fake sink nodes are changed dynamically at intervals to make it difficult for an adversary to distinguish between FSN and original sink node. The simulation results show the privacy of the sink node location is preserved from the adversaries with an elongated lifetime of sensor nodes. The simulation result also proved that the proposed approach with RSA algorithm has provided more security with low packet loss.

Keywords: 

IIOT, wireless sensor network, privacy preservation, adversaries attacks, Random fake sink node, RFSN-RSA, cluster head

1. Introduction
2. Literature Survey
3. Methodology
4. Simulation Results
5. Conclusion
  References

[1] Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E. (2002). Wireless sensor networks: A survey. Computer Networks 38(4): 393–422. https://doi.org/ 10.1016/S1389-1286(01)00302-4

[2] Hansen E, Neander J, Nolin M, Bj M. (2009). Efficient Cluster Formation for Sensor Networks, 1–8.

[3] Li N, Zhang N, Das SK, Thuraisingham B. (2009). Privacy preservation in wireless sensor networks: A state-of-the-art survey. Ad Hoc Networks 7(8): 1501–1514. https://doi.org/10.1016/j.adhoc.2009.04.009

[4] Poe WY, Schmitt JB. (2009). Sink placement without location information in large-scale wireless sensor networks. Asian Internet Engineering Conference 69-76. https://doi.org/10.1145/1711113.1711126

[5] Ebrahimi Y, Younis M. (2011). Using deceptive packets to increase base-station anonymity in wireless sensor network. In 2011 7th International Wireless Communications and Mobile Computing Conference, IEEE 842–847. https://doi.org/10.1109/IWCMC.2011.5982656

[6] Ying B, Gallardo JR, Makrakis D, Mouftah HT. (2011). Concealing of the sink location in wsns by artificially homogenizing traffic intensity. In 2011 IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2011. https://doi.org/10.1109/ INFCOMW.2011.5928957

[7] Liu Z, Xu W. (2012). Determining sink location through Zeroing-In attackers in wireless sensor networks. Wireless Networks 18(3): 335–349. https://doi.org/10.1007/s11276-011-0403-2

[8] Wang G, Kim D, Cho G. (2012). A secure cluster formation scheme in wireless sensor networks. International Journal of Distributed Sensor Networks 2012. https://doi.org/10.1155/2012/301750

[9] Chen F, Li R. (2013). Sink node placement strategies for wireless sensor networks. Wireless Personal Communications. https://doi.org/10.1007/s11277-011-0453-x

[10] Ngai ECH, Rodhe I. (2013). On providing location privacy for mobile sinks in wireless sensor networks. Wireless Networks 19(1): 115–130. https://doi.org/10.1007/s11276-012-0454-z

[11] Singh DP, Goudar RH, Wazid M. (2013). Hiding the sink location from the passive attack in WSN. In Procedia Engineering. https://doi.org/10.1016/ j.proeng.2013.09.072

[12] Al-Haija QA, Smadi M, Al-JA’Fari M, Al-ShuA’Ibi A. (2014). Efficient FPGA implementation of RSA coprocessor using scalable modules. Procedia Computer Science 34(Eicm): 647–654. https://doi.org/10.1016/ j.procs.2014.07.092

[13] Jain TK, Saini DS, Bhooshan SV. (2014). Cluster head selection in a homogeneous wireless sensor network ensuring full connectivity with minimum isolated nodes. Journal of Sensors 2014. https://doi.org/10.1155/2014/724219

[14] Ying BD, Makrakis D, Mouftah HT. (2014). Anti-traffic analysis attack for location privacy in WSNs. https://doi.org/10.1186/1687-1499-2014-131

[15] Abuzneid AS, Sobh T, Faezipour M. (2015). An enhanced communication protocol for location privacy in WSN. International Journal of Distributed Sensor Networks 2015. https://doi.org/10.1155/2015/697098

[16] Bangash Y, Zeng L, Feng D. (2015). MimiBS: Mimicking Base-Station to provide location privacy protection in wireless sensor networks. Proceedings of the 2015 IEEE International Conference on Networking, Architecture and Storage, NAS 2015 158–166. https://doi.org/10.1109/NAS.2015.7255210

[17] Chen H, Lou W. (2015). On protecting end-to-end location privacy against local eavesdropper in wireless sensor networks. Pervasive and Mobile Computing 16(PA) 36–50. https://doi.org/10.1016/j.pmcj.2014.01.006

[18] Long J, Liu A, Dong M, Li Z. (2015). An energy-efficient and sink-location privacy enhanced scheme for WSNs through ring based routing. Journal of Parallel and Distributed Computing 81–82, 47–65. https://doi.org/10.1016/j.jpdc.2015.04.003

[19] Zhang JD, Chow CY. (2015). REAL: A Reciprocal Protocol for Location Privacy in Wireless Sensor Networks. IEEE Transactions on Dependable and Secure Computing. https://doi.org/10.1109/TDSC.2014.2366467

[20] Wang J, Wang F, Cao Z, Lin F, Wu J. (2017). Sink location privacy protection under direction attack in wireless sensor networks. Wireless Networks. https://doi.org/10.1007/s11276-015-1179-6

[21] Baroutis N, Younis M. (2017). Load-conscious maximization of base-station location privacy in wireless sensor networks. Computer Networks 124, 126–139. https://doi.org/10.1016/j.comnet.2017.06.021

[22] Sirajuddin M, Rupa Ch, Prasad A. (2018). A trusted model using improved-AODV in MANETS with packet loss reduction mechanism. Journal of Advances in Modelling and Analysis B 61(1): 15-22. 

[23] Liyanage M, Chang C, Srirama S,  Loke S. (2018). Indoor people density sensing using Wi-Fi and channel state informatin. Journal of Advances in Modelling and Analysis B 61(1): 37-47.