Escolar Documentos
Profissional Documentos
Cultura Documentos
Abstract-For the problem that the existing source-location results show the algorithm can protect source-location privacy
privacy protection algorithms have lower safety periods, source effectively.
location privacy protection algorithm based on expected
phantom source node is proposed. With coordinates of source
II. NETWORK MODEL
node and sink node, the algorithm establishes an ellipse and
selects a node randomly on the ellipse as expected phantom
source node which providing direction for phantom source node. A. System Model
By selecting dispersive expected phantom source nodes, The system of wireless sensor network is similar to Panda
transmission paths of adjacent packets are dispersive. Hunter Game [8, 9] is a six tuple (N, B, P, H, M, A), where:
Theoretical analysis shows that the algorithm can increase the
probability of packet away from source node and sink node 1) N is the set of nodes. Nodes are stationary[II].
during transmission procedure. The experimental results show 2) B is base station, sink. Adversary cannot read position
that the algorithm can enhance safety period. of the source node from packet. Location of B is public.
3) P is the panda monitored by WSN. The node closest
Keywords-wireless sensor network; privacy protection; source
panda will become source node and report data to sink.
location; expected phantom source node
4) H is adversary, namely, illegal hunter. H locates
source-location and capture panda. H has the characters:
I. INTRODUCTION
passive, initial location is near sink. Hearing radius is litimed.
Wireless sensor network (WSN) is used in many fields. H can analyze the signal reached.
Wireless sensor network rely on wireless communications 5) M is the attack mode, trace back. For n hops fixed path,
which is vulnerable to attack [1]. Privacy protection is divided H can locate source-location after listening n packets [11].
into content and location [2]. Anonymous is used to conduct
6) A is privacy protection algorithm to resist the attack M
content privacy protection. Location privacy protection is to
protect location [3]. Random walk is used to conduct location B. Coordinates of Source and Sink based Ellipse Model
privacy protection. According monitor range, adversaries are As shown in Fig 1, two-dimensional coordinates of node
divided into global and local adversary [4]. Global adversary positioning in network initialization is XOY, B is the origin of
achieves traffic analysis [5]. The monitor radius of local XOY, coordinate is (0,0) . The coordinate of S is (xs, ys).
adversary is limited, similar to sensor communication radius.
According to attack mode, the adversaries can be divided into
active and passive adversaries. Active adversary controls
network nodes. Passive adversary traces packets [6].
Source-location privacy protection in wireless sensor x
network gets more attention in recent years [7]. Ozturk put
forward the Panda-Hunter Game and phantom flooding
algorithm [8]. Pandurang Kamat put forward phantom single
path routing algorithm [9]. Juan Chen proposed source-based
restricted flooding protocol (PUSBRF) [10], making packet
away from source node. Yun Li proposed the privacy
protection algorithm using network hybrid ring, protecting the
source-location privacy effectively [11].
To protect source-location privacy in wireless sensor
network, the paper proposed source-location privacy protection
algorithm based on expected phantom source node (ABEPSN). Figure I. Coordinates and ellipse model
With node information, selects expect phantom source node.
Based on the Panda-Hunter Game, conducts experiment, The distance of source node S to base station B is dBs :
978-1-4673-9904-3/16/$31.00 ©2016lEEE
985
A. Sink Initialization Phase
(I)
Each node gets its coordinate by location algorithm, sets the
hops to sink is +=. Sink node generates Sink_Init packet [10],
The mid-point of S and B is 0'. The direction of S and B is broadcasts it. Sink Init = {sink_broadcast, sender_ID,
U axis. The perpendicular bisector of line S to B is V axis. dBs sender coordinate, sink_hop, sink_coordinate}. The
is used to construct an equilateral triangle. Constructing an sink_broadcast is message type; sender_ID is ID of sender
ellipse which focuses are S and B and pass the third point of node; sender_coordinate is the coordinate of sender; sink_hop
the triangle. The equation of ellipse is: is the hop from sender node to sink which initial value is O.
sink coordinate is the coordinate of sink node.
XQ = UQ x cos(arctan(Yo'))-
xo'
Va x sin(arctan(Yo
')) + Xs
- 2
xo'
(4)
VQ x cos(arctan(Yo')) + Ys
xo' 2
Figure 2. An example of ABEPSN
ABEPSN algorithm is divides into four phases. An example B. Source Node Initialization Phase
of it is shown in Fig 2. The main symbols used frequently are The initialization steps of source node S as following:
listed in Tab I.
1) S establishes ellipse in UO'V according to (2).
2) S calculates epected phantom source node (XESP, YESP)
TABLE!. THE MAIN SYMBOLS IN THE PAPER
and h1eas,.
Symbol Definition a) Constructing safe zone. As shown in Fig 2, in order
ho B The minimal hops to the sink from Q, Q is random node
to select an effective expected phantom source node ESP(UESP,
Expect phantom source node on ellipse which provides
ESP
direction for selecting SP
VESP), constructs safe zone which B and S are the centers and
SP Phantom source node which S selects actually through ESP Rsa/e is radius respectively, and adjusts the selection interval of
The theoretical minimum hops which S sends packet to ESP, UESP to [up, ug].
h'easl its value is the ratio of communication radius to the distance
b) The [up, uJ is divided into a series of sub-intervals.
from S to expected phantom source node after rounding up
In order to disperse the transmission path adjacent data
The selection interval of abscissa of expected phantom source
[up, ug] packets, excludes the last selected sub-interval, selects
node ESP
Positive integer greater than one, which determines the radius
randomly a sub-interval from other sub-intervals every time,
k
Rsafe of the safe zone, k=2, 3, 4, ...... , +00
selects a random value in the sub-interval as UESP. Taking UESP
Rsafe The radius of the safe zone, RsaJe = dBS / k to (2) and calculating the VESP which is positive or negative
986
ESP YESP).
randomly. According to (4), obtains expected phantom source
Rsa/e
node ESP( X , dSe = dBS X cos(arcsin(--)) (5)
c) S calculates h'eas,' h'eas, = rthe distance of S to dss
expected phantom source node ESP / communication radius 1-
According to Fig 2 and (5), the length of ef is:
3) S sets hops count is O.
C. Select the Phantom Source Node Phase
Q stands for source node S and the nodes received packet.
The steps ofQ deals with the packet are as following: (6)
1) Node Qjudges whether itself is source node S. IfQ is S,
turns to 2); otherwise, Q adds the hops count of the packet by
one, then turns to 2). 6SeBV) 6Sgf, ug is dsg - c:
2) Node Q calculates the distance to expected phantom
source node. If the distance less than communication radius,
turns to 6); otherwise, turns to 3).
ug =- � + (�dB/ -Rfa/e +
3) Node Q calculates the distance of each neighbor nodes (2xdBS -�dB/ -R;a/e)2 -R;a/e x�dB/ -R;a/e
to expected phantom source node. If the minimal distance less
than the distance of Q to ESP, turns to 5); otherwise, turns to xdBS -2x"dI BS - Rsa/e ) dBS
4
2 2
(7)
SP
neighbor node which has the minimal distance to expected ABEPSN does not introduce flooding. Communication
phantom source node, the procedure of Q dealing with packet overhead is transmission delay: hs + hsp B. It assumes that
ends. SP closes to ellipse. Because the sum of distance of any point
6) Step 6: Node Q becomes SP, the procedure of Q on the ellipse to two focuses is 2a, communication overhead
dealing with packet ends. is transmission delay: 2a = 2dB_s "'" 2hs_B.
987
When the parameter k is 6, 7 or 8, the safety period is period. For the Panda-Hunter Game, panda is unchanged [8].
higher. When k = 6, the effect of different dividing methods to The paper ignores the communication overhead of flooding in
safety period was shown in Fig 3. The safety period is higher PUSBRF. When WSN is used to monitor moving target, the
when Interval-4, Interval-5 and Interval-6. communication overhead of flooding cannot be ignored.
:::;;�'::�;::':;;�::��:�:�:�:���-++-Jnterval-4 ABEPSN has a broader applicability.
900
.
1
�800
700 V. CONCLUSIONS
�
0.600
500 The paper proposed source-location privacy protection
!i.400 algorithm in wireless sensor network based on except phantom
,i300
rJ5200
source node (ABEPSN). ABEPSN adjusts the selection range
of expected phantom source node to disperse transmission path
L-�1�0----�20�--�30�--�4�0-----5�0�
100
0 and sets safe zone, resisting the adversary's local attack
The hops of source node to sink
effectively. Theoretical analysis shows the algorithm can
Figure 3. Effect of different dividing methods to safety period determine selection range of expect phantom source node by
the distance from source node to sink and radius of safe zone,
Safety periods of three algorithms were shown in Fig 4. hs decreases the probability of packet passing the source node and
is random walk hops. With hS_B increases, safety period of sink. Experiment results show ABEPSN algorithm can achieve
three algorithms are improved. This is because as hS_B higher safety period, effectively mislead the adversary be away
increase, the adversary needs to track more hops. When k is 6, from true path to improve the source-location privacy.
7 or 8, safety period is higher. This is because ABEPSN
selects phantom source node according to the coordinate on REFERENCES
the ellipse, disperses transmission paths of adjacent packets.
[1] Hui Peng, Hong Chen, Xiaoying Zhang, Yongjian Fan, Cuiping Li,
Adversary cannot continuously monitor the packets.
Deying Li. Location Privacy Preservation in Wireless Sensor Networks.
Journal of Software, 2015, 26(3):617-639.
[2] Yongjian Fan, Hong Chen, Xiaoying Zhang. Data privacy preservation
in wireless in sensor networks. Chinese Journal of Computer, 2012,
35(6): 1131-1146.
[3] Lin Yao, Lin Kang, Pengfei Shang, Guowei Wu. Protecting the sink
location privacy in wireless sensor networks. Personal and Ubiquitous
Computing, 2013, 17(5): 883-893.
[4] Ruben Rios, Javier Lopez. Analysis of location privacy solutions in
wireless sensor networks. IET Communications, 2011, 5(17): 2518-
Figure 4. The change of safety period (fnterval-4) 2532.
[5] Ruben Rios, Jorge Cuellar, Javier Lopez. Probabilistic receiver-location
2) Communication Overhead privacy protection in wireless sensor networks. Information Sciences,
Communication overheads are increased with the increase 2015, 321(10): 205-223.
of hS_B as shown in Fig 5. Communication overhead of single [6] Wei Tan, Ke Xu, Dan Wang. An anti-tracking source-location privacy
path routing is smallest as it selects phantom source node protection protocol in WSNs based on path extension. IEEE Internet of
randomly completely; the each hop of PUSBRF is be away Things Journal, 2014, 1(5): 461-471.
from S, which increases communication overhead compared [7] Di Tang, Tongtong Li, Jian Ren, Jie Wu. Cost-Aware SEcure Routing
with single-path routing. When the hop from S to B is less (CASER) Protocol Design for Wireless Sensor Networks. IEEE Trans.
than 17, ABEPSN algorithm has the minimal communication on Parallel and Distributed Systems, 2015, 26(4): 960-973.
overhead. With the increase of hS_B' the increasing trend is [8] Celal Ozturk, Yanyong Zhang, Wade Trappe. Source-Location privacy
obvious. When hS_B is larger, ABEPSN has maximum. in energy-constrained sensor network routing. Proc. of the 2004 ACM
Through above analysis, it can be known that the Workshop on Security of Ad Hoc and Sensor Networks. Washington,
DC, USA: ACM Press, 2004: 88-93.
communication overhead of ABEPSN is linear to hS_B•
[9] Pandurang Kamat, Yanyong Zhang, Wade Trappe, Celal Ozturk.
Enhancing source-location privacy in sensor network routing. Proc. of
the 25th International Conference on Distributed Computing Systems.
Ohio, USA: IEEE Press, 2005: 599-608.
[10] Juan Chen, Binxing Fang, Lihua Yin, Shen Suo A source-location
privacy preservation protocol in wireless sensor networks using source
based restricted flooding. Chinese Journal of Computer, 20 I 0, 33(9):
1736-1747.
[11] Yun Li, Jian Ren, Jie WU. Quantitative measurement and design of
Figure 5. The change of communication overhead (transmission delay) source-location privacy schemes for wireless sensor networks. IEEE
Trans. on Parallel and Distributed Systems, 2012, 23(7): 1302-1311.
988