Source location privacy preservation in IoT-enabled event-driven WSNs

IF 0.6 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS International Journal of Pervasive Computing and Communications Pub Date : 2022-10-10 DOI:10.1108/ijpcc-05-2022-0214
Nidhi Sharma, Ravindara Bhatt
{"title":"Source location privacy preservation in IoT-enabled event-driven WSNs","authors":"Nidhi Sharma, Ravindara Bhatt","doi":"10.1108/ijpcc-05-2022-0214","DOIUrl":null,"url":null,"abstract":"\nPurpose\nPrivacy preservation is a significant concern in Internet of Things (IoT)-enabled event-driven wireless sensor networks (WSNs). Low energy utilization in the event-driven system is essential if events do not happen. When events occur, IoT-enabled sensor network is required to deal with enormous traffic from the concentration of demand data delivery. This paper aims to explore an effective framework for safeguarding privacy at source in event-driven WSNs.\n\n\nDesign/methodology/approach\nThis paper discusses three algorithms in IoT-enabled event-driven WSNs: source location privacy for event detection (SLP_ED), chessboard alteration pattern (SLP_ED_CBA) and grid-based source location privacy (GB_SLP). Performance evaluation is done using simulation results and security analysis of the proposed scheme.\n\n\nFindings\nThe sensors observe bound events or sensitive items within the network area in the field of interest. The open wireless channel lets an opponent search traffic designs, trace back and reach the start node or the event-detecting node. SLP_ED and SLP_ED_CBA provide better safety level results than dynamic shortest path scheme and energy-efficient source location privacy protection schemes. This paper discusses security analysis for the GB_SLP. Comparative analysis shows that the proposed scheme is more efficient on safety level than existing techniques.\n\n\nOriginality/value\nThe authors develop the privacy protection scheme in IoT-enabled event-driven WSNs. There are two categories of occurrences: nominal events and critical events. The choice of the route from source to sink relies on the two types of events: nominal or critical; the privacy level required for an event; and the energy consumption needed for the event. In addition, phantom node selection scheme is designed for source location privacy.\n","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":null,"pages":null},"PeriodicalIF":0.6000,"publicationDate":"2022-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Pervasive Computing and Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1108/ijpcc-05-2022-0214","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS","Score":null,"Total":0}
引用次数: 1

Abstract

Purpose Privacy preservation is a significant concern in Internet of Things (IoT)-enabled event-driven wireless sensor networks (WSNs). Low energy utilization in the event-driven system is essential if events do not happen. When events occur, IoT-enabled sensor network is required to deal with enormous traffic from the concentration of demand data delivery. This paper aims to explore an effective framework for safeguarding privacy at source in event-driven WSNs. Design/methodology/approach This paper discusses three algorithms in IoT-enabled event-driven WSNs: source location privacy for event detection (SLP_ED), chessboard alteration pattern (SLP_ED_CBA) and grid-based source location privacy (GB_SLP). Performance evaluation is done using simulation results and security analysis of the proposed scheme. Findings The sensors observe bound events or sensitive items within the network area in the field of interest. The open wireless channel lets an opponent search traffic designs, trace back and reach the start node or the event-detecting node. SLP_ED and SLP_ED_CBA provide better safety level results than dynamic shortest path scheme and energy-efficient source location privacy protection schemes. This paper discusses security analysis for the GB_SLP. Comparative analysis shows that the proposed scheme is more efficient on safety level than existing techniques. Originality/value The authors develop the privacy protection scheme in IoT-enabled event-driven WSNs. There are two categories of occurrences: nominal events and critical events. The choice of the route from source to sink relies on the two types of events: nominal or critical; the privacy level required for an event; and the energy consumption needed for the event. In addition, phantom node selection scheme is designed for source location privacy.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
物联网事件驱动的无线传感器网络中的源位置隐私保护
在支持物联网(IoT)的事件驱动无线传感器网络(wsn)中,隐私保护是一个重要问题。如果事件不发生,事件驱动系统中的低能量利用率是必不可少的。当事件发生时,需要启用物联网的传感器网络来处理来自需求数据交付集中的巨大流量。本文旨在探索一种有效的事件驱动wsn源隐私保护框架。本文讨论了物联网事件驱动wsn中的三种算法:用于事件检测的源位置隐私(SLP_ED)、棋盘改变模式(SLP_ED_CBA)和基于网格的源位置隐私(GB_SLP)。利用仿真结果对该方案进行了性能评估和安全性分析。传感器在感兴趣的领域观察网络区域内的绑定事件或敏感项目。开放的无线信道允许对手搜索流量设计,跟踪并到达开始节点或事件检测节点。SLP_ED和SLP_ED_CBA提供了比动态最短路径方案和节能源位置隐私保护方案更好的安全级别结果。本文讨论了GB_SLP的安全性分析。对比分析表明,该方案在安全水平上优于现有方案。原创性/价值作者在支持物联网的事件驱动wsn中开发了隐私保护方案。事件有两类:名义事件和关键事件。从源到接收的路由选择依赖于两种类型的事件:名义事件或关键事件;事件所需的隐私级别;以及活动所需的能量消耗。此外,为了保证源位置的隐私性,设计了虚拟节点选择方案。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
International Journal of Pervasive Computing and Communications
International Journal of Pervasive Computing and Communications COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS-
CiteScore
6.60
自引率
0.00%
发文量
54
期刊最新文献
Big data challenges and opportunities in Internet of Vehicles: a systematic review Cooperative optimization techniques in distributed MAC protocols – a survey Novel communication system for buried water pipe monitoring using acoustic signal propagation along the pipe A new predictive approach for the MAC layer misbehavior in IEEE 802.11 networks Clustering based EO with MRF technique for effective load balancing in cloud computing
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1