Share Email Print

Proceedings Paper

Enhancing source location protection in wireless sensor networks
Author(s): Juan Chen; Zhengkui Lin; Di Wu; Bailing Wang
Format Member Price Non-Member Price
PDF $14.40 $18.00
cover GOOD NEWS! Your organization subscribes to the SPIE Digital Library. You may be able to download this paper for free. Check Access

Paper Abstract

Wireless sensor networks are widely deployed in the internet of things to monitor valuable objects. Once the object is monitored, the sensor nearest to the object which is known as the source informs the base station about the object’s information periodically. It is obvious that attackers can capture the object successfully by localizing the source. Thus, many protocols have been proposed to secure the source location. However, in this paper, we examine that typical source location protection protocols generate not only near but also highly localized phantom locations. As a result, attackers can trace the source easily from these phantom locations. To address these limitations, we propose a protocol to enhance the source location protection (SLE). With phantom locations far away from the source and widely distributed, SLE improves source location anonymity significantly. Theory analysis and simulation results show that our SLE provides strong source location privacy preservation and the average safety period increases by nearly one order of magnitude compared with existing work with low communication cost.

Paper Details

Date Published: 3 December 2015
PDF: 5 pages
Proc. SPIE 9794, Sixth International Conference on Electronics and Information Engineering, 97940N (3 December 2015); doi: 10.1117/12.2205835
Show Author Affiliations
Juan Chen, Dalian Maritime Univ. (China)
Zhengkui Lin, Dalian Maritime Univ. (China)
Di Wu, Dalian Maritime Univ. (China)
Bailing Wang, Harbin Institute of Technology (China)

Published in SPIE Proceedings Vol. 9794:
Sixth International Conference on Electronics and Information Engineering
Qiang Zhang, Editor(s)

© SPIE. Terms of Use
Back to Top