An energy-efficient routing technique for privacy preservation of assets monitored with WSN
Title | An energy-efficient routing technique for privacy preservation of assets monitored with WSN |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Manjula, R., Datta, R. |
Conference Name | Students' Technology Symposium (TechSym), 2014 IEEE |
Date Published | Feb |
Keywords | asset monitoring, base station, Base stations, data privacy, delays, endangered species monitoring, energy conservation, energy efficient routing technique, fake packet injection technique, Monitoring, phantom node, phantom source, Phantoms, privacy, privacy preservation, Routing, Routing protocols, telecommunication power management, telecommunication security, Wireless Sensor Network, Wireless sensor networks, WSN |
Abstract | Wireless Sensor Networks (WSNs) are deployed to monitor the assets (endangered species) and report the locations of these assets to the Base Station (BS) also known as Sink. The hunter (adversary) attacks the network at one or two hops away from the Sink, eavesdrops the wireless communication links and traces back to the location of the asset to capture them. The existing solutions proposed to preserve the privacy of the assets lack in energy efficiency as they rely on random walk routing technique and fake packet injection technique so as to obfuscate the hunter from locating the assets. In this paper we present an energy efficient privacy preserved routing algorithm where the event (i.e., asset) detected nodes called as source nodes report the events' location information to the Base Station using phantom source (also known as phantom node) concept and a-angle anonymity concept. Routing is done using existing greedy routing protocol. Comparison through simulations shows that our solution reduces the energy consumption and delay while maintaining the same level of privacy as that of two existing popular techniques. |
DOI | 10.1109/TechSym.2014.6808069 |
Citation Key | 6808069 |
- phantom source
- WSN
- wireless sensor networks
- Wireless Sensor Network
- telecommunication security
- telecommunication power management
- Routing protocols
- Routing
- privacy preservation
- privacy
- Phantoms
- asset monitoring
- phantom node
- Monitoring
- fake packet injection technique
- energy efficient routing technique
- energy conservation
- endangered species monitoring
- delays
- data privacy
- Base stations
- base station