Visible to the public An energy-efficient routing technique for privacy preservation of assets monitored with WSN

TitleAn energy-efficient routing technique for privacy preservation of assets monitored with WSN
Publication TypeConference Paper
Year of Publication2014
AuthorsManjula, R., Datta, R.
Conference NameStudents' Technology Symposium (TechSym), 2014 IEEE
Date PublishedFeb
Keywordsasset monitoring, base station, Base stations, data privacy, delays, endangered species monitoring, energy conservation, energy efficient routing technique, fake packet injection technique, Monitoring, phantom node, phantom source, Phantoms, privacy, privacy preservation, Routing, Routing protocols, telecommunication power management, telecommunication security, Wireless Sensor Network, Wireless sensor networks, WSN
Abstract

Wireless Sensor Networks (WSNs) are deployed to monitor the assets (endangered species) and report the locations of these assets to the Base Station (BS) also known as Sink. The hunter (adversary) attacks the network at one or two hops away from the Sink, eavesdrops the wireless communication links and traces back to the location of the asset to capture them. The existing solutions proposed to preserve the privacy of the assets lack in energy efficiency as they rely on random walk routing technique and fake packet injection technique so as to obfuscate the hunter from locating the assets. In this paper we present an energy efficient privacy preserved routing algorithm where the event (i.e., asset) detected nodes called as source nodes report the events' location information to the Base Station using phantom source (also known as phantom node) concept and a-angle anonymity concept. Routing is done using existing greedy routing protocol. Comparison through simulations shows that our solution reduces the energy consumption and delay while maintaining the same level of privacy as that of two existing popular techniques.

DOI10.1109/TechSym.2014.6808069
Citation Key6808069