A source-location privacy protection strategy via pseudo normal distribution-based phantom routing in WSNs

Jun Huang, Meisong Sun, Shitong Zhu, Yi Sun, Cong Cong Xing, Qiang Duan

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Scopus citations

Abstract

Toward resolving the source-location privacy protection issue in Wireless Sensor Networks (WSNs), a Pseudo Normal Distribution-based Phantom Routing (PNDBPR) protocol is proposed in this paper. The proposed protocol is composed of two critical phases: 1) adjusting the value of minimum-hops between a phantom node and its source, and varying the area of the phantom node distribution region at the network deployment stage; 2) generating a set of Gaussian-distributed random real numbers using the Pseudo Random Generator when the source node is transmitting data packets, and calculating the corresponding random walk hops. Theoretical analyses and simulation results show that PNDBPR can dramatically improve the diversity and the dynamicity of the phantom nodes distribution at the expense of a slight increase in communication overheads when compared with the existing PUSBRF (Source Location Privacy Preservation Protocol in Wireless Sensor Network Using Source Based Restricted Flooding) and HBDRW(A hop-based directed random walk) protocols.

Original languageEnglish (US)
Title of host publication2015 Symposium on Applied Computing, SAC 2015
EditorsDongwan Shin
PublisherAssociation for Computing Machinery
Pages688-694
Number of pages7
ISBN (Electronic)9781450331968
DOIs
StatePublished - Apr 13 2015
Event30th Annual ACM Symposium on Applied Computing, SAC 2015 - Salamanca, Spain
Duration: Apr 13 2015Apr 17 2015

Publication series

NameProceedings of the ACM Symposium on Applied Computing
Volume13-17-April-2015

Other

Other30th Annual ACM Symposium on Applied Computing, SAC 2015
CountrySpain
CitySalamanca
Period4/13/154/17/15

All Science Journal Classification (ASJC) codes

  • Software

Fingerprint Dive into the research topics of 'A source-location privacy protection strategy via pseudo normal distribution-based phantom routing in WSNs'. Together they form a unique fingerprint.

Cite this