Next Article in Journal
An Efficient Data-Gathering Routing Protocol for Underwater Wireless Sensor Networks
Next Article in Special Issue
Multi-Layer Approach for the Detection of Selective Forwarding Attacks
Previous Article in Journal
EFPC: An Environmentally Friendly Power Control Scheme for Underwater Sensor Networks
Article Menu

Export Article

Open AccessArticle
Sensors 2015, 15(11), 29129-29148; doi:10.3390/s151129129

Hiding the Source Based on Limited Flooding for Sensor Networks

1
Department of Information Science and Technology, Dalian Maritime University, Dalian 116026, China
2
Department of Computer Science, Harbin Institute of Technology, Weihai 264209, China
*
Author to whom correspondence should be addressed.
Academic Editor: Rongxing Lu
Received: 25 August 2015 / Revised: 2 November 2015 / Accepted: 11 November 2015 / Published: 17 November 2015
(This article belongs to the Special Issue Security and Privacy in Sensor Networks)
View Full-Text   |   Download PDF [1442 KB, uploaded 17 November 2015]   |  

Abstract

Wireless sensor networks are widely used to monitor valuable objects such as rare animals or armies. Once an object is detected, the source, i.e., the sensor nearest to the object, generates and periodically sends a packet about the object to the base station. Since attackers can capture the object by localizing the source, many protocols have been proposed to protect source location. Instead of transmitting the packet to the base station directly, typical source location protection protocols first transmit packets randomly for a few hops to a phantom location, and then forward the packets to the base station. The problem with these protocols is that the generated phantom locations are usually not only near the true source but also close to each other. As a result, attackers can easily trace a route back to the source from the phantom locations. To address the above problem, we propose a new protocol for source location protection based on limited flooding, named SLP. Compared with existing protocols, SLP can generate phantom locations that are not only far away from the source, but also widely distributed. It improves source location security significantly with low communication cost. We further propose a protocol, namely SLP-E, to protect source location against more powerful attackers with wider fields of vision. The performance of our SLP and SLP-E are validated by both theoretical analysis and simulation results. View Full-Text
Keywords: wireless sensors network; internet of things; source location; privacy protection; security wireless sensors network; internet of things; source location; privacy protection; security
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. (CC BY 4.0).

Scifeed alert for new publications

Never miss any articles matching your research from any publisher
  • Get alerts for new papers matching your research
  • Find out the new papers from selected authors
  • Updated daily for 49'000+ journals and 6000+ publishers
  • Define your Scifeed now

SciFeed Share & Cite This Article

MDPI and ACS Style

Chen, J.; Lin, Z.; Hu, Y.; Wang, B. Hiding the Source Based on Limited Flooding for Sensor Networks. Sensors 2015, 15, 29129-29148.

Show more citation formats Show less citations formats

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Sensors EISSN 1424-8220 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top