Cargando…

Hiding the Source Based on Limited Flooding for Sensor Networks

Wireless sensor networks are widely used to monitor valuable objects such as rare animals or armies. Once an object is detected, the source, i.e., the sensor nearest to the object, generates and periodically sends a packet about the object to the base station. Since attackers can capture the object...

Descripción completa

Detalles Bibliográficos
Autores principales: Chen, Juan, Lin, Zhengkui, Hu, Ying, Wang, Bailing
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2015
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4701324/
https://www.ncbi.nlm.nih.gov/pubmed/26593923
http://dx.doi.org/10.3390/s151129129
_version_ 1782408461246529536
author Chen, Juan
Lin, Zhengkui
Hu, Ying
Wang, Bailing
author_facet Chen, Juan
Lin, Zhengkui
Hu, Ying
Wang, Bailing
author_sort Chen, Juan
collection PubMed
description Wireless sensor networks are widely used to monitor valuable objects such as rare animals or armies. Once an object is detected, the source, i.e., the sensor nearest to the object, generates and periodically sends a packet about the object to the base station. Since attackers can capture the object by localizing the source, many protocols have been proposed to protect source location. Instead of transmitting the packet to the base station directly, typical source location protection protocols first transmit packets randomly for a few hops to a phantom location, and then forward the packets to the base station. The problem with these protocols is that the generated phantom locations are usually not only near the true source but also close to each other. As a result, attackers can easily trace a route back to the source from the phantom locations. To address the above problem, we propose a new protocol for source location protection based on limited flooding, named SLP. Compared with existing protocols, SLP can generate phantom locations that are not only far away from the source, but also widely distributed. It improves source location security significantly with low communication cost. We further propose a protocol, namely SLP-E, to protect source location against more powerful attackers with wider fields of vision. The performance of our SLP and SLP-E are validated by both theoretical analysis and simulation results.
format Online
Article
Text
id pubmed-4701324
institution National Center for Biotechnology Information
language English
publishDate 2015
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-47013242016-01-19 Hiding the Source Based on Limited Flooding for Sensor Networks Chen, Juan Lin, Zhengkui Hu, Ying Wang, Bailing Sensors (Basel) Article Wireless sensor networks are widely used to monitor valuable objects such as rare animals or armies. Once an object is detected, the source, i.e., the sensor nearest to the object, generates and periodically sends a packet about the object to the base station. Since attackers can capture the object by localizing the source, many protocols have been proposed to protect source location. Instead of transmitting the packet to the base station directly, typical source location protection protocols first transmit packets randomly for a few hops to a phantom location, and then forward the packets to the base station. The problem with these protocols is that the generated phantom locations are usually not only near the true source but also close to each other. As a result, attackers can easily trace a route back to the source from the phantom locations. To address the above problem, we propose a new protocol for source location protection based on limited flooding, named SLP. Compared with existing protocols, SLP can generate phantom locations that are not only far away from the source, but also widely distributed. It improves source location security significantly with low communication cost. We further propose a protocol, namely SLP-E, to protect source location against more powerful attackers with wider fields of vision. The performance of our SLP and SLP-E are validated by both theoretical analysis and simulation results. MDPI 2015-11-17 /pmc/articles/PMC4701324/ /pubmed/26593923 http://dx.doi.org/10.3390/s151129129 Text en © 2015 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Chen, Juan
Lin, Zhengkui
Hu, Ying
Wang, Bailing
Hiding the Source Based on Limited Flooding for Sensor Networks
title Hiding the Source Based on Limited Flooding for Sensor Networks
title_full Hiding the Source Based on Limited Flooding for Sensor Networks
title_fullStr Hiding the Source Based on Limited Flooding for Sensor Networks
title_full_unstemmed Hiding the Source Based on Limited Flooding for Sensor Networks
title_short Hiding the Source Based on Limited Flooding for Sensor Networks
title_sort hiding the source based on limited flooding for sensor networks
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4701324/
https://www.ncbi.nlm.nih.gov/pubmed/26593923
http://dx.doi.org/10.3390/s151129129
work_keys_str_mv AT chenjuan hidingthesourcebasedonlimitedfloodingforsensornetworks
AT linzhengkui hidingthesourcebasedonlimitedfloodingforsensornetworks
AT huying hidingthesourcebasedonlimitedfloodingforsensornetworks
AT wangbailing hidingthesourcebasedonlimitedfloodingforsensornetworks