“…Solutions are limited to transmission power of nodes that make the adversary hard to detect. Proposed solutions are silencing through anti-localisation [38], context aware location privacy [39], hidden anchor [40], minimal radio transmission power [41] and multi co-operator power control [42].…”
Wireless Sensor Network (WSN) is a recognized environment used in many applications that require monitoring events. They lack in maintaining confined boundary and so they are prone to unauthorized interception and detection. Privacy has become an essential issue in finding a solution for deploying the environment of WSN. In specific this paper deals with the study of solutions related to Privacy that preserves the source location on WSN. Various methods ensure confidentiality of the messages by encrypting the contents. Adequate addressing on source location privacy is bit complex due to intensive computations on cryptographic algorithms that are not adaptable for WSN. Conventional methods related to authentication and encryption fail to preserve privacy on managing sinks location. To complicate the process every node generates fake messages depending on their corresponding nodes. But these fake messages consume more energy from the nodes that impacts the lifetime of the network. This paper provides us the overview on the source location privacy along with the essential concepts related to it. The concepts are summarized and solutions are categorized based on their techniques. The limitations of the various methodologies are found and solutions are classified accordingly.
“…Solutions are limited to transmission power of nodes that make the adversary hard to detect. Proposed solutions are silencing through anti-localisation [38], context aware location privacy [39], hidden anchor [40], minimal radio transmission power [41] and multi co-operator power control [42].…”
Wireless Sensor Network (WSN) is a recognized environment used in many applications that require monitoring events. They lack in maintaining confined boundary and so they are prone to unauthorized interception and detection. Privacy has become an essential issue in finding a solution for deploying the environment of WSN. In specific this paper deals with the study of solutions related to Privacy that preserves the source location on WSN. Various methods ensure confidentiality of the messages by encrypting the contents. Adequate addressing on source location privacy is bit complex due to intensive computations on cryptographic algorithms that are not adaptable for WSN. Conventional methods related to authentication and encryption fail to preserve privacy on managing sinks location. To complicate the process every node generates fake messages depending on their corresponding nodes. But these fake messages consume more energy from the nodes that impacts the lifetime of the network. This paper provides us the overview on the source location privacy along with the essential concepts related to it. The concepts are summarized and solutions are categorized based on their techniques. The limitations of the various methodologies are found and solutions are classified accordingly.
“…Some schemes will actively monitor whether attackers exist in the network and take corresponding measures to protect the location privacy of the source nodes. In the lightweight and distributed protocol against adversarial localization scheme [23], the network is divided into multiple grids. If an attacker is found in a grid, all sensor nodes in that grid become silent.…”
Section: A Slp Schemes Without Using Ringmentioning
Recently, Distributed Energy Resources (DERs) have been utilized with increasing frequency in Industrial Internet of Things (IIoT) to deal with energy and environmental challenges. IIoT with wireless communication technology, which is easy to be intercepted, often facing various attack. For the safety of the network, more complex algorithms need to be run on IIoT, but the action need more energy. In addition, in some application scenarios, the location where the packets were generated indicates that an event occurred. An attacker can find the sensor node through a backtracking attack, which is equivalent to reaching the place where the event occurred. In order to hide the location information of the event, it is necessary to protect source location privacy (SLP), which will also increase the energy consumption of IIoT. If only the traditional battery is used to power the nodes in IIoT, the lifetime of the system will be limited. When IIoT is deployed outdoors, it is often difficult to replace the battery. The existence of lakes make IIoT have coverage holes during deployment. In order to implement SLP and make the system work for a long time in the environment with deployment holes, we use DERs. Herein, we propose an SLP protection scheme based on phantom nodes, rings, and fake paths (PRFs) for IIoT. To increase the safety time of the network, the PRFs dynamically selects the phantom nodes. To adapt to a complex deployment environment, the ring can be flexibly deployed according to the terrain. The PRFs uses fake paths to confuse attackers. We integrate DERs technology into PRFs, such as using solar power modules, looking forward to extending the lifetime of the system.The experimental results proved that the PRFs could efficiently reduce backtracking attacks while maintaining a balance between security and network energy consumption of IIoT.
“…An example solution against global attackers is the use of Network Coding [7] which have the disadvantage of increasing complexity in the sensing nodes. Most of the solutions proposed defend the network against local adversaries using techniques such as random walk [8], cyclic entrapment [9], delaying the packet [10] or limiting node detectability [3,11]. Some other techniques are able to defend the network against local or global adversaries utilizing implementation dependent approaches (e.g., use of dummy packets [8]).…”
Section: Related Workmentioning
confidence: 99%
“…Another prominent study in this class is by Dutta et al [11] where it is considered that the attackers measure raw physical properties of messages like angle of arrival or the signal strength of the detected signal. In order to defend against this kind of attackers, they propose anti-localization by silencing in which sensors intelligently predict their own importance as a measure of two conflicting requirements: localize the adversary and hide from the adversary.…”
Contextual privacy in Wireless Sensor Networks (WSNs) is concerned with protecting contextual information such as whether, when, and where the data is collected. In this context, hiding the existence of a WSN from adversaries is a desirable feature. One way to mitigate the sensor nodes' detectability is by limiting the transmission power of the nodes (i.e., the network is operating in the stealth mode) so that adversaries cannot detect the existence of the WSN unless they are within the sensing range of the WSN. Position dependent transmission power adjustment enables the network to maintain its level of stealth while allowing nodes farther from the network boundary to use higher transmission power levels. To mitigate the uneven energy dissipation characteristic, nodes that cannot dissipate their energies on communications reduce the amount of data they generate through computation so that the relay nodes convey less data. Dynamic data compression/decompression strategies reduce the amount of data to be communicated, thus, they achieve better energy savings when compared to static compression/decompression of data in which the data is always compressed independently of the power transmission strategy. In this study, we investigate various data compression strategies to maximize the lifetime of WSNs employing contextual privacy measures through a novel Mathematical Programming framework.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.