An Efficient Anonymous Communication Scheme to Protect the Privacy of the Source Node Location in the Internet of Things

Fengyin Li, Pei Ren, Guoyu Yang, Yuhong Sun, Yilei Wang*, Yanli Wang, Siyuan Li, Huiyu Zhou

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

10 Citations (Scopus)
77 Downloads (Pure)

Abstract

Advances in machine learning (ML) in recent years have enabled a dizzying array of applications such as data analytics, autonomous systems, and security diagnostics. As an important part of the Internet of Things (IoT), wireless sensor networks (WSNs) have been widely used in military, transportation, medical, and household fields. However, in the applications of wireless sensor networks, the adversary can infer the location of a source node and an event by backtracking attacks and traffic analysis. The location privacy leakage of a source node has become one of the most urgent problems to be solved in wireless sensor networks. To solve the problem of source location privacy leakage, in this paper, we first propose a proxy source node selection mechanism by constructing the candidate region. Secondly, based on the residual energy of the node, we propose a shortest routing algorithm to achieve better forwarding efficiency. Finally, by combining the proposed proxy source node selection mechanism with the proposed shortest routing algorithm based on the residual energy, we further propose a new, anonymous communication scheme. Meanwhile, the performance analysis indicates that the anonymous communication scheme can effectively protect the location privacy of the source nodes and reduce the network overhead.

Original languageEnglish
Article number6670847
Number of pages16
JournalSecurity and Communication Networks
Volume2021
DOIs
Publication statusPublished - 24 Feb 2021
Externally publishedYes

Bibliographical note

Publisher Copyright:
© 2021 Fengyin Li et al.

Copyright:
Copyright 2021 Elsevier B.V., All rights reserved.

ASJC Scopus subject areas

  • Information Systems
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'An Efficient Anonymous Communication Scheme to Protect the Privacy of the Source Node Location in the Internet of Things'. Together they form a unique fingerprint.

Cite this