Open Access Open Access  Restricted Access Subscription Access

Efficient and Reliable Routing With Cloud Based Source-Location Privacy Protection in Wireless Sensor Networks


Affiliations
1 Department of Computer Science, Sri Ramakrishna College of Arts and Science, Coimbatore, Tamil Nadu, India
 

WSNs (Wireless Sensor Networks) have recently gained popularity. WSNs are typically deployed in insecure, unstructured areas where their source location reveals critical information about targets. Sensor deployment in WSNs has been seen in a variety of applications that oversee events and send information to base stations. Optimal route selection and source location privacy are critical issues in WSNs. If an intruder determines the source node by studying traffic mode, an attack could be conducted on a target with ease. Previous methods were based on MSROs (Mobile Sink-based Route Optimizations) and Cloud-Based WSN Protection Schemes. This research work chooses the optimum multi-sink node based on the BFAs (Bacteria Foraging Algorithms). But, it does not yield optimal paths to balance the PDRs (Packet Delivery Ratios) and energy dissipation. To seek a solution to this issue, this study proposes ERR-CSLPPs (Efficient and Reliable Routing with Cloud-based Source-Location Privacy Protections) using AAFBOA (Adaptive Adjustment Factor based Butterfly Optimization Algorithm), allowing the approach to choose the mobile sink node. Depending on the ETCs (Expected Transmission Counts), residual energy, and hop count, the optimal paths are chosen with the help of TOPSISs for efficient transmissions. The actual packets are sent over the preferred path. Next, the cloud-like false hotspot is formed to include counterfeit packets into the WSN to confuse the intruder and yield an elaborate privacy location. Counterfeit packets are included along the delivery path of the actual data packet to extend the time needed for tracing the traffic flow. The experiments reveal that the proposed system yields improved performance when matched with the earlier system in terms of overall energy dissipation, node utilization ratio, transmission delay, security, and network lifetimes.

Keywords

Cloud Center, Mobile Sink, Adaptive Adjustment Factor, Fake Hotspot and Technique for Order Preference by Similarity to Ideal Solution.
User
Notifications
Font Size

  • Khalaf, O. I., & Sabbar, B. M. (2019). An overview on wireless sensor networks and finding optimal location of nodes. Periodicals of Engineering and Natural Sciences (PEN), 7(3), pp.1096-1101.
  • El Alami, H., & Najid, A. (2019). ECH: An enhanced clustering hierarchy approach to maximize lifetime of wireless sensor networks. IEEE Access, 7, pp.107142-107153.
  • Numan, M., Subhan, F., Khan, W. Z., Hakak, S., Haider, S., Reddy, G. T., & Alazab, M. (2020). A systematic review on clone node detection in static wireless sensor networks. IEEE Access, 8, pp.65450-65461.
  • Mostafaei, H. (2018). Energy-efficient algorithm for reliable routing of wireless sensor networks. IEEE Transactions on Industrial Electronics, 66(7), pp.5567-5575.
  • Sangaiah, A. K., Sadeghilalimi, M., Hosseinabadi, A. A. R., & Zhang, W. (2019). Energy consumption in point-coverage wireless sensor networks via bat algorithm. IEEE Access, 7, pp.180258-180269.
  • Sajwan, M., Gosain, D., & Sharma, A. K. (2018). Hybrid energy-efficient multi-path routing for wireless sensor networks. Computers & Electrical Engineering, 67, pp.96-113.
  • Shokair, M., & Saad, W. (2017). Balanced and energy-efficient multi-hop techniques for routing in wireless sensor networks. IET Networks, 7(1), pp.33-43.
  • Mutalemwa, L. C., & Shin, S. (2019). Achieving source location privacy protection in monitoring wireless sensor networks through proxy node routing. Sensors, 19(5), 1037.
  • Wang, Y., Liu, L., & Gao, W. (2019). An efficient source location privacy protection algorithm based on circular trap for wireless sensor networks. Symmetry, 11(5), 632.
  • Ouyang, Y.; Le, Z.; Chen, G.; James, F.; Fillia, M. Entrapping Adversaries for Source Protection in Sensor Networks. In Proceedings of the International Symposium on World of Wireless, Mobile and Multimedia Networks, Washington, DC, USA, 26–29 June 2006; pp. 23–34
  • Ozturk, C.; Zhang, Y.; Trappe, W.; Ott, M. Source-Location Privacy for Networks of Energy-Constrained Sensors. In Proceedings of the Second IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems, Vienna, Austria, 12 May 2004; pp. 68–72
  • Ma, W.; Song, L. Source location privacy preservation routing protocol based on multi-path. Comput. Eng. Appl. 2018, 54, pp.81–85. (In Chinese).
  • Cerpa, A.; Estrin, D. ASCENT: Adaptive Self-Configuring Sensor Networks Topologies. IEEE Trans. Mob. Comput. 2004, 3, pp.272– 285.
  • Yao, L., Kang, L., Deng, F., Deng, J., & Wu, G. (2015). Protecting source–location privacy based on multirings in wireless sensor networks. Concurrency and Computation: Practice and Experience, 27(15),pp. 3863-3876.
  • Han, G., Miao, X., Wang, H., Guizani, M., & Zhang, W. (2019). CPSLP: A cloud-based scheme for protecting source location privacy in wireless sensor networks using multi-sinks. IEEE Transactions on Vehicular Technology, 68(3), pp.2739-2750.
  • Mutalemwa, L. C and Shin, S. (2018). Strategic location-based random routing for source location privacy in wireless sensor networks. Sensors, 18(7), 2291.
  • Ricardo A. L. Rabelo, Jose V. V. Sobral, Harilton S. Araujo, Rodrigo A. R. S. Baluz, and Raimir Holanda Filho, “An Approach Based on Fuzzy Inference System and Ant Colony Optimization for Improving the Performance of Routing Protocols in Wireless Sensor Networks,” IEEE Congress on Evolutionary Computation, pp 3244-3245, 2013
  • Naghibi, M., & Barati, H. (2020). EGRPM: Energy efficient geographic routing protocol based on mobile sink in wireless sensor networks. Sustainable Computing: Informatics and Systems, 25, 100377.
  • Fu, X., & He, X. (2020). Energy-balanced data collection with path-constrained mobile sink in wireless sensor networks. AEU-International Journal of Electronics and Communications, 127, 153504.
  • Cheng, H., Tao, L., & Zhang, X. (2019). A Fast and Efficient Broadcast Protocol With a Mobile Sink Node in Asynchronous Wireless Sensor Networks. IEEE Access, 7, 92813-92824.
  • Ye, G., Zhang, B., & Chai, S. (2014, December). Energy balanced virtual force-based approach for mobile WSNs. In 2014 Seventh International Symposium on Computational Intelligence and Design (Vol. 1, pp. 496-500). IEEE.
  • Al-Tabbakh, S. M., & Shaaban, E. (2017, September). Energy aware autonomous deployment for mobile wireless sensor networks: Cellular automata approach. In International Conference on Applied Physics, System Science and Computers (pp. 87-99). Springer, Cham.

Abstract Views: 349

PDF Views: 1




  • Efficient and Reliable Routing With Cloud Based Source-Location Privacy Protection in Wireless Sensor Networks

Abstract Views: 349  |  PDF Views: 1

Authors

R. Nagarajan
Department of Computer Science, Sri Ramakrishna College of Arts and Science, Coimbatore, Tamil Nadu, India
G. Maria Priscilla
Department of Computer Science, Sri Ramakrishna College of Arts and Science, Coimbatore, Tamil Nadu, India

Abstract


WSNs (Wireless Sensor Networks) have recently gained popularity. WSNs are typically deployed in insecure, unstructured areas where their source location reveals critical information about targets. Sensor deployment in WSNs has been seen in a variety of applications that oversee events and send information to base stations. Optimal route selection and source location privacy are critical issues in WSNs. If an intruder determines the source node by studying traffic mode, an attack could be conducted on a target with ease. Previous methods were based on MSROs (Mobile Sink-based Route Optimizations) and Cloud-Based WSN Protection Schemes. This research work chooses the optimum multi-sink node based on the BFAs (Bacteria Foraging Algorithms). But, it does not yield optimal paths to balance the PDRs (Packet Delivery Ratios) and energy dissipation. To seek a solution to this issue, this study proposes ERR-CSLPPs (Efficient and Reliable Routing with Cloud-based Source-Location Privacy Protections) using AAFBOA (Adaptive Adjustment Factor based Butterfly Optimization Algorithm), allowing the approach to choose the mobile sink node. Depending on the ETCs (Expected Transmission Counts), residual energy, and hop count, the optimal paths are chosen with the help of TOPSISs for efficient transmissions. The actual packets are sent over the preferred path. Next, the cloud-like false hotspot is formed to include counterfeit packets into the WSN to confuse the intruder and yield an elaborate privacy location. Counterfeit packets are included along the delivery path of the actual data packet to extend the time needed for tracing the traffic flow. The experiments reveal that the proposed system yields improved performance when matched with the earlier system in terms of overall energy dissipation, node utilization ratio, transmission delay, security, and network lifetimes.

Keywords


Cloud Center, Mobile Sink, Adaptive Adjustment Factor, Fake Hotspot and Technique for Order Preference by Similarity to Ideal Solution.

References





DOI: https://doi.org/10.22247/ijcna%2F2021%2F210722