SlideShare a Scribd company logo
1 of 4
International Journal of Computational Engineering Research||Vol, 03||Issue, 5||
www.ijceronline.com ||May ||2013|| Page 10
Evaluating the Privacy Measure of the Source Location Privacy
Scheme in a Wireless Sensor Network
Aparna Gurjar1
, Prof. A R Bhagat Patil2
Dept. of Computer Technology, Yeshwantrao Chavan College of Engineering, Nagpur,
Maharashtra, India
I. INTRODUCTION
The privacy threats of wireless sensor networks (WSN) can be classified into two broad categories:
Content privacy and context privacy. Source location privacy comes under the purview of contextual privacy, in
which the context information, like the location of the source node, its identity; or temporal information like the
time and duration of transmission, is kept hidden from unintended users. Content privacy generally relies on
data encryption for providing data security in WSN. This approach of encryption can become counter-
productive because cryptographic algorithms are computationally intensive and can deplete the scarce energy
resources of the WSN. This paper designs a source location privacy scheme which does not require encryption
and uses the concepts of anonymization of node identities along with random routing of source messages in
order to enable privacy. The model of the SLP scheme is first developed and then analyzed using information
theoretic approach of entropy and probability. Simulation is performed to test the process of cluster formation,
anonymization of node identities and random routing, and obtain relevant observations to evaluate the privacy
measure index of the SLP scheme.
The section wise organization of the rest of the paper is as follows. Section 2 discusses the various
context oriented privacy protection techniques. Section 3 describes the model and analyzes the proposed SLP
scheme. Section 4 presents the experimental observations achieved through simulation. Section 5 concludes the
paper.
II. CONTEXTUAL PRIVACY TECHNIQUES
From the study of related works in privacy protection techniques it is clear that context privacy
protection can be implemented in variety of ways. In [1] Celal Ozturk et discuss the strategy of baseline
flooding for implementing source location privacy. In this technique every new message is transmitted only
once by each node that receives it; and every node broadcasts the message to its neighbours provided it is
receiving the message for the first time. But this process consumes energy and it is also possible to backtrack to
the source node. They also describe the technique of fake message flooding where fake messages are fed into
the actual message traffic so that the source of the message remains unknown. In [2] Guillermo Suarez-Tangil
et al. conclude that fake messaging gives excellent source location privacy, but it becomes difficult to efficiently
create fake sources and define the optimal message generation rate for the fake sources. In [3] Hillol Kargupta
et al. focus on the data perturbation approach to mask the data. In [4] Xiaoxin Wu uses an approach of
ABSTRACT:
Implementing Source Location Privacy Makes It Possible To Hide The Location
Information Of The Transmitting Node. Classified As A Contextual Privacy Protection
Technique, The Source Location Privacy Is An Essential Feature Of Those Real Life Sensor
Networks Which Have Been Deployed For Monitoring Events Happening At Particular
Locations. This Paper Designs A Source Location Privacy Scheme Using Cluster Based
Anonymization And Random Routing. The Privacy Measure Index Is Then Evaluated In
Order To Estimate The Overall Privacy Achieved By The SLP Scheme. The Effect Of The
Privacy Scheme On End To End Message Delay Is Observed, For Estimating The Network
Performance Degradation And Establishing The Efficacy Of The SLP Scheme.
KEYWORDS: Anonymization, Message Delay, Privacy Measure, Routing, Source Location
Privacy
Evaluating The Privacy Measure Of The Source…
www.ijceronline.com ||May ||2013|| Page 11
pseudonym, where instead of the real identity of a node, a false identity is used. The author uses positions of
destinations as pseudonyms to be used in place of actual node identities. . In [5] Jing Deng et.al show that the
nodes near the base station handle more number of packets than those situated away from the base station and
hence can be identified as important nodes by an adversary. This helps him to move closer to the base station.
Various methods are described viz. “Multi-parent routing scheme”, “random walk” and “fractal propagation”
which randomize the packet routes, prevent traffic analysis attack and also prevent the adversary from locating
the base station or the source node.
III. THE SOURCE LOCATION PRIVACY SCHEME
The proposed SLP scheme is designed for the sensor network which is similar to the generic sensor-
network application, called the “Panda-Hunter Game” in [1]. Here the sensor nodes continuously monitor the
area of interest and report the presence of specific entities within its sensing range. There is an adversary trying
to get the location information of those entities. The sensor nodes remain static after their random deployment.
The sensing capabilities of the adversary are similar to that of the WSN nodes.
3.1. The model of the SLP scheme
The privacy scheme is implemented in two phases: The cluster based anonymization phase and the
random routing phase. In the first phase the nodes are randomly deployed initially. The area to be sensed is
divided into equal partitions with the number of partitions being fixed at five. Each partition represents a cluster.
The process of clustering uses distance as a clustering criterion. All nodes lying within the boundary of a
particular partition form a cluster and choose their cluster head (CH) randomly. The CH implements the
anonymization mechanism by assigning random number to a node which needs to transmit event related
information. The node then replaces its real identity with this number and then transmits its message. The
mapping of, which node has been assigned which random number as the node identity is available with the
cluster head. In case an adversary is able to read the message header he only gets to know the fake Identity
number and not the real one. Thus this scheme prevents the Correlation-based source node identification attacks
described in [6].
The primary aim of the second phase i.e. random routing is to hide the source location of the
transmitting node so that the adversary is not able to detect which node started the transmission after generation
of the desired event. Therefore the cluster heads after receiving the data from their respective source nodes
forward the data to a randomly chosen node. Based on a random number of hops, each node forwards the data to
another random node, thus forming a logical link across the network. Then finally one of the link nodes
transmits it to the base station. The blending of source location information of the transmitting node with the
network traffic is thus achieved and the location of the transmitting node gets diffused.
3.2. The analysis of the SLP scheme
In this section we introduce and define the various parameters associated with the SLP Scheme.
The degree of privacy: The degree of privacy (DoP)A contributed by the anonymization phase is defined as a
percentage of the maximum Privacy.
The maximum privacy occurs when the adversary is not able to pin point the location of the source node and
any one of the total nodes present in the WSN can be the probable source nodes. It is measured by using entropy
based method described in [7], [8].
The (DoP)A is calculated as follows:
(DoP)A = ES / EMAX
(1)
Where,
N= Total no. of sensor nodes in WSN
NS = No. of nodes in the sensed area
Degree of Disclosure: Degree of Disclosure is defined as the amount of location information that one message is
able to disclose to the adversary.
If the routing path is fixed then it is possible for an adversary to backtrack to the source node as the location
information of each node on the routing path becomes known to the adversary due to fixed correlation between
Evaluating The Privacy Measure Of The Source…
www.ijceronline.com ||May ||2013|| Page 12
node location and its identity. For a fixed path of length L hops, the Degree of Disclosure (DoD) will be given
by (2)
DoD = (1/L)
(2)
If there is n number of fixed paths each having length L1, L2, L3.....Ln then DoD will be computed as in [8] and
given by (3)
DoD = (1/{ L1 + L2 + L3 +.....Ln })
(3)
The degree of privacy due to routing, (DoP)R is given by (4)
(DoP)R = 1-DoD
(4)
Here 1 is taken as the value for maximum privacy when no message leaks any kind of location information to
the adversary.
The Privacy Measure Index (PMI) describes the overall privacy achieved by the SLP scheme and is defined as
the average privacy achieved as a result of anonymization and random routing. Thus PMI is given by (5).
PMI = [(DoP)A + (DoP)R] / 2
(5)
IV. SIMULATION RESULTS
Figure1. Average end to end message delay
TABLE1. Calculating privacy measure index (PMI)
Evaluating The Privacy Measure Of The Source…
www.ijceronline.com ||May ||2013|| Page 13
The following analysis can be done from values of TABLE 1
 The simulation was done for 4 random node configurations of 50,100, 200 and 400 nodes
 The value of maximum entropy EMAX increased from 5.644 to 8.644
 The % average degree of privacy due to anonymization (DoP)A increased from 18.5% to 44.3%
o This happens because the anonymity set for the adversary increases with increase in node density. Due to
anonymization the real ID of the node is replaced by a randomly generated pseudo-identity. So, even if the
adversary finds out the source ID by reading the header information of the nodes in his sensing area, he
cannot find source correctly because he gets to know only the pseudo-identity number which is not linked
with source location.
 Four random paths were considered for message transmission from source to sink for each configuration
 The degree of disclosure in case of fixed path routing was more than values obtained for 4 disjoint fixed
paths
o The value of (DoP) routing increases due to the increase in number of routing paths (fixed at four, in this
case) and their path lengths.
o For random routing, as the number of possible independent disjoint paths increases infinitely the (DoP)
routing can effectively be considered as 1(In this case the messages leak negligible source location
information )
 The degree of privacy due to routing (DoP)R remained more or less constant at a high value of around 96%
 The Privacy Measure Index increased from 57.4% to 70.15%
Fig 1 shows the plot of average end to end delay in seconds for all received messages on the Y-axis along with
the event time stamp on the X-axis. Initially the delay is less, after that it increases within a short period of time
and finally stabilizes to almost constant value for the rest of the transmission period. The average message delay
was measured as 0.5 msec. There is an increase in average end to end message delay by a factor of 10,
compared to a scheme which does not implement SLP. This is expected as the concept of shortest path, which is
implemented in most routing algorithms, is not adhered to in this scheme, in order to diffuse the source location
information.
V. CONCLUSION
This SLP scheme is effectively able to maintain the location privacy of the transmitting nodes using
anonymization and routing technique and gives high degree of privacy values as seen by the simulation results.
There is degradation in network performance in terms of end to end message delay, which is acceptable if the
requirement of privacy protection is of paramount importance for the sensor network application. This scheme
also prolongs network life time as it does not use the computationally intensive process of encryption.
REFERENCES
[1] Source-Location Privacy in Energy-Constrained Sensor Network Routing Celal Ozturk, Yanyong Zhang, Wade Trappe SASN’04,
October 25, 2004, Washington, DC, USA. Copyright 2004 ACM 1-58113-972-1/04/0010
[2] An Experimental Comparison of Source Location Privacy Methods for Power Optimization in WSNs Guillermo Suarez-Tangil,
Esther Palomar, Benjamin Ramos, Arturo Ribagorda in Advances in sensors, signals and materials, ISSN: 1792-6211 / ISSN:
1792-6238, ISBN: 978-960-474-248-6
[3] Random data Perturbation Techniques and Privacy Preserving Data Mining Hillol Kargupta, Souptik Datta Extended version of
paper presented in 2003 IEEE International Conference on Data Mining
[4] Xiaoxin Wu,“Applying Pseudonimity for Anonymous Data Delivery in Location-Aware Mobile Ad Hoc Networks” IEEE
Transactions on Vehicular Technology, Vol. 55 NO. 3, May 2006
[5] DecorrelatingWireless Sensor Network Traffic To Inhibit Traffic Analysis Attacks Jing Deng Richard Han Shivakant Mishra
Elsevier Pervasive and Mobile Computing Journal, Special Issue on Security in Wireless Mobile Computing Systems, vol 2, issue
2, April 2006, pp. 159-186
[6] Yun Li, Jian Ren, and Jie Wu, “Quantitative Measurement and Design of Source-Location Privacy Schemes for Wireless Sensor
Networks” IEEE Transactions on Parallel and Distributed Systems, Vol. 23, No. 7, July 2012
[7] Towards an information theoretic metric for anonymity Andrei Serjantov, George Danezis
[8] Source-Location Privacy in Wireless Sensor Networks Song-Woo Lee, Young-Hun Park, Ju-Hyung Son, Seung-Woo Seo, U
Kang, Ho-Kun Moon, and Myoung-Soo Lee Korea Institute of Information Security and Cryptology Journal 2007
[9] Wireless Sensor Network Security: A Survey John Paul Walters, Zhengqiang Liang, Weisong Shi, and Vipin Chaudhary in
Security in Distributed, Grid, and Pervasive Computing Yang Xiao,(Eds.) pp. 2006 Auerbach Publications, CRC Press
[10] Protecting Location Privacy in Large-Scale Wireless Sensor Networks Lei Kang ICC 2009 proceedings

More Related Content

What's hot

Securing Data Communication for Node Anonymization Using Location Information
Securing Data Communication for Node Anonymization Using  Location InformationSecuring Data Communication for Node Anonymization Using  Location Information
Securing Data Communication for Node Anonymization Using Location InformationIJMER
 
A precise termination condition of the probabilistic packet marking algorithm...
A precise termination condition of the probabilistic packet marking algorithm...A precise termination condition of the probabilistic packet marking algorithm...
A precise termination condition of the probabilistic packet marking algorithm...Mumbai Academisc
 
Selective jamming attack prevention based on packet hiding methods and wormholes
Selective jamming attack prevention based on packet hiding methods and wormholesSelective jamming attack prevention based on packet hiding methods and wormholes
Selective jamming attack prevention based on packet hiding methods and wormholesIJNSA Journal
 
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...IJTET Journal
 
Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksJPINFOTECH JAYAPRAKASH
 
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and ClusteringModified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and Clusteringidescitation
 
A Secure Chaotic Communication System
A Secure Chaotic Communication SystemA Secure Chaotic Communication System
A Secure Chaotic Communication Systemijsrd.com
 
An Analytical Approach To Analyze The Impact Of Gray Hole Attacks In Manet
An Analytical Approach To Analyze The Impact Of Gray Hole Attacks In ManetAn Analytical Approach To Analyze The Impact Of Gray Hole Attacks In Manet
An Analytical Approach To Analyze The Impact Of Gray Hole Attacks In Manetidescitation
 
Design of Transport Layer Based Hybrid Covert Channel Detection Engine
Design of Transport Layer Based Hybrid Covert Channel Detection EngineDesign of Transport Layer Based Hybrid Covert Channel Detection Engine
Design of Transport Layer Based Hybrid Covert Channel Detection Engineijasuc
 
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 Implementation on Data Security Approach in Dynamic Multi Hop Communication Implementation on Data Security Approach in Dynamic Multi Hop Communication
Implementation on Data Security Approach in Dynamic Multi Hop CommunicationIJCSIS Research Publications
 
Multicasting in Delay Tolerant Networks: Implementation and Performance Analysis
Multicasting in Delay Tolerant Networks: Implementation and Performance AnalysisMulticasting in Delay Tolerant Networks: Implementation and Performance Analysis
Multicasting in Delay Tolerant Networks: Implementation and Performance AnalysisNagendra Posani
 
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...ijp2p
 

What's hot (17)

Securing Data Communication for Node Anonymization Using Location Information
Securing Data Communication for Node Anonymization Using  Location InformationSecuring Data Communication for Node Anonymization Using  Location Information
Securing Data Communication for Node Anonymization Using Location Information
 
Ijnsa050211
Ijnsa050211Ijnsa050211
Ijnsa050211
 
A precise termination condition of the probabilistic packet marking algorithm...
A precise termination condition of the probabilistic packet marking algorithm...A precise termination condition of the probabilistic packet marking algorithm...
A precise termination condition of the probabilistic packet marking algorithm...
 
Selective jamming attack prevention based on packet hiding methods and wormholes
Selective jamming attack prevention based on packet hiding methods and wormholesSelective jamming attack prevention based on packet hiding methods and wormholes
Selective jamming attack prevention based on packet hiding methods and wormholes
 
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networks
 
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and ClusteringModified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
 
A Secure Chaotic Communication System
A Secure Chaotic Communication SystemA Secure Chaotic Communication System
A Secure Chaotic Communication System
 
Ijcatr04051009
Ijcatr04051009Ijcatr04051009
Ijcatr04051009
 
An Analytical Approach To Analyze The Impact Of Gray Hole Attacks In Manet
An Analytical Approach To Analyze The Impact Of Gray Hole Attacks In ManetAn Analytical Approach To Analyze The Impact Of Gray Hole Attacks In Manet
An Analytical Approach To Analyze The Impact Of Gray Hole Attacks In Manet
 
Design of Transport Layer Based Hybrid Covert Channel Detection Engine
Design of Transport Layer Based Hybrid Covert Channel Detection EngineDesign of Transport Layer Based Hybrid Covert Channel Detection Engine
Design of Transport Layer Based Hybrid Covert Channel Detection Engine
 
B43040610
B43040610B43040610
B43040610
 
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 Implementation on Data Security Approach in Dynamic Multi Hop Communication Implementation on Data Security Approach in Dynamic Multi Hop Communication
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 
Multicasting in Delay Tolerant Networks: Implementation and Performance Analysis
Multicasting in Delay Tolerant Networks: Implementation and Performance AnalysisMulticasting in Delay Tolerant Networks: Implementation and Performance Analysis
Multicasting in Delay Tolerant Networks: Implementation and Performance Analysis
 
I1086066
I1086066I1086066
I1086066
 
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
 

Viewers also liked

Viewers also liked (20)

Customer perceptions toward the brand equity of local coffee bars
Customer perceptions toward the brand equity of local coffee barsCustomer perceptions toward the brand equity of local coffee bars
Customer perceptions toward the brand equity of local coffee bars
 
N035489094
N035489094N035489094
N035489094
 
E035425030
E035425030E035425030
E035425030
 
F035431037
F035431037F035431037
F035431037
 
C035414017
C035414017C035414017
C035414017
 
Sergey Boytsov, State Scientific Research Institute of Organization and Infor...
Sergey Boytsov, State Scientific Research Institute of Organization and Infor...Sergey Boytsov, State Scientific Research Institute of Organization and Infor...
Sergey Boytsov, State Scientific Research Institute of Organization and Infor...
 
D035418024
D035418024D035418024
D035418024
 
A03540109
A03540109A03540109
A03540109
 
Cerfs et-biches-ette
Cerfs et-biches-etteCerfs et-biches-ette
Cerfs et-biches-ette
 
G035438049
G035438049G035438049
G035438049
 
J035463070
J035463070J035463070
J035463070
 
I035456062
I035456062I035456062
I035456062
 
K0354071077
K0354071077K0354071077
K0354071077
 
H035450055
H035450055H035450055
H035450055
 
Private Buyer Brochure
Private Buyer BrochurePrivate Buyer Brochure
Private Buyer Brochure
 
9783642234118 c1
9783642234118 c19783642234118 c1
9783642234118 c1
 
Software Libre y su potencial para el Cauca
Software Libre y su potencial para el CaucaSoftware Libre y su potencial para el Cauca
Software Libre y su potencial para el Cauca
 
Geraaaaa3
Geraaaaa3Geraaaaa3
Geraaaaa3
 
Team 3
Team 3Team 3
Team 3
 
Pruebas de funcionamiento paratiroideo
Pruebas de funcionamiento paratiroideo Pruebas de funcionamiento paratiroideo
Pruebas de funcionamiento paratiroideo
 

Similar to Evaluating the Source Location Privacy Scheme in Wireless Sensor Networks

Robust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networksRobust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networksijdpsjournal
 
Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.Rahul Kumar
 
Performance Analysis of Transport Layer Basedhybrid Covert Channel Detection ...
Performance Analysis of Transport Layer Basedhybrid Covert Channel Detection ...Performance Analysis of Transport Layer Basedhybrid Covert Channel Detection ...
Performance Analysis of Transport Layer Basedhybrid Covert Channel Detection ...IJNSA Journal
 
ENERGY CONSUMPTION AND LOCALITY OF SENSOR NETWORKS
ENERGY CONSUMPTION AND LOCALITY OF SENSOR NETWORKSENERGY CONSUMPTION AND LOCALITY OF SENSOR NETWORKS
ENERGY CONSUMPTION AND LOCALITY OF SENSOR NETWORKSpharmaindexing
 
An Unobservable Secure On-Demand Routing With D-Worm Detection In MANET
An Unobservable Secure On-Demand Routing With D-Worm Detection In MANETAn Unobservable Secure On-Demand Routing With D-Worm Detection In MANET
An Unobservable Secure On-Demand Routing With D-Worm Detection In MANETIJRES Journal
 
SELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLES
SELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLESSELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLES
SELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLESIJNSA Journal
 
Securing the Data Communication between the Neighboring Sensor Nodes using Bi...
Securing the Data Communication between the Neighboring Sensor Nodes using Bi...Securing the Data Communication between the Neighboring Sensor Nodes using Bi...
Securing the Data Communication between the Neighboring Sensor Nodes using Bi...IJMTST Journal
 
Survey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in ManetsSurvey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in ManetsEditor IJCATR
 
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKCODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKIJNSA Journal
 
Detection of Replica Nodes in Wireless Sensor Network: A Survey
Detection of Replica Nodes in Wireless Sensor Network: A SurveyDetection of Replica Nodes in Wireless Sensor Network: A Survey
Detection of Replica Nodes in Wireless Sensor Network: A SurveyIOSR Journals
 
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWPACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWIJNSA Journal
 
Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
Detecting Misbehavior Nodes Using Secured Delay Tolerant NetworkDetecting Misbehavior Nodes Using Secured Delay Tolerant Network
Detecting Misbehavior Nodes Using Secured Delay Tolerant NetworkIRJET Journal
 
Secure multipath routing scheme using key
Secure multipath routing scheme using keySecure multipath routing scheme using key
Secure multipath routing scheme using keyijfcstjournal
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS ijasuc
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS ijasuc
 
A Secure message exchange and anti-jamming mechanism in manet
A Secure message exchange and anti-jamming mechanism in manetA Secure message exchange and anti-jamming mechanism in manet
A Secure message exchange and anti-jamming mechanism in manetIJSRD
 

Similar to Evaluating the Source Location Privacy Scheme in Wireless Sensor Networks (20)

Robust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networksRobust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networks
 
Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.
 
Performance Analysis of Transport Layer Basedhybrid Covert Channel Detection ...
Performance Analysis of Transport Layer Basedhybrid Covert Channel Detection ...Performance Analysis of Transport Layer Basedhybrid Covert Channel Detection ...
Performance Analysis of Transport Layer Basedhybrid Covert Channel Detection ...
 
ENERGY CONSUMPTION AND LOCALITY OF SENSOR NETWORKS
ENERGY CONSUMPTION AND LOCALITY OF SENSOR NETWORKSENERGY CONSUMPTION AND LOCALITY OF SENSOR NETWORKS
ENERGY CONSUMPTION AND LOCALITY OF SENSOR NETWORKS
 
An Unobservable Secure On-Demand Routing With D-Worm Detection In MANET
An Unobservable Secure On-Demand Routing With D-Worm Detection In MANETAn Unobservable Secure On-Demand Routing With D-Worm Detection In MANET
An Unobservable Secure On-Demand Routing With D-Worm Detection In MANET
 
N0704075079
N0704075079N0704075079
N0704075079
 
SELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLES
SELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLESSELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLES
SELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLES
 
Securing the Data Communication between the Neighboring Sensor Nodes using Bi...
Securing the Data Communication between the Neighboring Sensor Nodes using Bi...Securing the Data Communication between the Neighboring Sensor Nodes using Bi...
Securing the Data Communication between the Neighboring Sensor Nodes using Bi...
 
Survey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in ManetsSurvey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in Manets
 
Ijcatr04041022
Ijcatr04041022Ijcatr04041022
Ijcatr04041022
 
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKCODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
 
Detection of Replica Nodes in Wireless Sensor Network: A Survey
Detection of Replica Nodes in Wireless Sensor Network: A SurveyDetection of Replica Nodes in Wireless Sensor Network: A Survey
Detection of Replica Nodes in Wireless Sensor Network: A Survey
 
P017129296
P017129296P017129296
P017129296
 
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWPACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
 
K1803036872
K1803036872K1803036872
K1803036872
 
Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
Detecting Misbehavior Nodes Using Secured Delay Tolerant NetworkDetecting Misbehavior Nodes Using Secured Delay Tolerant Network
Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
 
Secure multipath routing scheme using key
Secure multipath routing scheme using keySecure multipath routing scheme using key
Secure multipath routing scheme using key
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
 
A Secure message exchange and anti-jamming mechanism in manet
A Secure message exchange and anti-jamming mechanism in manetA Secure message exchange and anti-jamming mechanism in manet
A Secure message exchange and anti-jamming mechanism in manet
 

Recently uploaded

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Evaluating the Source Location Privacy Scheme in Wireless Sensor Networks

  • 1. International Journal of Computational Engineering Research||Vol, 03||Issue, 5|| www.ijceronline.com ||May ||2013|| Page 10 Evaluating the Privacy Measure of the Source Location Privacy Scheme in a Wireless Sensor Network Aparna Gurjar1 , Prof. A R Bhagat Patil2 Dept. of Computer Technology, Yeshwantrao Chavan College of Engineering, Nagpur, Maharashtra, India I. INTRODUCTION The privacy threats of wireless sensor networks (WSN) can be classified into two broad categories: Content privacy and context privacy. Source location privacy comes under the purview of contextual privacy, in which the context information, like the location of the source node, its identity; or temporal information like the time and duration of transmission, is kept hidden from unintended users. Content privacy generally relies on data encryption for providing data security in WSN. This approach of encryption can become counter- productive because cryptographic algorithms are computationally intensive and can deplete the scarce energy resources of the WSN. This paper designs a source location privacy scheme which does not require encryption and uses the concepts of anonymization of node identities along with random routing of source messages in order to enable privacy. The model of the SLP scheme is first developed and then analyzed using information theoretic approach of entropy and probability. Simulation is performed to test the process of cluster formation, anonymization of node identities and random routing, and obtain relevant observations to evaluate the privacy measure index of the SLP scheme. The section wise organization of the rest of the paper is as follows. Section 2 discusses the various context oriented privacy protection techniques. Section 3 describes the model and analyzes the proposed SLP scheme. Section 4 presents the experimental observations achieved through simulation. Section 5 concludes the paper. II. CONTEXTUAL PRIVACY TECHNIQUES From the study of related works in privacy protection techniques it is clear that context privacy protection can be implemented in variety of ways. In [1] Celal Ozturk et discuss the strategy of baseline flooding for implementing source location privacy. In this technique every new message is transmitted only once by each node that receives it; and every node broadcasts the message to its neighbours provided it is receiving the message for the first time. But this process consumes energy and it is also possible to backtrack to the source node. They also describe the technique of fake message flooding where fake messages are fed into the actual message traffic so that the source of the message remains unknown. In [2] Guillermo Suarez-Tangil et al. conclude that fake messaging gives excellent source location privacy, but it becomes difficult to efficiently create fake sources and define the optimal message generation rate for the fake sources. In [3] Hillol Kargupta et al. focus on the data perturbation approach to mask the data. In [4] Xiaoxin Wu uses an approach of ABSTRACT: Implementing Source Location Privacy Makes It Possible To Hide The Location Information Of The Transmitting Node. Classified As A Contextual Privacy Protection Technique, The Source Location Privacy Is An Essential Feature Of Those Real Life Sensor Networks Which Have Been Deployed For Monitoring Events Happening At Particular Locations. This Paper Designs A Source Location Privacy Scheme Using Cluster Based Anonymization And Random Routing. The Privacy Measure Index Is Then Evaluated In Order To Estimate The Overall Privacy Achieved By The SLP Scheme. The Effect Of The Privacy Scheme On End To End Message Delay Is Observed, For Estimating The Network Performance Degradation And Establishing The Efficacy Of The SLP Scheme. KEYWORDS: Anonymization, Message Delay, Privacy Measure, Routing, Source Location Privacy
  • 2. Evaluating The Privacy Measure Of The Source… www.ijceronline.com ||May ||2013|| Page 11 pseudonym, where instead of the real identity of a node, a false identity is used. The author uses positions of destinations as pseudonyms to be used in place of actual node identities. . In [5] Jing Deng et.al show that the nodes near the base station handle more number of packets than those situated away from the base station and hence can be identified as important nodes by an adversary. This helps him to move closer to the base station. Various methods are described viz. “Multi-parent routing scheme”, “random walk” and “fractal propagation” which randomize the packet routes, prevent traffic analysis attack and also prevent the adversary from locating the base station or the source node. III. THE SOURCE LOCATION PRIVACY SCHEME The proposed SLP scheme is designed for the sensor network which is similar to the generic sensor- network application, called the “Panda-Hunter Game” in [1]. Here the sensor nodes continuously monitor the area of interest and report the presence of specific entities within its sensing range. There is an adversary trying to get the location information of those entities. The sensor nodes remain static after their random deployment. The sensing capabilities of the adversary are similar to that of the WSN nodes. 3.1. The model of the SLP scheme The privacy scheme is implemented in two phases: The cluster based anonymization phase and the random routing phase. In the first phase the nodes are randomly deployed initially. The area to be sensed is divided into equal partitions with the number of partitions being fixed at five. Each partition represents a cluster. The process of clustering uses distance as a clustering criterion. All nodes lying within the boundary of a particular partition form a cluster and choose their cluster head (CH) randomly. The CH implements the anonymization mechanism by assigning random number to a node which needs to transmit event related information. The node then replaces its real identity with this number and then transmits its message. The mapping of, which node has been assigned which random number as the node identity is available with the cluster head. In case an adversary is able to read the message header he only gets to know the fake Identity number and not the real one. Thus this scheme prevents the Correlation-based source node identification attacks described in [6]. The primary aim of the second phase i.e. random routing is to hide the source location of the transmitting node so that the adversary is not able to detect which node started the transmission after generation of the desired event. Therefore the cluster heads after receiving the data from their respective source nodes forward the data to a randomly chosen node. Based on a random number of hops, each node forwards the data to another random node, thus forming a logical link across the network. Then finally one of the link nodes transmits it to the base station. The blending of source location information of the transmitting node with the network traffic is thus achieved and the location of the transmitting node gets diffused. 3.2. The analysis of the SLP scheme In this section we introduce and define the various parameters associated with the SLP Scheme. The degree of privacy: The degree of privacy (DoP)A contributed by the anonymization phase is defined as a percentage of the maximum Privacy. The maximum privacy occurs when the adversary is not able to pin point the location of the source node and any one of the total nodes present in the WSN can be the probable source nodes. It is measured by using entropy based method described in [7], [8]. The (DoP)A is calculated as follows: (DoP)A = ES / EMAX (1) Where, N= Total no. of sensor nodes in WSN NS = No. of nodes in the sensed area Degree of Disclosure: Degree of Disclosure is defined as the amount of location information that one message is able to disclose to the adversary. If the routing path is fixed then it is possible for an adversary to backtrack to the source node as the location information of each node on the routing path becomes known to the adversary due to fixed correlation between
  • 3. Evaluating The Privacy Measure Of The Source… www.ijceronline.com ||May ||2013|| Page 12 node location and its identity. For a fixed path of length L hops, the Degree of Disclosure (DoD) will be given by (2) DoD = (1/L) (2) If there is n number of fixed paths each having length L1, L2, L3.....Ln then DoD will be computed as in [8] and given by (3) DoD = (1/{ L1 + L2 + L3 +.....Ln }) (3) The degree of privacy due to routing, (DoP)R is given by (4) (DoP)R = 1-DoD (4) Here 1 is taken as the value for maximum privacy when no message leaks any kind of location information to the adversary. The Privacy Measure Index (PMI) describes the overall privacy achieved by the SLP scheme and is defined as the average privacy achieved as a result of anonymization and random routing. Thus PMI is given by (5). PMI = [(DoP)A + (DoP)R] / 2 (5) IV. SIMULATION RESULTS Figure1. Average end to end message delay TABLE1. Calculating privacy measure index (PMI)
  • 4. Evaluating The Privacy Measure Of The Source… www.ijceronline.com ||May ||2013|| Page 13 The following analysis can be done from values of TABLE 1  The simulation was done for 4 random node configurations of 50,100, 200 and 400 nodes  The value of maximum entropy EMAX increased from 5.644 to 8.644  The % average degree of privacy due to anonymization (DoP)A increased from 18.5% to 44.3% o This happens because the anonymity set for the adversary increases with increase in node density. Due to anonymization the real ID of the node is replaced by a randomly generated pseudo-identity. So, even if the adversary finds out the source ID by reading the header information of the nodes in his sensing area, he cannot find source correctly because he gets to know only the pseudo-identity number which is not linked with source location.  Four random paths were considered for message transmission from source to sink for each configuration  The degree of disclosure in case of fixed path routing was more than values obtained for 4 disjoint fixed paths o The value of (DoP) routing increases due to the increase in number of routing paths (fixed at four, in this case) and their path lengths. o For random routing, as the number of possible independent disjoint paths increases infinitely the (DoP) routing can effectively be considered as 1(In this case the messages leak negligible source location information )  The degree of privacy due to routing (DoP)R remained more or less constant at a high value of around 96%  The Privacy Measure Index increased from 57.4% to 70.15% Fig 1 shows the plot of average end to end delay in seconds for all received messages on the Y-axis along with the event time stamp on the X-axis. Initially the delay is less, after that it increases within a short period of time and finally stabilizes to almost constant value for the rest of the transmission period. The average message delay was measured as 0.5 msec. There is an increase in average end to end message delay by a factor of 10, compared to a scheme which does not implement SLP. This is expected as the concept of shortest path, which is implemented in most routing algorithms, is not adhered to in this scheme, in order to diffuse the source location information. V. CONCLUSION This SLP scheme is effectively able to maintain the location privacy of the transmitting nodes using anonymization and routing technique and gives high degree of privacy values as seen by the simulation results. There is degradation in network performance in terms of end to end message delay, which is acceptable if the requirement of privacy protection is of paramount importance for the sensor network application. This scheme also prolongs network life time as it does not use the computationally intensive process of encryption. REFERENCES [1] Source-Location Privacy in Energy-Constrained Sensor Network Routing Celal Ozturk, Yanyong Zhang, Wade Trappe SASN’04, October 25, 2004, Washington, DC, USA. Copyright 2004 ACM 1-58113-972-1/04/0010 [2] An Experimental Comparison of Source Location Privacy Methods for Power Optimization in WSNs Guillermo Suarez-Tangil, Esther Palomar, Benjamin Ramos, Arturo Ribagorda in Advances in sensors, signals and materials, ISSN: 1792-6211 / ISSN: 1792-6238, ISBN: 978-960-474-248-6 [3] Random data Perturbation Techniques and Privacy Preserving Data Mining Hillol Kargupta, Souptik Datta Extended version of paper presented in 2003 IEEE International Conference on Data Mining [4] Xiaoxin Wu,“Applying Pseudonimity for Anonymous Data Delivery in Location-Aware Mobile Ad Hoc Networks” IEEE Transactions on Vehicular Technology, Vol. 55 NO. 3, May 2006 [5] DecorrelatingWireless Sensor Network Traffic To Inhibit Traffic Analysis Attacks Jing Deng Richard Han Shivakant Mishra Elsevier Pervasive and Mobile Computing Journal, Special Issue on Security in Wireless Mobile Computing Systems, vol 2, issue 2, April 2006, pp. 159-186 [6] Yun Li, Jian Ren, and Jie Wu, “Quantitative Measurement and Design of Source-Location Privacy Schemes for Wireless Sensor Networks” IEEE Transactions on Parallel and Distributed Systems, Vol. 23, No. 7, July 2012 [7] Towards an information theoretic metric for anonymity Andrei Serjantov, George Danezis [8] Source-Location Privacy in Wireless Sensor Networks Song-Woo Lee, Young-Hun Park, Ju-Hyung Son, Seung-Woo Seo, U Kang, Ho-Kun Moon, and Myoung-Soo Lee Korea Institute of Information Security and Cryptology Journal 2007 [9] Wireless Sensor Network Security: A Survey John Paul Walters, Zhengqiang Liang, Weisong Shi, and Vipin Chaudhary in Security in Distributed, Grid, and Pervasive Computing Yang Xiao,(Eds.) pp. 2006 Auerbach Publications, CRC Press [10] Protecting Location Privacy in Large-Scale Wireless Sensor Networks Lei Kang ICC 2009 proceedings