A routing protocol for source location privacy in wireless sensor networks with multiple sources

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In Wireless Sensor Network (WSN) applications, such as monitoring valuable assets, the locations of assets should be kept private to hide the assets from adversaries. Much of the work that solves this problem, called Source Location Privacy (SLP) problem, has focused on networks where only a single source reports to the sink at a time. Therefore, existing solutions for the SLP problem may not show the same performance in networks where multiple sources report simultaneously. In this paper, we present a routing algorithm called Red paths to solve the SLP problem for WSNs with multiple sources. We perform simulation experiments and show that Red paths offer better location privacy, with a low message overhead, not only in networks with a single source but also in networks with multiple sources.

Original languageEnglish
Title of host publicationQ2SWinet 2019 - Proceedings of the 15th ACM International Symposium on QoS and Security for Wireless and Mobile Networks
PublisherAssociation for Computing Machinery, Inc
Pages93-99
Number of pages7
ISBN (Electronic)9781450369060
DOIs
Publication statusPublished - Nov 25 2019
Event15th ACM International Symposium on QoS and Security for Wireless and Mobile Networks, Q2SWinet 2019 - Miami Beach, United States
Duration: Nov 25 2019Nov 29 2019

Publication series

NameQ2SWinet 2019 - Proceedings of the 15th ACM International Symposium on QoS and Security for Wireless and Mobile Networks

Conference

Conference15th ACM International Symposium on QoS and Security for Wireless and Mobile Networks, Q2SWinet 2019
CountryUnited States
CityMiami Beach
Period11/25/1911/29/19

Keywords

  • Multiple Sources
  • Source Location Privacy
  • Wireless Sensor Networks

ASJC Scopus subject areas

  • Electrical and Electronic Engineering
  • Software
  • Safety, Risk, Reliability and Quality
  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'A routing protocol for source location privacy in wireless sensor networks with multiple sources'. Together they form a unique fingerprint.

Cite this