Grid‐Based Source Location Privacy Protection Schemes in IoT Wireless Sensor Networks

2021 
The popularity of Wireless sensor network (WSN) has emerged in the 21st century. It is one of the emerging technologies, which comprises of a collection of sensor nodes that are linked to each other through a network. This paper digs deep into the security of location privacy. Further, it highlights how the protocols allow electronic devices to communicate with one another safely through protection of data and location. There are different types of adversaries such as undirected random paths, directed random paths and network loop methods. These adversaries can threaten the security, thus understanding them priory is essential in the development of a better protocol, as each one has its strengths and weaknesses. Three protocols are compared and analyzed: Phantom Routing, Rumor Routing and Greedy Random Walk protocol. The best features from each protocol are selected and placed in an enhanced protocol. This work leads to a proposal for an energy-aware privacy preservation protocol, named “Phantom++”.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    2
    References
    0
    Citations
    NaN
    KQI
    []