International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

International Journal of Computer Networks and Applications (IJCNA)

International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

Hybrid Optimization Enabled Routing Protocol for Enhancing Source Location Privacy in Wireless Sensor Networks

Author NameAuthor Details

Chinnu Mary George, Gayathri K M, Reeja S R

Chinnu Mary George[1]

Gayathri K M[2]

Reeja S R[3]

[1]Department of Computer Science and Engineering, Dayananda Sagar University, Bangalore, India

[2]Department of Electronics and Communication Engineering, Dayananda Sagar University, Bangalore, India

[3]School of Computing Sciences and Engineering, VIT-AP University, Andhra Pradesh, India

Abstract

Wireless sensor networks (WSN) are utilized in various application domains concerning monitoring and smart application, in which highly sensitive information in healthcare and military applications is also employed using the WSN. The openness and unattended nature of the WSN make security as a challenging task. The information eavesdropping is employed by the network intruder from the source node; hence the location of the source node needs to be protected for the acquisition of information security. Thus, this research introduces a privacy preservation of the source location method using the hybrid optimization based secure routing. For this, Shuffled Shepherd-Coot (SS-Coot) optimization is proposed by hybridizing the foraging behavior of the Coot, a water bird, with the shepherd's behavior in herding the animal community. The incorporation of the herding behavior of the shepherd with Coot's foraging behavior helps to enhance the diversification phase to obtain the best solution by avoiding premature convergence. In the proposed source location privacy preservation, the network boundary radiuses are obtained optimally using the SS-Coot algorithm during the network initialization. Then, the routing through the various boundaries of the network with multi-hop helps to protect the location of the source by confusing the intruder's backtrace process. The analysis is performed based on Packet Delivery Ratio (PDR), throughput, energy consumption, and delivery latency and obtained the values of 1.02867, 1.02909, 0.30171, and 0.00165, respectively.

Index Terms

Source Location

Privacy

Shuffled Shepherd Optimization Method

Wireless Sensor Network

Coot Optimization

Reference

  1. 1.
    Elshrkawey, M., Elsherif, S.M. and Wahed, M.E., "An enhancement approach for reducing the energy consumption in wireless sensor networks", Journal of King Saud University-Computer and Information Sciences, vol.30, no.2, pp.259-267, 2018.
  2. 2.
    Babu, M.V., Alzubi, J.A., Sekaran, R., Patan, R., Ramachandran, M. and Gupta, D., "An improved IDAF-FIT clustering based ASLPP-RR routing with secure data aggregation in wireless sensor network", Mobile Networks and Applications, vol.26, no.3, pp.1059-1067, 2021.
  3. 3.
    Liu, X. and Wu, J., "A method for energy balance and data transmission optimal routing in wireless sensor networks", Sensors, vol.19, no.13, pp.3017, 2019.
  4. 4.
    Fu, X., Yang, Y. and Postolache, O., "Sustainable multipath routing protocol for multi-sink wireless sensor networks in harsh environments", IEEE Transactions on Sustainable Computing, vol.6, no.1, pp.168-181, 2020.
  5. 5.
    Wang, F., Liu, W., Wang, T., Zhao, M., Xie, M., Song, H., Li, X. and Liu, A., "To reduce delay, energy consumption and collision through optimization duty-cycle and size of forwarding node set in WSNs", IEEE Access, vol.7, pp.55983-56015, 2019.
  6. 6.
    Mutalemwa, L.C. and Shin, S., "Novel Approaches to Realize the Reliability of Location Privacy Protocols in Monitoring Wireless Networks", IEEE Access, vol.9, pp.104820-104836, 2021.
  7. 7.
    Arivarasi, A. and Ramesh, P., "An improved source location privacy protection using adaptive trust sector-based authentication with honey encryption algorithm in WSN", Journal of Ambient Intelligence and Humanized Computing, pp.1-13, 2021.
  8. 8.
    Chen, Y., Sun, J., Yang, Y., Li, T., Niu, X. and Zhou, H., "PSSPR: a source location privacy protection scheme based on sector phantom routing in WSNs", International Journal of Intelligent Systems, vol.37, no.2, pp.1204-1221, 2022.
  9. 9.
    Naghibi, M. and Barati, H., "EGRPM: Energy efficient geographic routing protocol based on mobile sink in wireless sensor networks", Sustainable Computing: Informatics and Systems, vol.25, pp.100377, 2020
  10. 10.
    Manjunath, DR and Kumar, A., "Source Location Privacy for Geographical Routing in Wireless Sensor Networks: SLPGR", International Journal of Computer Networks and Applications, vol.8, no.4, pp.422-434, 2021.
  11. 11.
    Tan, W., Xu, K. and Wang, D., "An anti-tracking source-location privacy protection protocol in WSNs based on path extension", IEEE internet of things journal, vol.1, no.5, pp.461-471, 2014.
  12. 12.
    Jiang, J., Han, G., Wang, H. and Guizani, M., "A survey on location privacy protection in wireless sensor networks", Journal of Network and Computer Applications, vol.125, pp.93-114, 2019.
  13. 13.
    Long, J., Dong, M., Ota, K. and Liu, A., "Achieving source location privacy and network lifetime maximization through tree-based diversionary routing in wireless sensor networks", IEEE Access, vol.2, pp.633-651, 2014.
  14. 14.
    Kamarei, M., Patooghy, A., Alsharif, A. and Hakami, V., "SiMple: A unified single and multi-path routing algorithm for wireless sensor networks with source location privacy", IEEE Access, vol.8, pp.33818-33829, 2020.
  15. 15.
    Xiong, Z., Wang, H., Zhang, L., Fan, T. and Shen, J., "A ring-based routing scheme for distributed energy resources management in iiot", IEEE Access, vol.8, pp.167490-167503, 2020.
  16. 16.
    Gu, C., Bradbury, M. and Jhumka, A., "Phantom walkabouts: A customisable source location privacy aware routing protocol for wireless sensor networks", Concurrency and Computation: Practice and Experience, vol.31, no.20, pp.e5304, 2019.
  17. 17.
    Chakraborty, S., Goyal, N.K., Mahapatra, S. and Soh, S., "Minimal path-based reliability model for wireless sensor networks with multistate nodes", IEEE Transactions on Reliability, vol.69, no.1, pp.382-400, 2019.
  18. 18.
    Shukla, A., Singh, D., Sajwan, M., Kumar, M., Kumari, D., Kumar, A. and Panthi, M., "SLP-RRFPR: a source location privacy protection scheme based on random ring and limited hop fake packet routing for wireless sensor networks", Multimedia Tools and Applications, pp.1-41, 2022.
  19. 19.
    Mutalemwa, L.C. and Shin, S., "Secure routing protocols for source node privacy protection in multi-hop communication wireless networks", Energies, vol.13, no.2, pp.292, 2020.
  20. 20.
    Naruei, I. and Keynia, F., "A new optimization method based on COOT bird natural life model", Expert Systems with Applications, vol.183, pp.115352, 2021.
  21. 21.
    Kaveh, A. and Zaerreza, A. (2020), "Shuffled shepherd optimization method: a new Meta-heuristic algorithm", Engineering Computations, Vol. 37 No. 7, pp. 2357-2389.
  22. 22.
    Mutalemwa, L.C. and Shin, S., "Strategic location-based random routing for source location privacy in wireless sensor networks", Sensors, vol.18, no.7, pp.2291, 2018.
  23. 23.
    Kamat, P., Zhang, Y., Trappe, W. and Ozturk, C., "Enhancing source-location privacy in sensor network routing", In 25th IEEE international conference on distributed computing systems (ICDCS'05), pp. 599-608, June 2005.
  24. 24.
    Zhang, J., Tang, J. and Wang, F., "Cooperative relay selection for load balancing with mobility in hierarchical WSNs: A multi-armed bandit approach", IEEE Access, vol.8, pp.18110-18122, 2020.
SCOPUS
SCImago Journal & Country Rank