SlideShare a Scribd company logo
1
Source Location
privacy in wireless
sensor networks using
data mules
2
Chapters
1. Abstract 3
2. Introduction 4
2.1. Source-Location Privacy 5
2.2. Why Source-Location Privacy? 5
3. Related Works 7
4. Solutions for providing source location privacy 9
5. System Model 12
6. Preliminaries 12
7. Attack Model 12
7.1. α-Angle Anonymity 13
8. Mules-Saving-Source Protocol(MSS) 14
9. Direct Delivery Protocol (DD) 16
10. Proposed Model: MDD Protocol 18
10.1. Working of MDD Protocol 19
11. Experiments and Results 22
11.1. Proposed Simulation Model 23
11.2. Results 27
11.3. Average time delay of MDD Protocol 36
12. Comparison with Direct Delivery Protocol 36
12.1. Result analysis of DD and MDD Protocol 37
12.2. Advantages of MDD protocol 38
12.3. Disadvantages of MDD protocol 38
13. References 39
3
1. Abstract
Wireless sensor networks (WSNs) have many promising applications for monitoring critical
regions, such as in military surveillance and target tracking. In such applications, privacy of the
location of the source sensor is of utmost importance as its compromise may reveal the location
of the object being monitored. Traditional security mechanisms, like encryption, have proven to
be ineffective as location of the source can also be revealed by analysis of the direction of traffic
flow in the network.
In this paper, we investigate the source-location privacy issue and discuss the attack model as
semi-global eavesdrop attack model being more realistic than the local or global eavesdropping
attack model. Additionally, we adapt the conventional function of data mules to design a new
protocol for securing source location privacy called the Modified-Direct-Delivery (MDD)
protocol and analyze its capabilities, limitations and drawback against two other protocols called
the Mules-Saving-Source (MSS) protocol and Direct-Delivery (DD) protocol.
We analyze the delay incurred by using data mules in our protocol and examine the association
between privacy preservation and data delay in our protocol through simulation.
Keywords: source location privacy, data mules, wireless sensor networks, mules saving source
protocol, direct delivery protocol
4
2. Introduction
In recent years, WSNs have played an important role in a number of security applications, like
remotely monitoring objects etc. In such applications, the location of the monitored object is
tightly coupled with the sensor that detects it, called the data source. Therefore, preserving the
location of data source is important for protecting the object from being traced. Such a
preservation cannot be simply accomplished by encrypting the data packets as the location of the
data source can be disclosed by analyzing the traffic flow in WSNs.
There have been extensive techniques proposed to preserve source-location privacy against
different attack models:
Local-eavesdropping model - Local-eavesdropping assumes the attacker’s ability to monitor the
wireless communication is limited to a very small region, up to very few hops.
Global-eavesdropping model - The attacker is assumed to be capable of monitoring the traffic
over the entire network.
Both being unrealistic, because the former stringently restricts the attacker’s ability, while the
latter exaggerates it, considering resources and cost required for launching such an attack.
Semi-Global eavesdropping model - A more practical attack model, in this semi-global
eavesdropping model, the attacker is able to eavesdrop on wireless communications in a
substantial area that is much smaller than the entire monitoring network. This attack model
allows the attacker to gather substantially more information than a local eavesdropper.
Under the semi-global eavesdropping model, we explore a novel protocol for preserving source-
location privacy by using data mules. Traditionally, data mules are used in WSNs for reducing
energy consumption due to the data transmission between sensors and facilitating
communication in disconnected networks. A data mule picks up data from the data source and
then delivers them directly to the base station. We adapt the functionality of data mules so that
they not only maintain their traditional functionality, but also facilitate the preservation of the
location privacy of data sources.
5
2.1. Source-Location-Privacy
The problem of preserving source-location privacy can be explained using the “Panda Hunter
Game”, in which the sensors are deployed in the forest to monitor the movement of pandas. Each
panda is mounted with an actuator which signals to the surrounding sensors in its communication
range. When the sensor close to the panda receives the signal, it creates and sends data reports to
the base station over the wireless network. A hunter who is monitoring the wireless
communication between the sensors will be able to identify the direction of incoming traffic flow
and trace back the data transmission path to locate the data source, thus catching the panda. In
fact, any WSNs used for such monitoring applications are vulnerable to such kinds of traffic
analysis based attacks.
2.2. Why source-location-privacy?
In a wireless sensor network, location information often means the physical location of the event,
which is crucially given some applications of wireless sensor networks. So if an attacker gets
location information by analyzing a message that was captured, he will move to the location and
monitor the event. Meanwhile, the attacker will collect a lot of private information. So the
information retrieved by these networks is of vital importance and must be properly secured not
only from curious eavesdroppers but also from more skilled adversaries. Messages traversing the
network can be protected using traditional confidentiality and integrity mechanisms. But, even if
an adversary cannot obtain the information contained in the payloads, he can still retrieve other
sensitive information by observing and analyzing the communications. For example, an attacker
can obtain the information from the network and the environment being monitored by simple
observation of the network traffic. Besides, an attacker can compromise users’ location privacy
by observing the wireless signals from user devices
Although many existing privacy techniques can be employed in sensor network scenarios, they
cannot effectively preserve the sensor location in a sensor network. The reason is that the
problems are different in fact and many of the methods introduce overhead which are too
6
burdensome for sensor networks. And many techniques do not consider the capacity, computing
power, and power of sensors, which are the limiting factors in wireless sensor networks. And
some techniques analyze privacy and anonymity issues and propose solutions by manipulating
the message contents. In contrast to their schemes, this paper addresses the location privacy
threat due to the physical wireless medium that allows the adversary to perform traffic analysis
to derive the message flows.
In wireless sensor networks, minimization of energy consumption is considered a major
performance criterion to provide maximum network lifetime. Ant colony optimization
algorithms simulating the behavior of ant colony have been successfully applied in many
optimization problems such as vehicle routing and the asymmetric traveling salesman as well as
routing in wireless sensor networks
7
3. Related Works
In wireless sensor networks, it is important to provide confidentiality to the sensor’s location. In
this section, we describe previous proposed technologies that were designed to preserve the
source location in wireless sensor networks.
For a more comprehensive taxonomy of techniques of preserving privacy in WSNs, readers may
refer to the state-of-the-art survey
Fan et al. [02] preserve location privacy by using homomorphic encryption operations to prevent
traffic analysis in network coding. In [03], each cluster header can filter the dummy packets
received from the sensor nodes of its cluster to reduce the number of dummy packets. However,
the scheme requires much computation overhead due to using asymmetric-key cryptography, and
the packet delivery delay is long because the cluster header sends packets with a fixed rate
regardless of the number of events it collects.
Mehta et al. [04] formalize the location privacy problem using a global adversary model and
compute a lower bound for the overhead required for achieving a given level of privacy
protection.
The proposed scheme by Alomair et al. [05] can guarantee event indistinguishability by achieving
interval indistinguishability, where the adversary cannot distinguish between the first, the
middle, or the end of the interval.
In [06], dummy packets can be filtered at proxy nodes, and the lifetime of the WSN is analyzed at
different proxy assignment methodologies. Hong et al. [07] propose a scheme that can thwart time
correlation attack. In this attack, the adversary exploits the time correlation of transmissions in
successive links to learn the end-to-end route.
Zhou and Yow [08] propose an anonymous geographic routing algorithm which includes three
components to avoid the explicit exposure of identity and location in communication.
For local-eavesdropping based attack, flooding based approach was first introduced in [10], where
each sensor broadcasts data that it receives to all its neighbors. However, this technique suffers
from high communication overhead for sensors.
In [09], each data packet is first relayed to a randomly selected intermediate sensor in the network
and then is forwarded towards base station along the shortest path.
8
In [01], FitProbRate is proposed to maintain source anonymity, which is an exponentially
distributed dummy traffic generation scheme. The Fitprob parameter decides the dummy traffic
generated at a dynamic rate, which differs from other similar works. It is a great improvement
over source simulation and fake sources but still has the drawback of having overhead due to
dummy packet generation.
9
4. Solutions for providing source location privacy
1. Random Walk: The aim of the “random walk” approach is to have packets follow a random
route through the network. The random walk should make a packet’s path look completely
random to an adversary in order to counter the adversarie’s traffic analysis and hop-by-hop
traces. Solutions in this category use either a technique derived from the random walk, as
described by Ozturk et al[10], or a technique that results in a similar pattern, such as rumor
routing from Braginsky et al and routing through randomly selected intermediary node from
Li et al.
The following solutions are part of this category: angle based multi-intermediate nodes
selection ,the directed random walk, the greedy random walk, the location privacy support
scheme, the mules saving- source protocol, opportunistic routing, phantom routing, phantom
routing with location angle, phantom single-path routing, random routing, the random routing
scheme, routing through randomly selected intermediary node, the self-adjusting directed
random walk, and a combination of different solutions.
2. Geographic Routing: Solutions in this category use the physical location of the nodes
together with geographic routing algorithms to route packets through the WSN. Geographic
routing algorithms take the position of a node, its neighbor’s, and the sink into account, in
order to route a packet from the source to the sink. The solutions in this section make use of
additional methods, such as the usage of synonyms, encryption, and random intermediary
node selection to hide the flow of the traffic against a local adversary.
3. Delay: This category consists of solutions that alter the flow of the traffic as follows. Each
node buffers incoming packets and holds a packet for a random time before forwarding. As a
result, nodes alter the chronological order of the packets: they send the packets in a different
order than how they received them. As the chronological order of the packet change, so does
the traffic pattern. The change of the traffic pattern makes it hard for a local adversary to
track the traffic to the actual source.
10
4. Using dummy data sources: Solutions in this category introduce dummy traffic to alter the
real traffic. The aim is that an adversary should no longer be able to see which part of the
traffic is real, and which part is fake. In this category, we found the following solutions :
aggregation-based source location protection scheme, a real and a fake cloud-based scheme
for protecting source location privacy, constant rate , the dynamic bidirectional tree,
distributed resource allocation algorithm, dummy wake-up scheme , fake sources 1 and fake
sources 2, fitted probabilistic rate , the group algorithm for fake-traffic generation, globally
optimal algorithm, the heuristic greedy algorithm , mixes , the optimal filtering scheme,
periodic collection, persistent fake source routing, the probabilistic algorithm , proxy-based
filtering , SECLOUD, short-lived fake source routing, source simulation , the timed efficient
source privacy preservation, the timing analysis resilient protocol, tree based filtering ,the
trusted computing enabled heterogeneous WSN , unobservable handoff trajectory , and the
zigzag bidirectional tree.
5. Cyclic Entrapment: The solutions in this category aim at confusing the adversary by
shaping the traffic between nodes in cyclic patterns. A local adversary, who tracks the traffic
between the nodes, will travel in circles without finding the actual source. This category
consists of two solutions: cyclic entrapment method and information hiding in distributing
environments.
6. In Network Location Anonymization: Solutions in this category hide either the identity or
the location of a node. The following solutions are part of this category: the anonymous
communication scheme, anonymous path routing, the cryptographic anonymity scheme,
destination controlled anonymous routing protocol for sensor nets, hashing based ID
randomization, max query aggregation, phantom ID, the probabilistic destination controlled
anonymous routing protocol for sensor nets, the reverse hashing ID randomization, and the
simple anonymity scheme.
7. Cross-layer Routing: With cross-layer routing, the nodes use the beacon frames, which are
normally only used for network maintenance, to share information on sensed events. Local
adversaries, which normally only listen to the network level packets, miss part of the
11
information exchange, and do not find the real source. This category has two solutions: the
cross-layer solution and the double cross-layer solution.
8. Separate Path Routing: A local adversary often needs multiple packets along the same
route to track the actual source. The solutions based on separate path routing make sure that
the packets travel via different nonintersecting paths from source to sink. Using separate
paths leads to fewer packets per path, which delays the local adversary in its tracking, or even
makes the adversary unable to track the actual source at all. This category consists of random
parallel routing, weighted random stride routing, and weighted random stride routing towards
a global viewing adversary.
9. Network Coding: In network coding, each node cuts up its message and sends it out in
smaller pieces. These pieces are then forwarded via different routes towards the sink. This
category consists of the solutions from Fan et al as they propose to use network coding to
provide SLP.
10. Limit Node Delectability: This category consists of solutions that limit the transmission
power of the nodes to make them harder to detect. We have identified the following solutions
in this category: anti localization by silencing, context-aware location privacy, hidden
anchor, hyberloc, lowering radio transmission power, and multi cooperator power control.
From the above mentioned techniques we will be presenting two already developed privacy
protocols and then propose the modified protocol for privacy in wireless sensor networks.
12
5. System Model[10]
The terrain of our underlying network is a finite two-dimensional grid, which is further divided
into cells of equal size. The network is composed of one base station, static sensors, and mobile
agents, called data mules.
Static sensors - All static sensors are homogeneous with the same lifetime and capabilities of
storage, processing as well as communication. They are deployed uniformly at random in the
cells, and assumed to guarantee the connectivity of the network.
Data mules - Data mules are the mobile agents which can be artificially introduced in the
network [10]. We assume they move independently and do not communicate with each other.
Also, they are assumed to know their own locations when they are moving all the time. Their
mobility pattern can be modeled as a random walk on the grid, whereby in each transition it
moves with equal probability to one of the horizontally or vertically adjacent cells. After a data
mule moves into a cell, it stays there for tpause time period before its next transition.
At the beginning of the pause interval, the data mule announces its arrival by broadcasting Hello
Message. Only data source will respond and relay buffered data to the data mule. We assume the
data mule does not communicate with sensors when moving. The data mule’s communication
range is larger than that of a sensor, thus a data source which cannot directly transmit data to
the data mule will use multi-hop routing.
6. Preliminaries
In this section, we will first introduce our attack model and then propose a linear-regression
based approach for analyzing data traffic. Furthermore, we will demonstrate the effectiveness of
out attack model by compromising the phantom routing protocol [11]. Finally, we will define the
α-angle anonymity model for studying the location privacy preservation of data source.
7. Attack Model
We assume the attacker is capable of launching only passive attacks, in which he can only
monitor the traffic transmission but not decrypt or modify data packets. Suppose the attacker
monitors the radio transmissions between sensors in a circular area of radius Ratt. Larger the
13
monitoring area, stronger the attacker. If the monitoring area is large enough to cover the whole
network, it is global eavesdropping; on the other hand, if the area is limited only to a few hops, it
is local eavesdropping. However, we define semi-global eavesdropping as whose strength lies in
between the two extreme attack models. In addition, we believe without any prior knowledge of
source location, the attacker is inclined to launch the attack by collecting traffic data from around
the base station. Intuitively, since the whole network traffic converges to the base station, it
serves as the ideal point for starting the attack. Admittedly, the attacker can make an initial
estimation of the direction of data source and move in that direction. Meantime, he can keep
updating his estimation with more traffic observed as he moves, until he finds the data source.
However, in this paper we aim to discourage the attacker even from making a good initial
estimation before he starts moving.
Traffic flow in phantom routing
7.1. α-Angle Anonymity[10]
In order to anonymize source location privacy under semi-global eavesdropping attack, we
introduce α-angle anonymity model. This model ensures the preservation of source location
privacy by enlarging the inference space from which the attacker estimates the real direction of
the data source. The inference space is determined by the system variable α. The value of α can
be open to the public, even including the attacker, however, this should not threaten the privacy
14
of source location. According to the definition, we can see that the larger the value α, the larger
the inference area. The shaded area in Fig. 2 represents the attacker’s inference space. Given a
larger inference space, the attacker cannot deterministically estimate the real direction or location
of data source, thereby the source location privacy being preserved.
A protocol is α-angle anonymous if the real direction of data source is equally likely distributed
in the angle range [β − α, β + α], where β is the angle of the direction inferred by the attacker
based on his observation.
8. Mules-Saving-Source Protocol(MSS) [10]
To protect the source location privacy against a semi-global eavesdropper, we design a protocol,
called Mules-Saving-Source protocol, achieving α-angle anonymity.
Our protocol exploits the random mobility of data mules to establish a data transmission pattern
which effectively preserve the location privacy of data source. Specifically, we modify the
traditional function of data mules by having them hand data to regular sensors at only specific
locations in the network, from where data will be further routed towards base station along the
shortest paths[10]. The specific sensors will be selected so as to bias the direction of composite
traffic to be derived by the attacker based on data transmission he observes around base station.
In fact, solely allowing data mules to directly deliver data to base station can thoroughly preserve
source location privacy against a semi-global eavesdropper. This is because the data transmission
between data source and base station is completely hidden by the random movement of the data
mules which ferry data. However, its disadvantage is the non-trivial delay caused by data mules,
which may not be tolerable especially in large-scale wireless sensor networks.
In this section, we first describe our protocol and then prove it to be α-angle anonymous. Note
that we predefine a coordinate system with the base station as the origin, which is assumed to be
known by data mules. Our protocol includes three phases:
15
I. picking a fake direction at source,
II. carrying and unloading data by data mules, and
III. routing data to the base station
Phase I. Picking a fake direction at source - When a target is detected by the sensors, they
coordinate among themselves and let the one closest to the target become the data source. The
coordination protocol has been well studied in literature [13] and its discussion is out of the scope
of this paper. The data source periodically generates and sends data reports towards base station.
Additionally, it generates a value of β as the fake direction of data source to be used for biasing
the attacker’s observation in the traffic flows coming towards base station. Specifically, the data
source selects β from the range [θ − α, θ + α] uniformly at random, where θ is the absolute angle
between the direction of data source and the direction of x-axis in our coordinate system, and α is
a value preset to configure the privacy preservation level. The β angle is known only by the data
source[10] initially.
Phase II. Carrying and unloading data by data mules - When a data mule moves into a cell, only
the data source in its communication range responds with the buffered packets. Along with the
data, the data source also sends the value of β angle the data mule. After getting the data, the data
mule roams around the network until reaching certain location, called dropping point[10].
Dropping point is referred to as any point located on the dropping line drawn from base station at
an angle β in the coordinate system. Upon arriving in a cell intersecting with the dropping line,
the data mule unloads the data to the sensor closest to the dropping line present within the cell.
Phase III. Routing data at sensors - After data packets are offloaded to a sensor by the data
mule, they are routed towards base station along the shortest path. Ideally, the transmission path
is along the dropping line. However, due to the nonlinear multi-hop routing[10], data transmission
16
may have trivial deviation from the dropping line, which should not affect the privacy
preservation. One can see the traffic flow will go towards base station roughly along the
direction with a β angle, thereby successfully biasing the attacker’s inference of data source
direction.
9. Direct Delivery Protocol (DD)
Mule Saving Source protocol hand over the data to regular sensors at only specific locations in
the network, from where data will be further routed towards base station along the shortest paths.
But in Direct Delivery protocol the data is collected by the data mules and is directly delivered to
the basestation. In this protocol, the data delivery performance is not satisfactory and the delay of
delivery is usually very long than mule-saving-source protocol.
This protocol works in a simple and single module i.e picking up the data from the sensor nodes
and delivering it directly to the basestation or the sink. The main advantage of the protocol is DD
protocol guarantees the complete preservation[10] of the location privacy of data source, however
the disadvantage is the high delay[10], as compared to MSS protocol.
According to the attack models[10] we have discussed in this paper, the traffic in the network can
be used to detect the source node, however with direct delivery protocol the data is carried by the
data mules and their path are random, and they collect data from the source and deliver it to the
sink when in range. This protocol guarantees complete security because traffic analysis[10]
cannot be performed over the network when data mules carry the data from the source to the
sink.
In direct delivery protocol, the performance of the protocol can be improved with the
improvement in mobility pattern algorithm used for each data mule.
The path vector can be altered or improved by considering the following factors:
(1) Path selection: which trajectory the data mule follows
17
(2) Speed control: how the data mule changes the speed while moving along the path
(3) Job scheduling: from which sensor the data mule collects data at each time point
Path selection is to determine the trajectory of the data mule in the sensor field. To collect data
from each particular sensor, the data mule needs to go in the sensor’s communication range at
least once.
Speed control is to determine how the data mule changes its speed along the chosen path. The
data mule needs to change the speed so that it stays within each sensor’s communication range
long enough to collect all the data from it.
Job scheduling is done once the time-speed profile is deter- mined, we get a mapping from each
location to a time point. Thus we get a scheduling problem by regarding data collection from
each sensor as a job. Each job has one or more intervals in which it can be executed. Job
scheduling is to determine the allocation of time to jobs so that all jobs can be completed.
However, there is a tradeoff between source privacy and time delay for data transmission from
source to the basestation or the sink. When privacy of source location is the primary objective we
need to deploy direct delivery protocol considering no constraint on time delay of data delivery,
in other cases, mule-saving-source (MSS) protocol delivers data with better efficiency than the
direct delivery protocol.
18
10. Proposed Model : Modified-Direct-Delivery (MDD) Protocol
The proposed solution for the source location privacy has the following elements, properties and
terminologies:
I. Sensor Field: Sensor field is a square block with dimension of 400m x 400m.
This area is the working field of sensors and the mules in the simulation.
II. Sensors: Sensors are homogeneous with the same lifetime and capabilities of storage,
processing as well as communication. They are deployed uniformly at random in the
cells, and assumed to guarantee the connectivity of the network.
III. Zones: Sensor field is divided into zones, each zone contain different number of
sensors and data mules. These zones play a major role in fast delivery of data in the
proposed protocol.
IV. Data Mules: Data mules are the mobile agents which can be artificially introduced in
the network. In this protocol, they move independently and do communicate with
each other by establishing an ad-hoc network when two mules are in transmission
range. They communicate to deliver data. They are assumed to know their own
locations when they are moving all the time. Their mobility pattern can be modeled as
a random walk on the grid. They may be equipped with GPS facility so that they can
calculate the relative location over the sensor field.
V. Base Station: Base Station or the sink is the central repository of the data transmitted
by source in the sensor field. The data collected by the data mules is delivered to base
station, which is then organized and analyzed for fruitful results.
VI. Active Sensors or Source Sensors: In a simulating environment, every sensor in the
field need not transmit data; sensors are chosen randomly that have data and they
19
needed to transmit it to the data mules. Such sensors are active sensors. They are
ready to transmit and can sense the presence of data mule.
VII. Ad-hoc Networks: These networks are established when two data mules either from
same zone or different are in transmission range. This network is used to transmit the
collected data from one zone to other and subsequently to the zone with basestation.
10.1. Working of MDD Protocol
To ensure source location privacy and ensure it with better performance i.e. with minimum time
delay we have designed the protocol assuming all sensor nodes deployed have same energy and
the load over the data mule is balanced. In this protocol we have used a major part of direct-
delivery (DD) protocol, the data from the source node is delivered directly to the basestation but
the technique and process of delivery of data is improved by introducing zones and ad-hoc
network in between the data mules. The inter mule communication improves the time delay in
data delivery while the direct delivery of data from source to the sink is guaranteed.
The working of MDD protocol starts with an active node or source node that have some data that
it sensed based on the type of sensor; it may be temperature sensing, motion sensing, heat
sensing or any other sense property.
In this protocol we have three types of static sensors based on their state:
I. OFF Sensors: These are the sensors that are in a state in which their radio are in
OFF_STATE; they cannot sense process or transmit data in this state.
II. SLEEP Sensors: Sensors have a lot of energy consumption while they are sensing,
processing or transmitting. To reduce the frequent use of energy, when no event is
20
scheduled; the sensors fall into sleep state for some time and wake up immediately
when event get scheduled. This saves energy.
III. ACTIVE Sensors: Sensors that are ready to sense or have sensed and need to
transmit data to the mules are in ACTIVE state. These sensor nodes are considered as
source nodes and their location is need to preserved.
However the sensors are deployed in a field that is further divided into zones. The data mules
present in zone can collect data from the same zone only. The data mule collects data from active
sensors and the data is retransmitted to the other data mule through ad-hoc networks established
when these agents are in transmission range of each other.
The data transmission between the mules carry data from one zone to other as data transmission
takes place with the mule from other zone closer to the base station. This process has a major
impact over the reduction in time delay of data transmission. This time delay can be further
reduced by introducing path vector algorithms that improve efficiency of data transmission by
altering the parameter and properties of the data mule.
The efficiency is improved by following factors:
(1) Path selection[12]: which trajectory the data mule follows
(2) Speed control[12]: how the data mule changes the speed while moving along the path
(3) Job scheduling[12]: from which sensor the data mule collects data at each time point
Path selection is to determine the trajectory of the data mule in the sensor field. To collect data
from each particular sensor, the data mule needs to go in the sensor’s communication range at
least once.
21
Speed control is to determine how the data mule changes its speed along the chosen path. The
data mule needs to change the speed so that it stays within each sensor’s communication range
long enough to collect all the data from it.
Job scheduling is done once the time-speed profile is deter- mined, we get a mapping from each
location to a time point. Thus we get a scheduling problem by regarding data collection from
each sensor as a job. Each job has one or more intervals in which it can be executed. Job
scheduling[12] is to determine the allocation of time to jobs so that all jobs can be completed.
The intercommunication between data mules is continued till the data is received by the mule in
zone containing the sink or basestation. The mule in this zone carries the data to the base station
which is then delivered and used for analysis purpose.
22
11. Experiments and Results
Modified-Direct-Delivery protocol is simulated and the results are obtained for analysis and
comparison purpose. The simulator used for the experiment purpose is OMNeT++. OMNeT++ is
a very efficient and powerful wireless sensor network simulator. OMNeT++ is an object-oriented
modular discrete event network simulation framework. It has a generic architecture, so it can be
(and has been) used in various problem domains:
 Modeling of wired and wireless communication networks
 protocol modeling
 modeling of queuing networks
 modeling of multiprocessors and other distributed hardware systems
 validating of hardware architectures
 evaluating performance aspects of complex software systems
 in general, modeling and simulation of any system where the discrete event approach
is suitable, and can be conveniently mapped into entities communicating by exchanging
messages.
OMNeT++[13] itself is not a simulator of anything concrete, but rather provides infrastructure
and tools for writing simulations. One of the fundamental ingredients of this infrastructure is
component architecture for simulation models. Models are assembled from reusable components
termed modules.
Modules can be connected with each other via gates (other systems would call them ports),
and combined to form compound modules. The depth of module nesting is not limited. Modules
communicate through message passing, where messages may carry arbitrary data structures.
Modules can pass messages along predefined paths via gates and connections, or directly to their
destination.
OMNeT++ [13]also supports parallel distributed simulation. OMNeT++ can use several
mechanisms for communication between partitions of a parallel distributed simulation, for
example MPI or named pipes. The parallel simulation algorithm can easily be extended, or new
ones can be plugged in. Models do not need any special instrumentation to be run in parallel – it
23
is just a matter of configuration. OMNeT++ can even be used for classroom presentation of
parallel simulation algorithms, because simulations can be run in parallel even under the GUI
that provides detailed feedback on what is going on.
The OMNeT++ simulation IDE[13] is based on the Eclipse platform and extends it with new
editors, views, wizards, and other functionality. OMNeT++ adds functionality for creating and
configuring models (NED[13] and INI[13] files), performing batch executions and analyzing the
simulation results, while Eclipse provides C++ editing, SVN/GIT[13] integration and other
optional features (UML modeling, bug-tracker integration, database access, etc.) via various
open-source and commercial plug-in. The environment will be instantly recognizable to those at
home with the Eclipse platform.
11.1. Proposed Simulation Model
The proposed simulation model for analyzing the proposed modified-direct-delivery protocol we
have designed an event based simulation. We are especially interested in large-scale sensor
networks where there is a reasonably large separation between the source and the sink. The main
area of interest is the time delay in the delivery of the data from the source to the sink. From the
results obtained in the simulation i.e. the time between the creation of a message from a source to
the time of delivery to the sink is calculated.
In this model, the sensor field is divided into four different zones identified by four different
colors. The number of data mules deployed in each zone is based on the total number of sensor
nodes deployed in a zone i.e.
Number of Data Mules in a zone α Number of Sensor Nodes
Every sensor node has different states; to describe state of every sensor in the simulation
different colors are used.
I. Off State : Grey
II. Sleep State : Black
III. Active State : Red
24
Sleep time and Idle time are defined accordingly where Sleep time is the maximum time limit
when the sensor can go offline and the Idle time is the time limit taken by the sensor before
entering into the sleep time. To record the events generated through the simulation process
“record-eventlog = true[13]” is set.
Messages are created in forms of packets. Packet created by each sensor is forwarded
accordingly to mules which this then forwarded to other mules and finally to the basestation.
TransferMsg is the packet that contain numRecData that contain the timestamp of creation of the
packet by each sensor and then it is recorded throughout the mobility.
Following are the specification used in the simulation model for MDD protocol:
I. Sensor field dimension: 400m x 400m.
II. Number of Sensors used: Variable (50-300).
III. Number of Data Mules used: 8
IV. Range of each Data Mule: 50m
V. Simulation Time Limit: 200 sec
VI. CPU Time Limit: 1000 sec
VII. Sleep Time of Sensor Nodes: 120sec
VIII. Idle Time of Sensor Nodes :30sec
25
A Sensor Field with Data Mules, Sensors, Zones, Basestation
Creation of ad-hoc connection and transmission of data from one zone to other
26
Result obtained in the event log is displayed as in the figure below. Every sensor node transmit
some data in form of packets which is finally received by the basestation
Average Packet Transfer Delay is the average of source delay and carrier delay.
Source delay is the time between the creation of the packet and the time at which the packet is
delivered to the data mule in range. Carrier delay is the time between the time of packet received
by the mule and the time at which packet is received at the base station.
Average Packet Delay = Source Delay + Carrier Delay
Event log on completion of method - finish()
27
11.2. Results:
Number of Sensors in the simulation = 50 Number of Active Sensors = 29
Sensor ID [50] Time delay
9 0.371403
12 0.69743
14 52.3333
16 53.1111
20 0.314237
21 0.601479
25 0.297465
26 31
27 0.576412
28 0.866664
30 31
31 26.7775
33 12.981344
35 0.898583
38 0.650935
41 0.324784
Sum 212.802636
Average 13.30016475
Active Sensors 29
Number of Sensors in the Simulation = 100 Number of Active Sensors = 59
Sensor ID[100] Time Delay
11 0.44108
12 0.190687
14 13.3705
15 12.8797
20 0.206121
21 0.915134
22 0.604211
23 0.5144
0 10 20 30 40 50 60
9
14
20
25
27
30
33
38
Average
Time delay
Time delay
28
24
0.0952684
25 13.6327
26 14.7245
29 0.724588
30 0.747607
31 0.480331
32 18.45653
33 0.448478
34 33.7823
35 0.0483317
36 0.892575
43 0.759089
43 37.0345
43 18.9901
44 21.9895
45 0.248859
46 0.972774
52 0.13836
53 35.6679
54 0.0662034
55 0.442271
56 51.9416
61 0.978298
63 0.513878
64 54.4541
65 36.7167
74 0.308547
75 0.20511
76 2.1762
84 0.303599
85 0.310919
86 0.59431
95 0.254127
96 0.479442
Sum 378.7014285
Average 9.016700679
Active Sensors 59
0 20 40 60 80
11
14
20
22
24
26
30
32
34
36
43
44
46
53
55
61
64
74
76
85
95
Average
Time Delay
Time Delay
29
Number of Sensors in the Simulation = 150 Number of Active Sensors = 92
Sensor ID [150] Time Delay
14 0.81875
20 0.423232
21 0.746915
22 0.144944
23 26.8929
24 0.710244
25 0.334637
31 0.459475
32 0.584495
33 10.4623
34 24.8694
35 13.65949
36 12.86319
41 0.44637
42 0.930044
43 14.4535
44 0.472867
45 6.59396
46 0.556379
52 12.1956
53 0.660337
54 0.972362
55 0.278245
56 0.430616
61 0.493681
62 1.55513
63 46.6049
64 0.597943
65 0.552439
66 0.984333
71 62
72 0.522178
73 0.993358
74 83.7282
75 0.576774
76 0.174956
80 0.723687
82 0.239248
0 50 100
14
21
23
25
32
34
36
42
44
46
53
55
61
63
65
71
73
75
80
83
93
114
116
125
135
Avg Time Delay
Time Delay
Time Delay
30
83 0.264427
84 18.951
93 5.46409
105 43.5938
114 0.896177
115 0.534452
116 9.344324
121 3.132454
125 4.422342
126 0.00641925
135 0.345644
136 5.4232342
Avg. Time Delay 8.461708849
Active Sensors 92
Number of Sensors in the Simulation = 200 Number of Active Sensors = 140
Sensor ID [200] Time Delay
16 0.736903
17 0.196749
18 24.6814
19 0.42355
20 0.345234
22 0.45345324
27 0.2345223
28 0.457654
29 20.8814
30 52.4855
31 0.891192
32 0.610015
33 4.22606
34 3.435463
35 1.43534
39 0.546675
40 0.96785
41 0.756757
42 0.724689
43 20.8976
44 47.0378
45 2.2346712
31
46 53.8947
47 2.51829
49 0.58753
53 0.9422347
54 0.72842
55 1.823585
56 4.9185
57 0.132662
58 51.7726
59 8.19248
60 0.346248
61 0.974222
62 65.5214
65 0.927264
66 0.729562
68 0.8462841
69 0.200878
70 0.411577
71 53.4185
72 0.331979
73 0.522826
74 0.223097
75 40.0565
79 25.54924
80 0.4095
82 2.5984
84 0.769848
85 0.740943
86 0.571967
87 0.613141
88 60.8519
89 0.258981
90 0.21825
94 0.83465
97 0.883426
98 0.438728
99 0.694709
100 6.98392
101 0.76734
103 12.9582
104 6.23746
109 8.34872
110 2.87438
0 50 100 150
16
18
20
27
29
31
33
35
40
42
44
46
49
54
56
58
60
62
66
69
71
73
75
80
84
86
88
90
97
99
101
104
110
115
117
128
130
137
141
143
153
174
Avg Time Delay
Time Delay
Time Delay
32
114 0.131903
115 9.2938
116 0.101484
117 23.0955
125 0.235982
128 0.45735
129 0.925274
130 0.247636
133 0.83748234
137 3.4759231
140 0.892347
141 0.3487238
142 0.8748123
143 0.7734872
144 0.873453
153 3.4298351
155 0.95892341
174 31
186 0.353487
Sum 686.5929228
Avg Time Delay 8.173725271
Active Sensors 140
Number of Sensors in the Simulation = 300 Number of Active Sensors = 188
Sensor ID [200] Time Delay
6 0.854366
7 1.88643
11 0.844316
14 0.736903
15 0.543435
16 32.67454
17 0.42355
20 0.345234
21 0.733287
23 0.228765
24 0.643254
25 2.658814
27 5.764543
31 0.891192
32 1.6663243
33
33 24.22606
34 33.435463
35 1.43534
38 0.546675
39 0.96785
40 0.756757
41 0.567753
42 19.433786
44 45.96336
45 2.2346712
46 50.59347
47 2.51829
49 0.58753
53 0.763443
54 0.72842
55 1.0966543
56 4.877655
57 19.68678
58 23.9756477
59 8.19248
60 0.346248
61 0.974222
62 36.85521
65 0.927264
66 0.729562
67 0.8462841
68 0.200878
70 0.411577
71 53.4185
73 0.331979
74 0.522826
76 0.88601
77 16.833878
78 22.54924
79 0.7331
80 27.8333687
83 2.00135
84 0.740943
86 0.571967
87 0.613141
88 60.8519
89 0.258981
90 0.21825
0 20 40 60 80
6
14
17
23
27
33
38
41
45
49
55
58
61
66
70
74
78
83
87
90
93
101
109
115
120
123
130
136
139
145
150
160
167
171
174
199
219
234
249
254
269
298
Time Delay
Time Delay
34
91 0.83465
92 0.883426
93 0.438728
94 0.694709
99 6.8647
101 0.46431022
103 13.88542
104 16.2446
109 8.34872
110 2.87438
114 0.131903
115 29.2938
116 0.101484
117 23.0955
120 0.235982
121 0.45735
122 0.925274
123 0.247636
125 0.83748234
127 45
130 0.892347
131 0.3487238
135 0.8748123
136 0.7734872
137 0.873453
138 3.4298351
139 0.95892341
140 31
142 0.353487
145 7.59292279
146 16.62571583
148 12.883643
150 0.87346
155 0.6153332
157 0.773624
160 18.66496
161 22.009465
166 12.83465
167 0.48573
168 0.874754
170 20.736543
171 0.28929847
172 1.3765321
35
173 31
174 12.67527643
180 0.389463
192 0.98901
199 0.0347238
200 0.0874823
213 1.985793
219 1.84793
220 29.985794
229 2.9849
234 19.8465982
247 34.9934652
248 0.87642
249 0.7652734
250 0.99764852
252 0.50047332
254 0.87346549
260 0.46287475
261 0.92464875
269 8.7648583
270 0.747457683
278 0.48935752
298 1.3487572
Sum 984.7131429
Avg Time Delay 7.941235024
Active Sensors 188
36
11.3. Average time delay of Modified-Direct-Delivery Protocol:
No of Sensors Average Time Delay
50 13.30016475
100 9.0167003
150 8.4617088
200 8.173725
300 7.941235024
Average Time Delay of Modified-Direct-Delivery Protocol: 9.378706775
12. Comparison with Direct Delivery Protocol
Direct Delivery Protocol delivers packets directly to the basestation, so in this type of delivery
data mule have to carry data for a long time all through the path way till basestation is in range of
the mule containing the data. In this protocol, the probability of collision or carrying data from
same sensor node is more thus reducing the efficiency.
Certain improvements in this protocol with a better path selection and speed control with inter
mule communication brings out a lot of improvements in the average time delay of the protocol.
When two mules are interconnected they transmit the data as well in case of duplicate values of
packet id, collision is avoided. This reduces the probability of collision and thus improving the
efficiency of the protocol. Also, mule need not travel all through the path to the basestation for
transmission. Zones in the sensor field is a major improvement in the protocol and using zones
0 100 200 300 400
1
2
3
4
5
Average Time
Delay
No of Sensors
37
maximum number of sensor nodes can be covered in much smaller time thus reducing the source
delay.
MDD Protocol have following improvements over Direct Delivery Protocol:
I. Introduction of zones: Mules can cover maximum number of nodes in small amount
of time; reducing source delay
II. Inter mule communication: Mules in MDD protocol create ad-hoc networks when
in range, this assures faster delivery of data in small time; reducing carrier delay.
12.1. Result analysis of DD and MDD Protocol
With the result analysis above, we can conclude that for every simulation with varying number
of sensor nodes MDD protocol gives a better and efficient result in delivery of data with reduced
time delay in every case scenario.
23.923628
16.893394
14.008463
13.944558
10.788331
15.9116748
13.30016475
9.0167003
8.4617088
8.173725
7.941235024
9.378706775
50
100
150
200
300
Avg. Time Delay of DD
Comparision of DD and MDD Protocol
ATD (MDD-Protocol) ATD (DD-Protocol)
38
12.2. Advantages of MDD protocol
1. Low source delay and carrier delay in delivery of data.
2. Guarantees full security of source location.
3. Reduces probability of collision of data at basestation.
4. In case of collision, the redundancy is removed at real time, hence reduces load on
modules
5. Independent of transmission trough sensors, so eavesdrop attack model is inefficient.
Network traffic analysis is inefficient attack model.
6. Energy efficient protocol, sensor need not transmit to a long distance(1kb for every 331
feet).
7. Localization efficient, mules are equipped with GPS facility reducing localization issues.
12.3. Limitations of MDD protocol
1. Efficiency is dependent on mobility pattern of data mule. Path Selection and speed
control algorithms improves efficiency.
2. Mules need high data storage and processing power for data storage and collision control.
3. Dependent on network configuration, sensor deployment, zones and mobility pattern of
mules.
4. No intelligent selection of mobility pattern in data mules.
5. Mules assisted with GPS and other infrastructure increases cost.
39
13. References
01 N. Li, M. Raj, D. Liu, M. Wright, and S. K. Das, “Using data mules to preserve source location privacy in
wireless sensor networks,” at 13th International Conference on Distributed Computing and Networking
(ICDCN ’12), vol. 7129 of Lecture Notes in Computer Science, p. 309, 324, Hong Kong, China, 2012.
02 Y. Fan, Y. Jiang, H. Zhu, and X. Shen, “An efficient privacy-preserving scheme against traffic analysis
attacks in network coding,” in Proceedings of the 28th Conference on Computer Communications (IEEE
INFOCOM '09), pp. 2213–2221, April 2009. View at Publisher · View at Google Scholar ·
03 R. Lu, X. Lin, H. Zhu, and X. Shen, “TESP2: timed efficient source privacy preservation scheme for
wireless sensor networks,” in Proceedings of the IEEE International Conference on Communications
(ICC '10), May 2010. View at Publisher · View at Google Scholar · View at Scopus
04 K. Mehta, D. Liu, and M. Wright, “Protecting location privacy in sensor networks against a global
eavesdropper,” IEEE Transactions on Mobile Computing, vol. 11, no. 2, pp. 320–336, 2012. View at
Publisher · View at Google Scholar · View at Scopus
05 B. Alomair, A. Clark, J. Cuellar, and R. Poovendran, “Statistical framework for source anonymity in
sensor networks,” in Proceedings of the 53rd IEEE Global Communications Conference (GLOBECOM
'10), December 2010. View at Publisher · View at Google Scholar · View at Scopus
06 K. Bicakci, H. Gultekin, B. Tavli, and I. E. Bagci, “Maximizing lifetime of event-unobservable wireless
sensor networks,” Computer Standards and Interfaces, vol. 33, no. 4, pp. 401–410, 2011. View at
Publisher · View at Google Scholar · View at Scopus
07 X. Hong, P. Wang, J. Kong, Q. Zheng, and J. Liu, “Effective probabilistic approach protecting sensor
traffics,” in Proceedings of the Military Communications Conference (MILCOM '05), vol. 1, pp. 169–
175, October 2005. View at Publisher · View at Google Scholar · View at Scopus
08 Z. Zhou and K. C. Yow, “Anonymizing geographic Ad Hoc routing for preserving location
privacy,”International Journal of Network Security, vol. 2, no. 3, pp. 210–218, 2006.
40
09 Li, Y., Ren, J.: Source-location privacy through dynamic routing in wireless sensor networks. In:
Proceedings of INFOCOM (2010)
10 Ozturk, C., Zhang, Y., Trappe, W.: Source-location privacy in energy constrained sensor network routing.
In: Proceedings. 2nd ACM workshop on Security of ad hoc and sensor networks, SASN (2004).
11 Mayank Raja, Na Lia, Donggang Liub, Matthew Wrightb, Sajal K. Das : Using Data Mules to Preserve
Source Location Privacy in Wireless Sensor Networks (CReWMaN),The Information Security Lab (iSec)
12 Ryo Sugihara and Rajesh K. Gupta. University of California, San Diego: Path Planning of Data Mules in
Sensor Networks. In: ACM Journal Name, Vol. V, No. N, Month 20YY.
13 Manual- OMNeT++

More Related Content

PPTX
localization in wsn
PPTX
The Bluetooth technology
PPTX
Sim cards
PPTX
Computer networking
PPT
Présentation GSM
PPTX
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALA
PPTX
Topology presentation-sachin noire
PDF
3G BTS and DBS Hardware at Ericsson, Huawei, ZTE and NSN
localization in wsn
The Bluetooth technology
Sim cards
Computer networking
Présentation GSM
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALA
Topology presentation-sachin noire
3G BTS and DBS Hardware at Ericsson, Huawei, ZTE and NSN

What's hot (20)

PDF
An IOT Based Smart Irrigation System Using Soil Moisture And Weather Prediction
PPT
Le Réseau GSM
PPTX
IoT advatage and disadvantage
PPT
Localization in wsn
PDF
SIM Card Overview
PPTX
Gsm Protocoles & ProcéDures
PPTX
Gsm based home(ppt)
PDF
Wc & lte 4 g module 4- 2019 by prof.sv1
PPTX
PPTX
Introduction to computer networks
PPTX
Basics of Wireless sensor networks
PPTX
Issues of Wireless Sensor Networks
PDF
Overview of IoT and Security issues
PDF
84674131 237abe2eeff493a4f34558dcc3ba511b
PPT
Abis Over IP/Abis Optimization on-site Workshop
PPTX
Mobility Management
PPTX
Computer network
PPTX
Energy conservation in wireless sensor networks
PDF
Wireless Network Architecture
PDF
What is Wireless Communication or Unguided Transmission Media
An IOT Based Smart Irrigation System Using Soil Moisture And Weather Prediction
Le Réseau GSM
IoT advatage and disadvantage
Localization in wsn
SIM Card Overview
Gsm Protocoles & ProcéDures
Gsm based home(ppt)
Wc & lte 4 g module 4- 2019 by prof.sv1
Introduction to computer networks
Basics of Wireless sensor networks
Issues of Wireless Sensor Networks
Overview of IoT and Security issues
84674131 237abe2eeff493a4f34558dcc3ba511b
Abis Over IP/Abis Optimization on-site Workshop
Mobility Management
Computer network
Energy conservation in wireless sensor networks
Wireless Network Architecture
What is Wireless Communication or Unguided Transmission Media
Ad

Viewers also liked (20)

DOCX
Preserving location privacy in geo social applications
PDF
Wireless sensor networks 2016-2017 titles
PDF
Long-Range Wireless Sensor Networks for Geo-location Tracking: Design and Eva...
PPT
Supporting the Sink mobility: a case study for WSN
DOCX
Li-Fi seminar report
PDF
Wireless sensor networks for condition monitoring in the railway industry a s...
PDF
драги змијанац не смее да се дозволи да транзитираат деца без родител, без на...
PDF
SCNO Consulting Project for the SPCA of Tompkins County
PDF
Водич за родители наставници и воспитувачи „Тепањето е злоупотреба, а не казна“
PDF
Национална стратегија за застапување на ПРЕЦЕДЕ мрежата 2016-2026 Партнерство...
PPTX
PDF
Dcb cms 330 movie anlysis pp
PDF
Chapter 10, Part 2
PPTX
програмна інженерія
PDF
SpaceCurve - Integrating with Hadoop
PDF
Стратегиски план 2016 2020 на Првата детска амбасада во светот МЕЃАШИ
PDF
кратко резиме од спроведеното истражување во април 2016 од tns brima gallup i...
PDF
Open Source: alternativa vincente per l'azienda?
PDF
РЕГИОНАЛНА СТРАТЕГИЈА ЗА ЗАСТАПУВАЊЕ НА ПРЕЦЕДЕ МРЕЖАТА 2016-2019
PDF
Interview with Dragi Zmijanac - Director of the First Children’s Embassy in t...
Preserving location privacy in geo social applications
Wireless sensor networks 2016-2017 titles
Long-Range Wireless Sensor Networks for Geo-location Tracking: Design and Eva...
Supporting the Sink mobility: a case study for WSN
Li-Fi seminar report
Wireless sensor networks for condition monitoring in the railway industry a s...
драги змијанац не смее да се дозволи да транзитираат деца без родител, без на...
SCNO Consulting Project for the SPCA of Tompkins County
Водич за родители наставници и воспитувачи „Тепањето е злоупотреба, а не казна“
Национална стратегија за застапување на ПРЕЦЕДЕ мрежата 2016-2026 Партнерство...
Dcb cms 330 movie anlysis pp
Chapter 10, Part 2
програмна інженерія
SpaceCurve - Integrating with Hadoop
Стратегиски план 2016 2020 на Првата детска амбасада во светот МЕЃАШИ
кратко резиме од спроведеното истражување во април 2016 од tns brima gallup i...
Open Source: alternativa vincente per l'azienda?
РЕГИОНАЛНА СТРАТЕГИЈА ЗА ЗАСТАПУВАЊЕ НА ПРЕЦЕДЕ МРЕЖАТА 2016-2019
Interview with Dragi Zmijanac - Director of the First Children’s Embassy in t...
Ad

Similar to Source location privacy in wireless sensor networks using data mules. (20)

PDF
Robust encryption algorithm based sht in wireless sensor networks
PDF
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
PDF
DATA AGGREGATION AND PRIVACY FOR POLICE PATROLS
PDF
International Journal of Engineering Research and Development (IJERD)
PDF
SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
PDF
N0704075079
PDF
A review of privacy preserving techniques in wireless sensor network
PDF
A review of privacy preserving techniques in wireless sensor network
PDF
Secure and Reliable Data Routing in Wireless Sensor Network
PDF
A review of privacy preserving techniques in wireless sensor network
PDF
A review of privacy preserving techniques in wireless sensor network
PDF
International Journal of Engineering Research and Development (IJERD)
PDF
50120140505014
PDF
Data Security via Public-Key Cryptography in Wireless Sensor Network
PDF
A Survey on Threats and Security schemes in Wireless Sensor Networks
PDF
Protocols for Wireless Sensor Networks and Its Security
PDF
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
PDF
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
PDF
ENERGY CONSUMPTION AND LOCALITY OF SENSOR NETWORKS
Robust encryption algorithm based sht in wireless sensor networks
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
DATA AGGREGATION AND PRIVACY FOR POLICE PATROLS
International Journal of Engineering Research and Development (IJERD)
SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
N0704075079
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
Secure and Reliable Data Routing in Wireless Sensor Network
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
International Journal of Engineering Research and Development (IJERD)
50120140505014
Data Security via Public-Key Cryptography in Wireless Sensor Network
A Survey on Threats and Security schemes in Wireless Sensor Networks
Protocols for Wireless Sensor Networks and Its Security
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
ENERGY CONSUMPTION AND LOCALITY OF SENSOR NETWORKS

Recently uploaded (20)

PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Advanced Soft Computing BINUS July 2025.pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
madgavkar20181017ppt McKinsey Presentation.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Electronic commerce courselecture one. Pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Transforming Manufacturing operations through Intelligent Integrations
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
HCSP-Presales-Campus Network Planning and Design V1.0 Training Material-Witho...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Advanced IT Governance
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Advanced Soft Computing BINUS July 2025.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
madgavkar20181017ppt McKinsey Presentation.pdf
MYSQL Presentation for SQL database connectivity
Electronic commerce courselecture one. Pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Advanced methodologies resolving dimensionality complications for autism neur...
20250228 LYD VKU AI Blended-Learning.pptx
NewMind AI Weekly Chronicles - August'25 Week I
Per capita expenditure prediction using model stacking based on satellite ima...
Transforming Manufacturing operations through Intelligent Integrations
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Chapter 3 Spatial Domain Image Processing.pdf
HCSP-Presales-Campus Network Planning and Design V1.0 Training Material-Witho...
Diabetes mellitus diagnosis method based random forest with bat algorithm
Review of recent advances in non-invasive hemoglobin estimation
Advanced IT Governance

Source location privacy in wireless sensor networks using data mules.

  • 1. 1 Source Location privacy in wireless sensor networks using data mules
  • 2. 2 Chapters 1. Abstract 3 2. Introduction 4 2.1. Source-Location Privacy 5 2.2. Why Source-Location Privacy? 5 3. Related Works 7 4. Solutions for providing source location privacy 9 5. System Model 12 6. Preliminaries 12 7. Attack Model 12 7.1. α-Angle Anonymity 13 8. Mules-Saving-Source Protocol(MSS) 14 9. Direct Delivery Protocol (DD) 16 10. Proposed Model: MDD Protocol 18 10.1. Working of MDD Protocol 19 11. Experiments and Results 22 11.1. Proposed Simulation Model 23 11.2. Results 27 11.3. Average time delay of MDD Protocol 36 12. Comparison with Direct Delivery Protocol 36 12.1. Result analysis of DD and MDD Protocol 37 12.2. Advantages of MDD protocol 38 12.3. Disadvantages of MDD protocol 38 13. References 39
  • 3. 3 1. Abstract Wireless sensor networks (WSNs) have many promising applications for monitoring critical regions, such as in military surveillance and target tracking. In such applications, privacy of the location of the source sensor is of utmost importance as its compromise may reveal the location of the object being monitored. Traditional security mechanisms, like encryption, have proven to be ineffective as location of the source can also be revealed by analysis of the direction of traffic flow in the network. In this paper, we investigate the source-location privacy issue and discuss the attack model as semi-global eavesdrop attack model being more realistic than the local or global eavesdropping attack model. Additionally, we adapt the conventional function of data mules to design a new protocol for securing source location privacy called the Modified-Direct-Delivery (MDD) protocol and analyze its capabilities, limitations and drawback against two other protocols called the Mules-Saving-Source (MSS) protocol and Direct-Delivery (DD) protocol. We analyze the delay incurred by using data mules in our protocol and examine the association between privacy preservation and data delay in our protocol through simulation. Keywords: source location privacy, data mules, wireless sensor networks, mules saving source protocol, direct delivery protocol
  • 4. 4 2. Introduction In recent years, WSNs have played an important role in a number of security applications, like remotely monitoring objects etc. In such applications, the location of the monitored object is tightly coupled with the sensor that detects it, called the data source. Therefore, preserving the location of data source is important for protecting the object from being traced. Such a preservation cannot be simply accomplished by encrypting the data packets as the location of the data source can be disclosed by analyzing the traffic flow in WSNs. There have been extensive techniques proposed to preserve source-location privacy against different attack models: Local-eavesdropping model - Local-eavesdropping assumes the attacker’s ability to monitor the wireless communication is limited to a very small region, up to very few hops. Global-eavesdropping model - The attacker is assumed to be capable of monitoring the traffic over the entire network. Both being unrealistic, because the former stringently restricts the attacker’s ability, while the latter exaggerates it, considering resources and cost required for launching such an attack. Semi-Global eavesdropping model - A more practical attack model, in this semi-global eavesdropping model, the attacker is able to eavesdrop on wireless communications in a substantial area that is much smaller than the entire monitoring network. This attack model allows the attacker to gather substantially more information than a local eavesdropper. Under the semi-global eavesdropping model, we explore a novel protocol for preserving source- location privacy by using data mules. Traditionally, data mules are used in WSNs for reducing energy consumption due to the data transmission between sensors and facilitating communication in disconnected networks. A data mule picks up data from the data source and then delivers them directly to the base station. We adapt the functionality of data mules so that they not only maintain their traditional functionality, but also facilitate the preservation of the location privacy of data sources.
  • 5. 5 2.1. Source-Location-Privacy The problem of preserving source-location privacy can be explained using the “Panda Hunter Game”, in which the sensors are deployed in the forest to monitor the movement of pandas. Each panda is mounted with an actuator which signals to the surrounding sensors in its communication range. When the sensor close to the panda receives the signal, it creates and sends data reports to the base station over the wireless network. A hunter who is monitoring the wireless communication between the sensors will be able to identify the direction of incoming traffic flow and trace back the data transmission path to locate the data source, thus catching the panda. In fact, any WSNs used for such monitoring applications are vulnerable to such kinds of traffic analysis based attacks. 2.2. Why source-location-privacy? In a wireless sensor network, location information often means the physical location of the event, which is crucially given some applications of wireless sensor networks. So if an attacker gets location information by analyzing a message that was captured, he will move to the location and monitor the event. Meanwhile, the attacker will collect a lot of private information. So the information retrieved by these networks is of vital importance and must be properly secured not only from curious eavesdroppers but also from more skilled adversaries. Messages traversing the network can be protected using traditional confidentiality and integrity mechanisms. But, even if an adversary cannot obtain the information contained in the payloads, he can still retrieve other sensitive information by observing and analyzing the communications. For example, an attacker can obtain the information from the network and the environment being monitored by simple observation of the network traffic. Besides, an attacker can compromise users’ location privacy by observing the wireless signals from user devices Although many existing privacy techniques can be employed in sensor network scenarios, they cannot effectively preserve the sensor location in a sensor network. The reason is that the problems are different in fact and many of the methods introduce overhead which are too
  • 6. 6 burdensome for sensor networks. And many techniques do not consider the capacity, computing power, and power of sensors, which are the limiting factors in wireless sensor networks. And some techniques analyze privacy and anonymity issues and propose solutions by manipulating the message contents. In contrast to their schemes, this paper addresses the location privacy threat due to the physical wireless medium that allows the adversary to perform traffic analysis to derive the message flows. In wireless sensor networks, minimization of energy consumption is considered a major performance criterion to provide maximum network lifetime. Ant colony optimization algorithms simulating the behavior of ant colony have been successfully applied in many optimization problems such as vehicle routing and the asymmetric traveling salesman as well as routing in wireless sensor networks
  • 7. 7 3. Related Works In wireless sensor networks, it is important to provide confidentiality to the sensor’s location. In this section, we describe previous proposed technologies that were designed to preserve the source location in wireless sensor networks. For a more comprehensive taxonomy of techniques of preserving privacy in WSNs, readers may refer to the state-of-the-art survey Fan et al. [02] preserve location privacy by using homomorphic encryption operations to prevent traffic analysis in network coding. In [03], each cluster header can filter the dummy packets received from the sensor nodes of its cluster to reduce the number of dummy packets. However, the scheme requires much computation overhead due to using asymmetric-key cryptography, and the packet delivery delay is long because the cluster header sends packets with a fixed rate regardless of the number of events it collects. Mehta et al. [04] formalize the location privacy problem using a global adversary model and compute a lower bound for the overhead required for achieving a given level of privacy protection. The proposed scheme by Alomair et al. [05] can guarantee event indistinguishability by achieving interval indistinguishability, where the adversary cannot distinguish between the first, the middle, or the end of the interval. In [06], dummy packets can be filtered at proxy nodes, and the lifetime of the WSN is analyzed at different proxy assignment methodologies. Hong et al. [07] propose a scheme that can thwart time correlation attack. In this attack, the adversary exploits the time correlation of transmissions in successive links to learn the end-to-end route. Zhou and Yow [08] propose an anonymous geographic routing algorithm which includes three components to avoid the explicit exposure of identity and location in communication. For local-eavesdropping based attack, flooding based approach was first introduced in [10], where each sensor broadcasts data that it receives to all its neighbors. However, this technique suffers from high communication overhead for sensors. In [09], each data packet is first relayed to a randomly selected intermediate sensor in the network and then is forwarded towards base station along the shortest path.
  • 8. 8 In [01], FitProbRate is proposed to maintain source anonymity, which is an exponentially distributed dummy traffic generation scheme. The Fitprob parameter decides the dummy traffic generated at a dynamic rate, which differs from other similar works. It is a great improvement over source simulation and fake sources but still has the drawback of having overhead due to dummy packet generation.
  • 9. 9 4. Solutions for providing source location privacy 1. Random Walk: The aim of the “random walk” approach is to have packets follow a random route through the network. The random walk should make a packet’s path look completely random to an adversary in order to counter the adversarie’s traffic analysis and hop-by-hop traces. Solutions in this category use either a technique derived from the random walk, as described by Ozturk et al[10], or a technique that results in a similar pattern, such as rumor routing from Braginsky et al and routing through randomly selected intermediary node from Li et al. The following solutions are part of this category: angle based multi-intermediate nodes selection ,the directed random walk, the greedy random walk, the location privacy support scheme, the mules saving- source protocol, opportunistic routing, phantom routing, phantom routing with location angle, phantom single-path routing, random routing, the random routing scheme, routing through randomly selected intermediary node, the self-adjusting directed random walk, and a combination of different solutions. 2. Geographic Routing: Solutions in this category use the physical location of the nodes together with geographic routing algorithms to route packets through the WSN. Geographic routing algorithms take the position of a node, its neighbor’s, and the sink into account, in order to route a packet from the source to the sink. The solutions in this section make use of additional methods, such as the usage of synonyms, encryption, and random intermediary node selection to hide the flow of the traffic against a local adversary. 3. Delay: This category consists of solutions that alter the flow of the traffic as follows. Each node buffers incoming packets and holds a packet for a random time before forwarding. As a result, nodes alter the chronological order of the packets: they send the packets in a different order than how they received them. As the chronological order of the packet change, so does the traffic pattern. The change of the traffic pattern makes it hard for a local adversary to track the traffic to the actual source.
  • 10. 10 4. Using dummy data sources: Solutions in this category introduce dummy traffic to alter the real traffic. The aim is that an adversary should no longer be able to see which part of the traffic is real, and which part is fake. In this category, we found the following solutions : aggregation-based source location protection scheme, a real and a fake cloud-based scheme for protecting source location privacy, constant rate , the dynamic bidirectional tree, distributed resource allocation algorithm, dummy wake-up scheme , fake sources 1 and fake sources 2, fitted probabilistic rate , the group algorithm for fake-traffic generation, globally optimal algorithm, the heuristic greedy algorithm , mixes , the optimal filtering scheme, periodic collection, persistent fake source routing, the probabilistic algorithm , proxy-based filtering , SECLOUD, short-lived fake source routing, source simulation , the timed efficient source privacy preservation, the timing analysis resilient protocol, tree based filtering ,the trusted computing enabled heterogeneous WSN , unobservable handoff trajectory , and the zigzag bidirectional tree. 5. Cyclic Entrapment: The solutions in this category aim at confusing the adversary by shaping the traffic between nodes in cyclic patterns. A local adversary, who tracks the traffic between the nodes, will travel in circles without finding the actual source. This category consists of two solutions: cyclic entrapment method and information hiding in distributing environments. 6. In Network Location Anonymization: Solutions in this category hide either the identity or the location of a node. The following solutions are part of this category: the anonymous communication scheme, anonymous path routing, the cryptographic anonymity scheme, destination controlled anonymous routing protocol for sensor nets, hashing based ID randomization, max query aggregation, phantom ID, the probabilistic destination controlled anonymous routing protocol for sensor nets, the reverse hashing ID randomization, and the simple anonymity scheme. 7. Cross-layer Routing: With cross-layer routing, the nodes use the beacon frames, which are normally only used for network maintenance, to share information on sensed events. Local adversaries, which normally only listen to the network level packets, miss part of the
  • 11. 11 information exchange, and do not find the real source. This category has two solutions: the cross-layer solution and the double cross-layer solution. 8. Separate Path Routing: A local adversary often needs multiple packets along the same route to track the actual source. The solutions based on separate path routing make sure that the packets travel via different nonintersecting paths from source to sink. Using separate paths leads to fewer packets per path, which delays the local adversary in its tracking, or even makes the adversary unable to track the actual source at all. This category consists of random parallel routing, weighted random stride routing, and weighted random stride routing towards a global viewing adversary. 9. Network Coding: In network coding, each node cuts up its message and sends it out in smaller pieces. These pieces are then forwarded via different routes towards the sink. This category consists of the solutions from Fan et al as they propose to use network coding to provide SLP. 10. Limit Node Delectability: This category consists of solutions that limit the transmission power of the nodes to make them harder to detect. We have identified the following solutions in this category: anti localization by silencing, context-aware location privacy, hidden anchor, hyberloc, lowering radio transmission power, and multi cooperator power control. From the above mentioned techniques we will be presenting two already developed privacy protocols and then propose the modified protocol for privacy in wireless sensor networks.
  • 12. 12 5. System Model[10] The terrain of our underlying network is a finite two-dimensional grid, which is further divided into cells of equal size. The network is composed of one base station, static sensors, and mobile agents, called data mules. Static sensors - All static sensors are homogeneous with the same lifetime and capabilities of storage, processing as well as communication. They are deployed uniformly at random in the cells, and assumed to guarantee the connectivity of the network. Data mules - Data mules are the mobile agents which can be artificially introduced in the network [10]. We assume they move independently and do not communicate with each other. Also, they are assumed to know their own locations when they are moving all the time. Their mobility pattern can be modeled as a random walk on the grid, whereby in each transition it moves with equal probability to one of the horizontally or vertically adjacent cells. After a data mule moves into a cell, it stays there for tpause time period before its next transition. At the beginning of the pause interval, the data mule announces its arrival by broadcasting Hello Message. Only data source will respond and relay buffered data to the data mule. We assume the data mule does not communicate with sensors when moving. The data mule’s communication range is larger than that of a sensor, thus a data source which cannot directly transmit data to the data mule will use multi-hop routing. 6. Preliminaries In this section, we will first introduce our attack model and then propose a linear-regression based approach for analyzing data traffic. Furthermore, we will demonstrate the effectiveness of out attack model by compromising the phantom routing protocol [11]. Finally, we will define the α-angle anonymity model for studying the location privacy preservation of data source. 7. Attack Model We assume the attacker is capable of launching only passive attacks, in which he can only monitor the traffic transmission but not decrypt or modify data packets. Suppose the attacker monitors the radio transmissions between sensors in a circular area of radius Ratt. Larger the
  • 13. 13 monitoring area, stronger the attacker. If the monitoring area is large enough to cover the whole network, it is global eavesdropping; on the other hand, if the area is limited only to a few hops, it is local eavesdropping. However, we define semi-global eavesdropping as whose strength lies in between the two extreme attack models. In addition, we believe without any prior knowledge of source location, the attacker is inclined to launch the attack by collecting traffic data from around the base station. Intuitively, since the whole network traffic converges to the base station, it serves as the ideal point for starting the attack. Admittedly, the attacker can make an initial estimation of the direction of data source and move in that direction. Meantime, he can keep updating his estimation with more traffic observed as he moves, until he finds the data source. However, in this paper we aim to discourage the attacker even from making a good initial estimation before he starts moving. Traffic flow in phantom routing 7.1. α-Angle Anonymity[10] In order to anonymize source location privacy under semi-global eavesdropping attack, we introduce α-angle anonymity model. This model ensures the preservation of source location privacy by enlarging the inference space from which the attacker estimates the real direction of the data source. The inference space is determined by the system variable α. The value of α can be open to the public, even including the attacker, however, this should not threaten the privacy
  • 14. 14 of source location. According to the definition, we can see that the larger the value α, the larger the inference area. The shaded area in Fig. 2 represents the attacker’s inference space. Given a larger inference space, the attacker cannot deterministically estimate the real direction or location of data source, thereby the source location privacy being preserved. A protocol is α-angle anonymous if the real direction of data source is equally likely distributed in the angle range [β − α, β + α], where β is the angle of the direction inferred by the attacker based on his observation. 8. Mules-Saving-Source Protocol(MSS) [10] To protect the source location privacy against a semi-global eavesdropper, we design a protocol, called Mules-Saving-Source protocol, achieving α-angle anonymity. Our protocol exploits the random mobility of data mules to establish a data transmission pattern which effectively preserve the location privacy of data source. Specifically, we modify the traditional function of data mules by having them hand data to regular sensors at only specific locations in the network, from where data will be further routed towards base station along the shortest paths[10]. The specific sensors will be selected so as to bias the direction of composite traffic to be derived by the attacker based on data transmission he observes around base station. In fact, solely allowing data mules to directly deliver data to base station can thoroughly preserve source location privacy against a semi-global eavesdropper. This is because the data transmission between data source and base station is completely hidden by the random movement of the data mules which ferry data. However, its disadvantage is the non-trivial delay caused by data mules, which may not be tolerable especially in large-scale wireless sensor networks. In this section, we first describe our protocol and then prove it to be α-angle anonymous. Note that we predefine a coordinate system with the base station as the origin, which is assumed to be known by data mules. Our protocol includes three phases:
  • 15. 15 I. picking a fake direction at source, II. carrying and unloading data by data mules, and III. routing data to the base station Phase I. Picking a fake direction at source - When a target is detected by the sensors, they coordinate among themselves and let the one closest to the target become the data source. The coordination protocol has been well studied in literature [13] and its discussion is out of the scope of this paper. The data source periodically generates and sends data reports towards base station. Additionally, it generates a value of β as the fake direction of data source to be used for biasing the attacker’s observation in the traffic flows coming towards base station. Specifically, the data source selects β from the range [θ − α, θ + α] uniformly at random, where θ is the absolute angle between the direction of data source and the direction of x-axis in our coordinate system, and α is a value preset to configure the privacy preservation level. The β angle is known only by the data source[10] initially. Phase II. Carrying and unloading data by data mules - When a data mule moves into a cell, only the data source in its communication range responds with the buffered packets. Along with the data, the data source also sends the value of β angle the data mule. After getting the data, the data mule roams around the network until reaching certain location, called dropping point[10]. Dropping point is referred to as any point located on the dropping line drawn from base station at an angle β in the coordinate system. Upon arriving in a cell intersecting with the dropping line, the data mule unloads the data to the sensor closest to the dropping line present within the cell. Phase III. Routing data at sensors - After data packets are offloaded to a sensor by the data mule, they are routed towards base station along the shortest path. Ideally, the transmission path is along the dropping line. However, due to the nonlinear multi-hop routing[10], data transmission
  • 16. 16 may have trivial deviation from the dropping line, which should not affect the privacy preservation. One can see the traffic flow will go towards base station roughly along the direction with a β angle, thereby successfully biasing the attacker’s inference of data source direction. 9. Direct Delivery Protocol (DD) Mule Saving Source protocol hand over the data to regular sensors at only specific locations in the network, from where data will be further routed towards base station along the shortest paths. But in Direct Delivery protocol the data is collected by the data mules and is directly delivered to the basestation. In this protocol, the data delivery performance is not satisfactory and the delay of delivery is usually very long than mule-saving-source protocol. This protocol works in a simple and single module i.e picking up the data from the sensor nodes and delivering it directly to the basestation or the sink. The main advantage of the protocol is DD protocol guarantees the complete preservation[10] of the location privacy of data source, however the disadvantage is the high delay[10], as compared to MSS protocol. According to the attack models[10] we have discussed in this paper, the traffic in the network can be used to detect the source node, however with direct delivery protocol the data is carried by the data mules and their path are random, and they collect data from the source and deliver it to the sink when in range. This protocol guarantees complete security because traffic analysis[10] cannot be performed over the network when data mules carry the data from the source to the sink. In direct delivery protocol, the performance of the protocol can be improved with the improvement in mobility pattern algorithm used for each data mule. The path vector can be altered or improved by considering the following factors: (1) Path selection: which trajectory the data mule follows
  • 17. 17 (2) Speed control: how the data mule changes the speed while moving along the path (3) Job scheduling: from which sensor the data mule collects data at each time point Path selection is to determine the trajectory of the data mule in the sensor field. To collect data from each particular sensor, the data mule needs to go in the sensor’s communication range at least once. Speed control is to determine how the data mule changes its speed along the chosen path. The data mule needs to change the speed so that it stays within each sensor’s communication range long enough to collect all the data from it. Job scheduling is done once the time-speed profile is deter- mined, we get a mapping from each location to a time point. Thus we get a scheduling problem by regarding data collection from each sensor as a job. Each job has one or more intervals in which it can be executed. Job scheduling is to determine the allocation of time to jobs so that all jobs can be completed. However, there is a tradeoff between source privacy and time delay for data transmission from source to the basestation or the sink. When privacy of source location is the primary objective we need to deploy direct delivery protocol considering no constraint on time delay of data delivery, in other cases, mule-saving-source (MSS) protocol delivers data with better efficiency than the direct delivery protocol.
  • 18. 18 10. Proposed Model : Modified-Direct-Delivery (MDD) Protocol The proposed solution for the source location privacy has the following elements, properties and terminologies: I. Sensor Field: Sensor field is a square block with dimension of 400m x 400m. This area is the working field of sensors and the mules in the simulation. II. Sensors: Sensors are homogeneous with the same lifetime and capabilities of storage, processing as well as communication. They are deployed uniformly at random in the cells, and assumed to guarantee the connectivity of the network. III. Zones: Sensor field is divided into zones, each zone contain different number of sensors and data mules. These zones play a major role in fast delivery of data in the proposed protocol. IV. Data Mules: Data mules are the mobile agents which can be artificially introduced in the network. In this protocol, they move independently and do communicate with each other by establishing an ad-hoc network when two mules are in transmission range. They communicate to deliver data. They are assumed to know their own locations when they are moving all the time. Their mobility pattern can be modeled as a random walk on the grid. They may be equipped with GPS facility so that they can calculate the relative location over the sensor field. V. Base Station: Base Station or the sink is the central repository of the data transmitted by source in the sensor field. The data collected by the data mules is delivered to base station, which is then organized and analyzed for fruitful results. VI. Active Sensors or Source Sensors: In a simulating environment, every sensor in the field need not transmit data; sensors are chosen randomly that have data and they
  • 19. 19 needed to transmit it to the data mules. Such sensors are active sensors. They are ready to transmit and can sense the presence of data mule. VII. Ad-hoc Networks: These networks are established when two data mules either from same zone or different are in transmission range. This network is used to transmit the collected data from one zone to other and subsequently to the zone with basestation. 10.1. Working of MDD Protocol To ensure source location privacy and ensure it with better performance i.e. with minimum time delay we have designed the protocol assuming all sensor nodes deployed have same energy and the load over the data mule is balanced. In this protocol we have used a major part of direct- delivery (DD) protocol, the data from the source node is delivered directly to the basestation but the technique and process of delivery of data is improved by introducing zones and ad-hoc network in between the data mules. The inter mule communication improves the time delay in data delivery while the direct delivery of data from source to the sink is guaranteed. The working of MDD protocol starts with an active node or source node that have some data that it sensed based on the type of sensor; it may be temperature sensing, motion sensing, heat sensing or any other sense property. In this protocol we have three types of static sensors based on their state: I. OFF Sensors: These are the sensors that are in a state in which their radio are in OFF_STATE; they cannot sense process or transmit data in this state. II. SLEEP Sensors: Sensors have a lot of energy consumption while they are sensing, processing or transmitting. To reduce the frequent use of energy, when no event is
  • 20. 20 scheduled; the sensors fall into sleep state for some time and wake up immediately when event get scheduled. This saves energy. III. ACTIVE Sensors: Sensors that are ready to sense or have sensed and need to transmit data to the mules are in ACTIVE state. These sensor nodes are considered as source nodes and their location is need to preserved. However the sensors are deployed in a field that is further divided into zones. The data mules present in zone can collect data from the same zone only. The data mule collects data from active sensors and the data is retransmitted to the other data mule through ad-hoc networks established when these agents are in transmission range of each other. The data transmission between the mules carry data from one zone to other as data transmission takes place with the mule from other zone closer to the base station. This process has a major impact over the reduction in time delay of data transmission. This time delay can be further reduced by introducing path vector algorithms that improve efficiency of data transmission by altering the parameter and properties of the data mule. The efficiency is improved by following factors: (1) Path selection[12]: which trajectory the data mule follows (2) Speed control[12]: how the data mule changes the speed while moving along the path (3) Job scheduling[12]: from which sensor the data mule collects data at each time point Path selection is to determine the trajectory of the data mule in the sensor field. To collect data from each particular sensor, the data mule needs to go in the sensor’s communication range at least once.
  • 21. 21 Speed control is to determine how the data mule changes its speed along the chosen path. The data mule needs to change the speed so that it stays within each sensor’s communication range long enough to collect all the data from it. Job scheduling is done once the time-speed profile is deter- mined, we get a mapping from each location to a time point. Thus we get a scheduling problem by regarding data collection from each sensor as a job. Each job has one or more intervals in which it can be executed. Job scheduling[12] is to determine the allocation of time to jobs so that all jobs can be completed. The intercommunication between data mules is continued till the data is received by the mule in zone containing the sink or basestation. The mule in this zone carries the data to the base station which is then delivered and used for analysis purpose.
  • 22. 22 11. Experiments and Results Modified-Direct-Delivery protocol is simulated and the results are obtained for analysis and comparison purpose. The simulator used for the experiment purpose is OMNeT++. OMNeT++ is a very efficient and powerful wireless sensor network simulator. OMNeT++ is an object-oriented modular discrete event network simulation framework. It has a generic architecture, so it can be (and has been) used in various problem domains:  Modeling of wired and wireless communication networks  protocol modeling  modeling of queuing networks  modeling of multiprocessors and other distributed hardware systems  validating of hardware architectures  evaluating performance aspects of complex software systems  in general, modeling and simulation of any system where the discrete event approach is suitable, and can be conveniently mapped into entities communicating by exchanging messages. OMNeT++[13] itself is not a simulator of anything concrete, but rather provides infrastructure and tools for writing simulations. One of the fundamental ingredients of this infrastructure is component architecture for simulation models. Models are assembled from reusable components termed modules. Modules can be connected with each other via gates (other systems would call them ports), and combined to form compound modules. The depth of module nesting is not limited. Modules communicate through message passing, where messages may carry arbitrary data structures. Modules can pass messages along predefined paths via gates and connections, or directly to their destination. OMNeT++ [13]also supports parallel distributed simulation. OMNeT++ can use several mechanisms for communication between partitions of a parallel distributed simulation, for example MPI or named pipes. The parallel simulation algorithm can easily be extended, or new ones can be plugged in. Models do not need any special instrumentation to be run in parallel – it
  • 23. 23 is just a matter of configuration. OMNeT++ can even be used for classroom presentation of parallel simulation algorithms, because simulations can be run in parallel even under the GUI that provides detailed feedback on what is going on. The OMNeT++ simulation IDE[13] is based on the Eclipse platform and extends it with new editors, views, wizards, and other functionality. OMNeT++ adds functionality for creating and configuring models (NED[13] and INI[13] files), performing batch executions and analyzing the simulation results, while Eclipse provides C++ editing, SVN/GIT[13] integration and other optional features (UML modeling, bug-tracker integration, database access, etc.) via various open-source and commercial plug-in. The environment will be instantly recognizable to those at home with the Eclipse platform. 11.1. Proposed Simulation Model The proposed simulation model for analyzing the proposed modified-direct-delivery protocol we have designed an event based simulation. We are especially interested in large-scale sensor networks where there is a reasonably large separation between the source and the sink. The main area of interest is the time delay in the delivery of the data from the source to the sink. From the results obtained in the simulation i.e. the time between the creation of a message from a source to the time of delivery to the sink is calculated. In this model, the sensor field is divided into four different zones identified by four different colors. The number of data mules deployed in each zone is based on the total number of sensor nodes deployed in a zone i.e. Number of Data Mules in a zone α Number of Sensor Nodes Every sensor node has different states; to describe state of every sensor in the simulation different colors are used. I. Off State : Grey II. Sleep State : Black III. Active State : Red
  • 24. 24 Sleep time and Idle time are defined accordingly where Sleep time is the maximum time limit when the sensor can go offline and the Idle time is the time limit taken by the sensor before entering into the sleep time. To record the events generated through the simulation process “record-eventlog = true[13]” is set. Messages are created in forms of packets. Packet created by each sensor is forwarded accordingly to mules which this then forwarded to other mules and finally to the basestation. TransferMsg is the packet that contain numRecData that contain the timestamp of creation of the packet by each sensor and then it is recorded throughout the mobility. Following are the specification used in the simulation model for MDD protocol: I. Sensor field dimension: 400m x 400m. II. Number of Sensors used: Variable (50-300). III. Number of Data Mules used: 8 IV. Range of each Data Mule: 50m V. Simulation Time Limit: 200 sec VI. CPU Time Limit: 1000 sec VII. Sleep Time of Sensor Nodes: 120sec VIII. Idle Time of Sensor Nodes :30sec
  • 25. 25 A Sensor Field with Data Mules, Sensors, Zones, Basestation Creation of ad-hoc connection and transmission of data from one zone to other
  • 26. 26 Result obtained in the event log is displayed as in the figure below. Every sensor node transmit some data in form of packets which is finally received by the basestation Average Packet Transfer Delay is the average of source delay and carrier delay. Source delay is the time between the creation of the packet and the time at which the packet is delivered to the data mule in range. Carrier delay is the time between the time of packet received by the mule and the time at which packet is received at the base station. Average Packet Delay = Source Delay + Carrier Delay Event log on completion of method - finish()
  • 27. 27 11.2. Results: Number of Sensors in the simulation = 50 Number of Active Sensors = 29 Sensor ID [50] Time delay 9 0.371403 12 0.69743 14 52.3333 16 53.1111 20 0.314237 21 0.601479 25 0.297465 26 31 27 0.576412 28 0.866664 30 31 31 26.7775 33 12.981344 35 0.898583 38 0.650935 41 0.324784 Sum 212.802636 Average 13.30016475 Active Sensors 29 Number of Sensors in the Simulation = 100 Number of Active Sensors = 59 Sensor ID[100] Time Delay 11 0.44108 12 0.190687 14 13.3705 15 12.8797 20 0.206121 21 0.915134 22 0.604211 23 0.5144 0 10 20 30 40 50 60 9 14 20 25 27 30 33 38 Average Time delay Time delay
  • 28. 28 24 0.0952684 25 13.6327 26 14.7245 29 0.724588 30 0.747607 31 0.480331 32 18.45653 33 0.448478 34 33.7823 35 0.0483317 36 0.892575 43 0.759089 43 37.0345 43 18.9901 44 21.9895 45 0.248859 46 0.972774 52 0.13836 53 35.6679 54 0.0662034 55 0.442271 56 51.9416 61 0.978298 63 0.513878 64 54.4541 65 36.7167 74 0.308547 75 0.20511 76 2.1762 84 0.303599 85 0.310919 86 0.59431 95 0.254127 96 0.479442 Sum 378.7014285 Average 9.016700679 Active Sensors 59 0 20 40 60 80 11 14 20 22 24 26 30 32 34 36 43 44 46 53 55 61 64 74 76 85 95 Average Time Delay Time Delay
  • 29. 29 Number of Sensors in the Simulation = 150 Number of Active Sensors = 92 Sensor ID [150] Time Delay 14 0.81875 20 0.423232 21 0.746915 22 0.144944 23 26.8929 24 0.710244 25 0.334637 31 0.459475 32 0.584495 33 10.4623 34 24.8694 35 13.65949 36 12.86319 41 0.44637 42 0.930044 43 14.4535 44 0.472867 45 6.59396 46 0.556379 52 12.1956 53 0.660337 54 0.972362 55 0.278245 56 0.430616 61 0.493681 62 1.55513 63 46.6049 64 0.597943 65 0.552439 66 0.984333 71 62 72 0.522178 73 0.993358 74 83.7282 75 0.576774 76 0.174956 80 0.723687 82 0.239248 0 50 100 14 21 23 25 32 34 36 42 44 46 53 55 61 63 65 71 73 75 80 83 93 114 116 125 135 Avg Time Delay Time Delay Time Delay
  • 30. 30 83 0.264427 84 18.951 93 5.46409 105 43.5938 114 0.896177 115 0.534452 116 9.344324 121 3.132454 125 4.422342 126 0.00641925 135 0.345644 136 5.4232342 Avg. Time Delay 8.461708849 Active Sensors 92 Number of Sensors in the Simulation = 200 Number of Active Sensors = 140 Sensor ID [200] Time Delay 16 0.736903 17 0.196749 18 24.6814 19 0.42355 20 0.345234 22 0.45345324 27 0.2345223 28 0.457654 29 20.8814 30 52.4855 31 0.891192 32 0.610015 33 4.22606 34 3.435463 35 1.43534 39 0.546675 40 0.96785 41 0.756757 42 0.724689 43 20.8976 44 47.0378 45 2.2346712
  • 31. 31 46 53.8947 47 2.51829 49 0.58753 53 0.9422347 54 0.72842 55 1.823585 56 4.9185 57 0.132662 58 51.7726 59 8.19248 60 0.346248 61 0.974222 62 65.5214 65 0.927264 66 0.729562 68 0.8462841 69 0.200878 70 0.411577 71 53.4185 72 0.331979 73 0.522826 74 0.223097 75 40.0565 79 25.54924 80 0.4095 82 2.5984 84 0.769848 85 0.740943 86 0.571967 87 0.613141 88 60.8519 89 0.258981 90 0.21825 94 0.83465 97 0.883426 98 0.438728 99 0.694709 100 6.98392 101 0.76734 103 12.9582 104 6.23746 109 8.34872 110 2.87438 0 50 100 150 16 18 20 27 29 31 33 35 40 42 44 46 49 54 56 58 60 62 66 69 71 73 75 80 84 86 88 90 97 99 101 104 110 115 117 128 130 137 141 143 153 174 Avg Time Delay Time Delay Time Delay
  • 32. 32 114 0.131903 115 9.2938 116 0.101484 117 23.0955 125 0.235982 128 0.45735 129 0.925274 130 0.247636 133 0.83748234 137 3.4759231 140 0.892347 141 0.3487238 142 0.8748123 143 0.7734872 144 0.873453 153 3.4298351 155 0.95892341 174 31 186 0.353487 Sum 686.5929228 Avg Time Delay 8.173725271 Active Sensors 140 Number of Sensors in the Simulation = 300 Number of Active Sensors = 188 Sensor ID [200] Time Delay 6 0.854366 7 1.88643 11 0.844316 14 0.736903 15 0.543435 16 32.67454 17 0.42355 20 0.345234 21 0.733287 23 0.228765 24 0.643254 25 2.658814 27 5.764543 31 0.891192 32 1.6663243
  • 33. 33 33 24.22606 34 33.435463 35 1.43534 38 0.546675 39 0.96785 40 0.756757 41 0.567753 42 19.433786 44 45.96336 45 2.2346712 46 50.59347 47 2.51829 49 0.58753 53 0.763443 54 0.72842 55 1.0966543 56 4.877655 57 19.68678 58 23.9756477 59 8.19248 60 0.346248 61 0.974222 62 36.85521 65 0.927264 66 0.729562 67 0.8462841 68 0.200878 70 0.411577 71 53.4185 73 0.331979 74 0.522826 76 0.88601 77 16.833878 78 22.54924 79 0.7331 80 27.8333687 83 2.00135 84 0.740943 86 0.571967 87 0.613141 88 60.8519 89 0.258981 90 0.21825 0 20 40 60 80 6 14 17 23 27 33 38 41 45 49 55 58 61 66 70 74 78 83 87 90 93 101 109 115 120 123 130 136 139 145 150 160 167 171 174 199 219 234 249 254 269 298 Time Delay Time Delay
  • 34. 34 91 0.83465 92 0.883426 93 0.438728 94 0.694709 99 6.8647 101 0.46431022 103 13.88542 104 16.2446 109 8.34872 110 2.87438 114 0.131903 115 29.2938 116 0.101484 117 23.0955 120 0.235982 121 0.45735 122 0.925274 123 0.247636 125 0.83748234 127 45 130 0.892347 131 0.3487238 135 0.8748123 136 0.7734872 137 0.873453 138 3.4298351 139 0.95892341 140 31 142 0.353487 145 7.59292279 146 16.62571583 148 12.883643 150 0.87346 155 0.6153332 157 0.773624 160 18.66496 161 22.009465 166 12.83465 167 0.48573 168 0.874754 170 20.736543 171 0.28929847 172 1.3765321
  • 35. 35 173 31 174 12.67527643 180 0.389463 192 0.98901 199 0.0347238 200 0.0874823 213 1.985793 219 1.84793 220 29.985794 229 2.9849 234 19.8465982 247 34.9934652 248 0.87642 249 0.7652734 250 0.99764852 252 0.50047332 254 0.87346549 260 0.46287475 261 0.92464875 269 8.7648583 270 0.747457683 278 0.48935752 298 1.3487572 Sum 984.7131429 Avg Time Delay 7.941235024 Active Sensors 188
  • 36. 36 11.3. Average time delay of Modified-Direct-Delivery Protocol: No of Sensors Average Time Delay 50 13.30016475 100 9.0167003 150 8.4617088 200 8.173725 300 7.941235024 Average Time Delay of Modified-Direct-Delivery Protocol: 9.378706775 12. Comparison with Direct Delivery Protocol Direct Delivery Protocol delivers packets directly to the basestation, so in this type of delivery data mule have to carry data for a long time all through the path way till basestation is in range of the mule containing the data. In this protocol, the probability of collision or carrying data from same sensor node is more thus reducing the efficiency. Certain improvements in this protocol with a better path selection and speed control with inter mule communication brings out a lot of improvements in the average time delay of the protocol. When two mules are interconnected they transmit the data as well in case of duplicate values of packet id, collision is avoided. This reduces the probability of collision and thus improving the efficiency of the protocol. Also, mule need not travel all through the path to the basestation for transmission. Zones in the sensor field is a major improvement in the protocol and using zones 0 100 200 300 400 1 2 3 4 5 Average Time Delay No of Sensors
  • 37. 37 maximum number of sensor nodes can be covered in much smaller time thus reducing the source delay. MDD Protocol have following improvements over Direct Delivery Protocol: I. Introduction of zones: Mules can cover maximum number of nodes in small amount of time; reducing source delay II. Inter mule communication: Mules in MDD protocol create ad-hoc networks when in range, this assures faster delivery of data in small time; reducing carrier delay. 12.1. Result analysis of DD and MDD Protocol With the result analysis above, we can conclude that for every simulation with varying number of sensor nodes MDD protocol gives a better and efficient result in delivery of data with reduced time delay in every case scenario. 23.923628 16.893394 14.008463 13.944558 10.788331 15.9116748 13.30016475 9.0167003 8.4617088 8.173725 7.941235024 9.378706775 50 100 150 200 300 Avg. Time Delay of DD Comparision of DD and MDD Protocol ATD (MDD-Protocol) ATD (DD-Protocol)
  • 38. 38 12.2. Advantages of MDD protocol 1. Low source delay and carrier delay in delivery of data. 2. Guarantees full security of source location. 3. Reduces probability of collision of data at basestation. 4. In case of collision, the redundancy is removed at real time, hence reduces load on modules 5. Independent of transmission trough sensors, so eavesdrop attack model is inefficient. Network traffic analysis is inefficient attack model. 6. Energy efficient protocol, sensor need not transmit to a long distance(1kb for every 331 feet). 7. Localization efficient, mules are equipped with GPS facility reducing localization issues. 12.3. Limitations of MDD protocol 1. Efficiency is dependent on mobility pattern of data mule. Path Selection and speed control algorithms improves efficiency. 2. Mules need high data storage and processing power for data storage and collision control. 3. Dependent on network configuration, sensor deployment, zones and mobility pattern of mules. 4. No intelligent selection of mobility pattern in data mules. 5. Mules assisted with GPS and other infrastructure increases cost.
  • 39. 39 13. References 01 N. Li, M. Raj, D. Liu, M. Wright, and S. K. Das, “Using data mules to preserve source location privacy in wireless sensor networks,” at 13th International Conference on Distributed Computing and Networking (ICDCN ’12), vol. 7129 of Lecture Notes in Computer Science, p. 309, 324, Hong Kong, China, 2012. 02 Y. Fan, Y. Jiang, H. Zhu, and X. Shen, “An efficient privacy-preserving scheme against traffic analysis attacks in network coding,” in Proceedings of the 28th Conference on Computer Communications (IEEE INFOCOM '09), pp. 2213–2221, April 2009. View at Publisher · View at Google Scholar · 03 R. Lu, X. Lin, H. Zhu, and X. Shen, “TESP2: timed efficient source privacy preservation scheme for wireless sensor networks,” in Proceedings of the IEEE International Conference on Communications (ICC '10), May 2010. View at Publisher · View at Google Scholar · View at Scopus 04 K. Mehta, D. Liu, and M. Wright, “Protecting location privacy in sensor networks against a global eavesdropper,” IEEE Transactions on Mobile Computing, vol. 11, no. 2, pp. 320–336, 2012. View at Publisher · View at Google Scholar · View at Scopus 05 B. Alomair, A. Clark, J. Cuellar, and R. Poovendran, “Statistical framework for source anonymity in sensor networks,” in Proceedings of the 53rd IEEE Global Communications Conference (GLOBECOM '10), December 2010. View at Publisher · View at Google Scholar · View at Scopus 06 K. Bicakci, H. Gultekin, B. Tavli, and I. E. Bagci, “Maximizing lifetime of event-unobservable wireless sensor networks,” Computer Standards and Interfaces, vol. 33, no. 4, pp. 401–410, 2011. View at Publisher · View at Google Scholar · View at Scopus 07 X. Hong, P. Wang, J. Kong, Q. Zheng, and J. Liu, “Effective probabilistic approach protecting sensor traffics,” in Proceedings of the Military Communications Conference (MILCOM '05), vol. 1, pp. 169– 175, October 2005. View at Publisher · View at Google Scholar · View at Scopus 08 Z. Zhou and K. C. Yow, “Anonymizing geographic Ad Hoc routing for preserving location privacy,”International Journal of Network Security, vol. 2, no. 3, pp. 210–218, 2006.
  • 40. 40 09 Li, Y., Ren, J.: Source-location privacy through dynamic routing in wireless sensor networks. In: Proceedings of INFOCOM (2010) 10 Ozturk, C., Zhang, Y., Trappe, W.: Source-location privacy in energy constrained sensor network routing. In: Proceedings. 2nd ACM workshop on Security of ad hoc and sensor networks, SASN (2004). 11 Mayank Raja, Na Lia, Donggang Liub, Matthew Wrightb, Sajal K. Das : Using Data Mules to Preserve Source Location Privacy in Wireless Sensor Networks (CReWMaN),The Information Security Lab (iSec) 12 Ryo Sugihara and Rajesh K. Gupta. University of California, San Diego: Path Planning of Data Mules in Sensor Networks. In: ACM Journal Name, Vol. V, No. N, Month 20YY. 13 Manual- OMNeT++