To read this content please select one of the options below:

Source location privacy preservation in IoT-enabled event-driven WSNs

Nidhi Sharma (Department of Computer Science and Engineering, Jaypee University of Information Technology, Solan, India)
Ravindara Bhatt (Department of Computer Science and Engineering, Jaypee University of Information Technology, Solan, India)

International Journal of Pervasive Computing and Communications

ISSN: 1742-7371

Article publication date: 10 October 2022

Issue publication date: 16 November 2023

51

Abstract

Purpose

Privacy preservation is a significant concern in Internet of Things (IoT)-enabled event-driven wireless sensor networks (WSNs). Low energy utilization in the event-driven system is essential if events do not happen. When events occur, IoT-enabled sensor network is required to deal with enormous traffic from the concentration of demand data delivery. This paper aims to explore an effective framework for safeguarding privacy at source in event-driven WSNs.

Design/methodology/approach

This paper discusses three algorithms in IoT-enabled event-driven WSNs: source location privacy for event detection (SLP_ED), chessboard alteration pattern (SLP_ED_CBA) and grid-based source location privacy (GB_SLP). Performance evaluation is done using simulation results and security analysis of the proposed scheme.

Findings

The sensors observe bound events or sensitive items within the network area in the field of interest. The open wireless channel lets an opponent search traffic designs, trace back and reach the start node or the event-detecting node. SLP_ED and SLP_ED_CBA provide better safety level results than dynamic shortest path scheme and energy-efficient source location privacy protection schemes. This paper discusses security analysis for the GB_SLP. Comparative analysis shows that the proposed scheme is more efficient on safety level than existing techniques.

Originality/value

The authors develop the privacy protection scheme in IoT-enabled event-driven WSNs. There are two categories of occurrences: nominal events and critical events. The choice of the route from source to sink relies on the two types of events: nominal or critical; the privacy level required for an event; and the energy consumption needed for the event. In addition, phantom node selection scheme is designed for source location privacy.

Keywords

Citation

Sharma, N. and Bhatt, R. (2023), "Source location privacy preservation in IoT-enabled event-driven WSNs", International Journal of Pervasive Computing and Communications, Vol. 19 No. 5, pp. 782-798. https://doi.org/10.1108/IJPCC-05-2022-0214

Publisher

:

Emerald Publishing Limited

Copyright © 2022, Emerald Publishing Limited

Related articles