A Novel Secret Location Sharing Scheme for the Wireless Sensor Network

Main Article Content

Monjul Saikia

Abstract

The wireless sensor network is a collection of sensor nodes that operate collectively to gather sensitive data from a target area. During the process of data collection, the location of sensor nodes from which data is originated is important when making decisions at the base station. Location, i.e., the coordinates of a sensor node, need to be shared among other nodes in various circumstances such as the key distribution phase, during the routing of packets, etc. Since the location of every sensor node must be kept secret, a scheme that facilitates secure location sharing among sensor nodes is crucial. In this paper, we propose a novel, secure, and robust mechanism for location sharing using a two-threshold scheme. The implementation process of the proposed model is shown here along with results and analysis.

Article Details

How to Cite
Saikia, M. (2021). A Novel Secret Location Sharing Scheme for the Wireless Sensor Network. ECTI Transactions on Electrical Engineering, Electronics, and Communications, 19(3), 331–339. https://doi.org/10.37936/ecti-eec.2021193.244940
Section
Publish Article

References

R. Schlegel, C. Chow, Q. Huang, and D. S. Wong, “Privacy-Preserving Location Sharing Services for Social Networks,” IEEE Transactions on Services Computing, vol. 10, no. 5, pp. 811–825, Sep.-Oct. 2017.

M. F. Mokbel, C.-Y. Chow, and W. G. Aref, “The new Casper: query processing for location services without compromising privacy,” in Proceedings of the 32nd international conference on Very large data bases (VLDB ’06), Seoul, Korea, 2006, pp. 763–774.

L. Šikšnys, J. R. Thomsen, S. Šaltenis, M. L. Yiu, and O. Andersen, “A Location Privacy Aware Friend Locator,” in Advances in Spatial and Temporal Databases. SSTD 2009 (Lecture Notes in Computer Science, vol. 5644), N. Mamoulis, T. Seidl, T. B. Pedersen, K. Torp, and I. Assent, Eds. Berlin, Germany: Springer, 2009, pp. 405–410.

P. Enge and P. Misra, “Special Issue on Global Positioning System,” Proceedings of the IEEE, vol. 87, no. 1, pp. 3–15, Jan. 1999.

Y. C. Tseng, S. P. Kuo, H. W. Lee, and C. F. Huang, “Location Tracking in a Wireless Sensor Network by Mobile Agents and Its Data Fusion Strategies,” in Information Processing in Sensor Networks. IPSN 2003 (Lecture Notes in Computer Science, vol. 2634), F. Zhao and L. Guibas, Eds. Berlin, Germany: Springer, 2003, pp. 625–641.

C. Savarese, J. M. Rabaey, and J. Beutel, “Location in distributed ad-hoc wireless sensor networks,” in 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP’01), vol. 4, 2001, pp. 2037–2040.

C. Savarese, J. Rabaey, and K. Langendoen, “Robust Positioning Algorithms for Distributed Ad-Hoc Wireless Sensor Networks,” in Proceedings of the General Track of the Annual Conference on USENIX Annual Technical Conference (ATEC ’02), Monterey, CA, USA, 2002, pp. 317–327.

N. Patwari, J. N. Ash, S. Kyperountas, A. O. Hero, R. L. Moses, and N. S. Correal, “Locating the nodes: cooperative localization in wireless sensor networks,” IEEE Signal Processing Magazine, vol. 22, no. 4, pp. 54-69, Jul. 2005.

G. Mao, B. Fidan, and B. D. O. Anderson, “Wireless sensor network localization techniques,” Computer Networks, vol. 51, no. 10, pp. 2529–2553, Jul. 2007.

A. Perrig, J. Stankovic, and D.Wagner,“Security in wireless sensor networks,” Communications of the ACM, vol. 47, no. 6, pp. 53–57, Jun. 2004.

Y. Zhang, W. Liu, and Y. Fang, “Secure localization in wireless sensor networks,” in MILCOM 2005 - 2005 IEEE Military Communications Conference, vol. 5, 2005, pp. 3169–3175.

C. Ozturk, Y. Zhang, and W. Trappe, “Sourcelocation privacy in energy-constrained sensor network routing,” in Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN ’04), Washington DC, USA, 2004, pp. 88–93.

E. Shi and A. Perrig, “Designing secure sensor networks,” IEEE Wireless Communications, vol. 11, no. 6, pp. 38–43, Dec. 2004.

Z. Li, W. Trappe, Y. Zhang, and B. Nath, “Robust statistical methods for securing wireless localization in sensor networks,” in Fourth International Symposium on Information Processing in Sensor Networks (IPSN 2005), 2005, pp. 91–98.

A. Y. Teymorian, W. Cheng, L. Ma, X. Cheng, X. Lu, and Z. Lu, “3D Underwater Sensor Network Localization,” IEEE Transactions on Mobile Computing, vol. 8, no. 12, pp. 1610–1621, Dec. 2009.

A. Beutelspacher and U. Rosenbaum, Projective Geometry: From Foundations to Applications. Cambridge, U.K.: Cambridge University Press, 1998.

G. R. Blakley, “Safeguarding cryptographic keys,” in 1979 International Workshop on Managing Requirements Knowledge (MARK), 1979, pp. 313–318.

A. Shamir, “How to share a secret,” Communications of the ACM, vol. 22, no. 1, pp. 612–613, Nov. 1979.