Computer Science and Information Systems 2022 Volume 19, Issue 2, Pages: 857-886
https://doi.org/10.2298/CSIS211009007R
Full text ( 1547 KB)
Cited by


Recent advancements in privacy-aware protocols of source location privacy in wireless sensor networks: A survey

Roy Pradeep Kumar (Department of Computer Science and Engineering Indian Institute of Information Technology, Surat, India), pradeep.roy@iiitsurat.ac.in
Tripathy Asis Kumar (School of Information Technology and Engineering Vellore Institute of Technology, Vellore, Tamil Nadu, India), asistripathy@gmail.com
Singh Sunil Kumar (School of Computer Science and Engineering VIT-AP University, Near Vijaywada, Andhra Pradesh, India), sksingh.cse@gmail.com
Li Kuan-Ching (Department of Computer Science and Information Engineering (CSIE), Providence University, Taiwan), kuancli@gm.pu.edu.tw

This review article summarises the protocols proposed in recent researches to secure location information in Wireless Sensor Networks (WSNs). Due to their lightweightness and easy to deploy properties, WSNs are widely used in numerous object tracking and monitoring applications. Due to such, source location privacy attracts the researchers and hence continuously enhances its improvement. Though, this privacy breach is not acceptable for WSNs, as it may reveal some critical information that is harmful. The SLP issue on WSN attracted researchers a lot, and hence a number of solutions are provided for it. However, an up-to-date survey does not exist for the same. To fill this gap, in this article, we summarize different approaches proposed in the last years to preserve location privacy. We first discuss the different privacy characteristics in WSNs, a detailed overview of the proposed protocols and their limitations, and discussions of solutions for the adversaries’ capabilities in WSNs. Then the future research directions in this area are discussed. This review work may support researchers identifying the new research area in location privacy of wireless sensor networks.

Keywords: Wireless sensor networks, Source location privacy, Fake source, Phantom routing, Security


Show references