Content area
Full text
(ProQuest: ... denotes non-US-ASCII text omitted.)
Academic Editor:Zujun Hou
School of Information Science and Engineering, Northeastern University, Shenyang 110004, China
Received 28 September 2013; Revised 10 February 2014; Accepted 15 July 2014; 13 August 2014
This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
1. Introduction
A wireless sensor network (WSN) typically consists of a large number of nodes which integrate sensor modules, processing modules, wireless communication modules, and energy modules to sense physical or environmental conditions and collect data. WSNs have promising application prospects in both military and civil domains, such as military surveillance, wildlife habitat monitoring, target tracking, and home automation [1-3]. Compared with traditional networks and ad hoc networks, WSNs have several typical characteristics, such as restricted-resource, no infrastructure, and large number of nodes. These characteristics lead to more challenges in the research of security problems in WSNs [4, 5].
Many works to date in WSN security have focused on providing authentication, confidentiality, integrity, and freshness services. However, for some special applications, it is not enough to provide those security services solely. For example, in the panda-hunter scenario [6], called panda-hunter game model (PHGM), a WSN is deployed to track endangered giant pandas in a vast panda habitat. Each panda carries an electronic tag, called tag-node in this paper, to emit event-trigger-signals, which can be detected by sensors. When a sensor node, called reporter source, detects this signal, it generates an event report and then sends it to a sink node with the help of a security route mechanism. An adversary (the hunter) may locate the monitored pandas, called data sources in this paper, either by detecting the event-trigger-signals or via eavesdropping on the communication between the reporter sources and the sink nodes. Therefore, it is very important to provide the data source location privacy (DSLP) service for this kind of applications.
At present, many efforts have been done to protect the DSLP in WSNs [7, 8]. However, most of them are effective only for local adversaries who merely monitor the local network traffic. For a global adversary, who can monitor the whole network traffic, these approaches would not work. Recently,...