Preserving Source Location Privacy for Energy Harvesting WSNs
Abstract
:1. Introduction
- (1)
- The proposed privacy-preserving scheme is equipped with a strong privacy preserving ability and remarkable resistance to global attacks. In this paper, we propose a redundancy branch convergence-based preserved source location privacy (RBCPSLP) scheme for EHWSNs. In the RBCPSLP scheme, data generation is not mainly triggered by an event, but by the amount of remaining energy. On the whole, when each node sends data it is an independent event, without any regularity. Even if armed with a global view, an adversary cannot determine where the true event source is, since most of the generated event sources are fake ones, thus we do not mention the case of an adversary with a local view.
- (2)
- The proposed privacy-preserving scheme enables the network to achieve high lifetime performance. In WSNs, the sensor nodes near the sink consume a great deal of energy and may die early, thus resulting in the energy hole phenomenon [2,5,23], whereas the sensor nodes far from the sink consume relatively less energy and have surplus energy. As indicated in some studies, up to 90% of the energy can remain unused when a network dies due to the impact of energy holes. Based on the above observations, therefore, we propose a novel redundancy branch convergence-based preserved source location privacy (RBCPSLP) scheme. Unlike existing privacy-preserving schemes, the data generated from each event source (including true event sources and fake ones) in the proposed RBCPSLP scheme is not independently transmitted to the sink. Instead, the data in route to the sink converge onto a single or a few routes. In contrast to the existing privacy preserving schemes in which each fake route transmits data to the sink independently, the RBCPSLP scheme reduces the energy consumption in hotspot areas significantly, and thus enhances the network lifetime.
2. Related Work
- (1)
- Data flooding schemes. These have the following characteristics: regardless of whether an event occurs or not, each node generates data periodically or fills packets with useless data, and then transmits data packets with the same length to the sink using the same routing strategy. In such a scheme [34], the adversary cannot determine the location of the true event source since there is no distinction between all the nodes from the perspective of an adversary, thus the privacy of the source location is well preserved. This privacy-preserving scheme can not only be applied to planar networks [25,28], but also to cluster routing networks [29]. However, the disadvantage of this flooding scheme lies in the fact a huge burden is imposed on the system and this reduces the network lifetime if all the sensor nodes generate data, regardless of whether the event occurs or not. An alternative scheme employing the random selection of sensor nodes for data transmission was then proposed in [46] to alleviate the problem. On the whole, however, the schemes in this category are hard to apply in practical applications due to their large negative influence on the network lifetime.
- (2)
- Phantom routing. Because of the production of a large amount of useless data, flooding privacy-preserving schemes dramatically lower the network lifetime. Thus, some new schemes only allow the event source nodes to generate data, and transmit this data based on a single-path routing scheme to the sink. However, the traditional single-path routing schemes (e.g., shortest path routing, SPR) are vulnerable to attacks using backtracking to trace the location of source nodes. Thus, some improved routing schemes are proposed for the privacy-preserving single-path routing. One such important scheme is the phantom routing scheme proposed by Kamat et al. in [30], which consists of two stages: (1) a data packet goes through -hops to a phantom source node; (2) the data packet is then transmitted from the phantom source node to the sink via a flooding scheme or shortest path routing. The first stage of the routing process is aimed at generating a phantom source node that is far from the true source node with diverse location possibilities, making it difficult for an adversary to track down to the true source node. The second stage is targeted at the transmission of the data packet to the sink. The advantage of this scheme is that only one routing path need be used to transmit the data to the sink, which can save a great deal of energy compared to the flooding strategy, resulting in a higher network lifetime. In the phantom routing scheme, it is critical to generate phantom nodes that are far away from the source node. The generation of the phantom source node was achieved by random routing in earlier research [20]. Subsequent research found that in the random routing scheme, the phantom nodes actually had less than a /5 distance from the source node after ‑hops. The closer the phantom node is to the source node, the worse its security is.
3. The System Model and Problem Statement
3.1. The Network and Adversary Model
3.1.1. Network Model
- (1)
- The network studied in this paper is a sensor network with a radius . The sensor nodes are evenly distributed in the network. The nodes cannot be moved after their deployment. The density is . Once an event occurs, the nodes near the event will generate the data and transmit data to sink via multi-hop routing [2,8,10,25,28].
- (2)
- (3)
- This paper assumes that the network has the basic security facilities. For example, the secure communication protocol between the nodes has been established, and the communication between nodes uses secure encryption communication. Therefore, all the information in the network is not known to the external environment. The methods for secure encryption and key management are beyond the scope of this paper. For details of these methods, readers are referred to [6,18].
3.1.2. Adversary Model
- (1)
- The adversary has infinite energy, that is to say, the adversary’s energy consumption is not considered [25,28,30]. Also, the adversary’s storage capacity is large enough. Once an adversary detects the presence of a data packet, it can immediately determine the location of the sending node by analysing the strength and direction of the signal. Once the sender’s location is determined, the adversary can move to the sender’s location instantly. Moreover, the adversary will not miss any data packet that is within the adversary’s monitoring range [25,28,30].
- (2)
- The adversary can only perform passive tracking. It can neither interfere with the normal routing functions in the network, nor tamper with the data and damage the sensor devices since such aggressive disruptions are likely to expose the adversary. Therefore, the adversary only performs passive data snooping [25,28,30].
3.2. Energy Consumption Model and Related Definitions
3.3. Problem Statement
- (1)
- The proposed scheme enables good privacy preservation for source nodes. In general studies, the privacy preservation is evaluated according to the number of hops that an adversary needs to backtrack to the source node . refers to the hop counts from node to node . The larger is, the greater the cost is for the adversary to trace the source node. Thus, the objective of the privacy-preserving scheme is expressed as the following Equation (3):
- (2)
- Maximize the network lifetime. The energy of a sensor node in the WSN is very limited. Therefore, the goal of this paper is to maximize the network lifetime. In this paper, the network lifetime refers to the first node death time (FDT). Suppose the energy consumption of a node is . The maximization of the network lifetime is to minimize the energy consumption of the node with the maximum energy consumption:
- (3)
- Maximize the use of energy. That is, take full advantage of the energy collected by the network to create more interferences signal or routing paths to enhance privacy preservation. Numerous studies have pointed out that, in energy harvesting WSNs, the focus of this type of network is not the energy conservation, but how to make full use of the available energy. Ideally, all energy collected in the network are consumed. This is the so-called energy neutrality [50]. The amount of energy collected is dynamic. It is desirable to ensure the battery energy is not watsed (i.e., the energy collection rate is not greater than energy consumption rate when the battery capacity is full). Meanwhile, the remaining energy of the node cannot be less than the lowest threshold. Suppose an energy harvesting period is divided into smaller time slots . denotes the energy consumption in the -th time slot, then the maximization of energy use is expressed by the following Equation (5):To sum up, the goal of this paper is expressed as follows:
4. The Design of the Privacy-Preserving Scheme
4.1. Design of the RBCPSLP Scheme
Algorithm 1. RBCPSLP routing |
Stage 1: get the real hop to Sink for each node 1: Set each node //set its hop count to Sink as 2: Sink sends a broadcast with the value of HotptoSink = 0; //Sink starts to broadcast its hop count to Sink is 0, i.e., 3: For each node which receive broadcast Do 4: If < then 5: ; 6: broadcast with 7: Else 8: waiting 9: End If 10: End For 11: Stage 2 and 3: routing to Sink 12: For each node Do 13: 14: End For 15: For each node // denotes the set of nodes in its one-hop range 16: 17: End For 18: For each node which and 19: For each node which receive broadcast or packet Do 20: If receive packet then 21: select next node using Algorithm 3 22: send packets to 23: Set 24: Broadcast with 25: Else 26: If then 27: ; 28: broadcast with 29: End If 30: End If 31: End For |
4.2. The Time Slot When the Source Data is Generated and Its Generation Method
Algorithm 2. Predict harvested energy and compute |
1: For each Do //predict harvested energy for each slot in the energy harvesting cycle 2: compute using Equation (13) 3: End for 4: compute using Equation (18) //predict harvested energy in + 1 slot at the slot 5: For Do //calculate the difference between the actual value and predicted value for //each slot in (1, + 1). 6: 7: End For 8: 9: For Do //correct the harvested energy from slot + 1 to the end of energy harvesting cycle 10: 11: End For 12: For each node Do 13: = random (1, n) // is the slot when starts to act as data source. 14: = 1 15: Do while ( meets Equation (12) 16: = + 1 17: End Do 18: = − 1 19: End For |
4.3. Slot Competition and Selection of Next Hop
- (1)
- The remaining energy of a node. Obviously, the more the residual energy of the node is, the greater the probability that the node is selected as the next hop is.
- (2)
- The energy harvesting capacity of a node. A node in the sunshine has much greater energy harvesting rate than a node does under the shadow of an object. The node with strong energy harvesting capacity can collect a large amount of energy in a short time, while the node with weak energy harvesting capacity can hardly collect enough energy in a long time. Thus, the node with high energy harvesting rate should be selected as the next-hop node.
- (3)
- Current data processing of a node. In the RBCPSLP scheme, each node in a state cycle selects a period of time to send data packets. Obviously, if there are two nodes with the same residual energy, and one node has completed its data transmission cycle while the other node has not started its data transmission, it is obvious that the node that has completed the data operation has a higher advantage as the next hop node because it does not need to consume energy in data transmission in the subsequent operation.
Algorithm 3. Select optimization next node |
1: For each //for each node in the set of neighbors of node 2: = // denotes the predicted value of node in slot + 1 3: = // is the current energy of node 4: // represents the weighted value of node 5: End For 6: Return the node which with the max value |
4.4. Calculation of the Probability of the Data Generated by Nodes
5. Performance Analysis of RBCPSLP Scheme
5.1. Analysis of Network Lifetime
5.2. Analysis of the Privacy Preserving Capability
5.3. Analysis of Energy Efficiency
5.4. Analysis of Delay
6. Experiments and Performance Analysis
6.1. Comparison of Energy Efficiency
6.2. Security Test
7. Conclusions
Acknowledgments
Author Contributions
Conflicts of Interest
References
- Sarkar, S.; Misra, S. Theoretical modelling of fog computing: A green computing paradigm to support IoT applications. IET Netw. 2016, 5, 23–29. [Google Scholar] [CrossRef]
- Hu, Y.; Dong, M.; Ota, K.; Liu, A.; Guo, M. Mobile Target Detection in Wireless Sensor Networks with Adjustable Sensing Frequency. IEEE Syst. J. 2016, 10, 1160–1171. [Google Scholar] [CrossRef]
- Chen, Z.; Liu, A.; Li, Z.; Choi, Y.-J.; Sekiya, H.; Li, J. Energy-efficient Broadcasting Scheme for Smart Industrial Wireless Sensor Networks. Mob. Inf. Syst. 2017, 2017, 7538190. [Google Scholar] [CrossRef]
- Lu, R.; Lin, X.; Zhu, H.; Liang, X.; Shen, X. BECAN: A bandwidth-efficient cooperative authentication scheme for filtering injected false data in wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 2012, 23, 32–43. [Google Scholar]
- Liu, X.; Liu, A.; Deng, Q.; Liu, H. Large-scale Programing Code Dissemination for Software Defined Wireless Networks. Comput. J. 2017. [Google Scholar] [CrossRef]
- Li, H.; Yang, Y.; Luan, T.H.; Liang, X.; Zhou, L.; Shen, X.S. Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data. IEEE Trans. Dependable Secur. Comput. 2016, 13, 312–325. [Google Scholar] [CrossRef]
- Liu, X.; Dong, M.; Ota, K.; Hung, P.; Liu, A. Service Pricing Decision in Cyber-Physical Systems: Insights from Game Theory. IEEE Trans. Serv. Comput. 2016, 9, 186–198. [Google Scholar] [CrossRef]
- Xu, Y.; Liu, A.; Huang, C. Delay-Aware Program Codes Dissemination Scheme in Internet of Everything. Mob. Inf. Syst. 2016, 2016, 2436074. [Google Scholar] [CrossRef]
- He, S.; Chen, J.; Li, X.; Shen, X.; Sun, Y. Mobility and intruder prior information improving the barrier coverage of sparse sensor networks. IEEE Trans. Mob. Comput. 2014, 13, 1268–1282. [Google Scholar]
- Xu, Q.; Su, Z.; Guo, S. A game theoretical incentive scheme for relay selection services in mobile social networks. IEEE Trans. Veh. Technol. 2016, 65, 6692–6702. [Google Scholar] [CrossRef]
- Su, Z.; Hui, Y.; Guo, S. D2D Based Content Delivery with Parked Vehicles in Vehicular Social Networks. IEEE Wirel. Commun. 2016, 23, 90–95. [Google Scholar] [CrossRef]
- Liu, A.; Zhang, Q.; Li, Z.; Choi, Y.-J.; Li, J.; Komuro, N. A Green and Reliable Communication Modeling for Industrial Internet of Things. Comput. Electr. Eng. 2016. [Google Scholar] [CrossRef]
- Liu, X.; Dong, M.; Ota, K.; Liu, A. Trace malicious source to guarantee cyber security for mass monitor critical infrastructure. J. Comput. Syst. Sci. 2016. [Google Scholar] [CrossRef]
- Peng, S.; Low, C.P. Prediction free energy neutral power management for energy harvesting wireless sensor nodes. Ad Hoc Netw. 2014, 13, 351–367. [Google Scholar] [CrossRef]
- Liu, X.; Liu, A.; Huang, C. Adaptive Information Dissemination Control to Provide Diffdelay for Internet of Things. Sensors 2017, 17, 138. [Google Scholar] [CrossRef] [PubMed]
- Li, T.; Liu, A.; Huang, C. A Similarity Scenario-based Recommendation Model with Small Disturbances for Unknown Items in Social Networks. IEEE Access 2016, 4, 9251–9272. [Google Scholar] [CrossRef]
- Hui, Y.; Su, Z.; Guo, S. Utility Based Data Computing Scheme to Provide Sensing Service in Internet of Things. IEEE Trans. Emerg. Top. Comput. 2017. [Google Scholar] [CrossRef]
- Li, H.; Liu, D.; Dai, Y.; Luan, T.H. Engineering searchable encryption of mobile cloud networks: When QoE meets QoP. IEEE Wirel. Commun. 2015, 22, 74–80. [Google Scholar] [CrossRef]
- He, S.; Shin, D.; Zhang, J.; Chen, J.; Sun, Y. Full-view area coverage in camera sensor networks: Dimension reduction and near-optimal solutions. IEEE Trans. Veh. Technol. 2016, 65, 7448–7461. [Google Scholar] [CrossRef]
- Gui, J.; Zhou, K. Flexible Adjustments Between Energy and Capacity for Topology Control in Heterogeneous Wireless Multi-Hop Networks. J. Netw. Syst. Manag. 2016, 24, 789–812. [Google Scholar] [CrossRef]
- Escolar, S.; Chessa, S.; Carretero, J. Energy management in solar cells powered wireless sensor networks for quality of service optimization. Pers. Ubiquitous Comput. 2014, 18, 449–464. [Google Scholar] [CrossRef]
- Zhang, S.; Seyedi, A.; Sikdar, B. An Analytical Approach to the Design of Energy Harvesting Wireless Sensor Nodes. IEEE Trans. Wirel. Commun. 2013, 12, 4010–4024. [Google Scholar] [CrossRef]
- Li, T.; Zhao, M.; Liu, A.; Huang, C. On Selecting Vehicles as Recommenders for Vehicular Social Networks. IEEE Access 2017. [Google Scholar] [CrossRef]
- Zeng, D.; Gu, L.; Lian, L.; Guo, S.; Yao, H.; Hu, J. On Cost-Efficient Sensor Placement for Contaminant Detection in Water Distribution Systems. IEEE Trans. Ind. Inf. 2016, 12, 2177–2185. [Google Scholar] [CrossRef]
- Long, J.; Dong, M.; Ot, K.; Liu, A. Achieving Source Location Privacy and Network Life-time Maximization through Tree-based Diversionary Routing in WSNs. IEEE Access 2014, 2, 633–651. [Google Scholar] [CrossRef]
- Lin, X.; Lu, R.; Shen, X.; Nemoto, Y.; Montgomery, K. SAGE: A strong privacy-preserving scheme against global eavesdropping for ehealth systems. IEEE J. Sel. Areas Commun. 2009, 27, 365–378. [Google Scholar]
- Lu, R.; Lin, X.; Liang, X.; Shen, X.S. A dynamic privacy-preserving key management scheme for location-based services in vanets. IEEE Trans. Intell. Transp. Syst. 2012, 13, 127–139. [Google Scholar] [CrossRef]
- Mahmoud, M.; Shen, X. A cloud-based scheme for protecting source-location privacy against hotspot-locating attack in wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 2012, 23, 1805–1818. [Google Scholar] [CrossRef]
- Jhumka, A.; Leeke, M.; Shrestha, S. On the Use of Fake Sources for Source Location Privacy: Trade-Offs Between Energy and Privacy. Comput. J. 2011, 54, 860–874. [Google Scholar] [CrossRef]
- Kamat, P.; Zhang, Y.; Trappe, W.; Zhang, Y. Enhancing source-location privacy in sensor network routing. In Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS 2005), Columbus, OH, USA, 6–10 June 2005; pp. 599–608. [Google Scholar]
- Wang, H.; Sheng, B.; Li, Q. Privacy-aware routing in sensor networks. Comput. Netw. 2009, 53, 1512–1529. [Google Scholar] [CrossRef]
- Tang, Z.; Liu, A.; Huang, C. Social-aware Data Collection Scheme through Opportunistic Communication in Vehicular Mobile Networks. IEEE Access 2016, 4, 6480–6502. [Google Scholar] [CrossRef]
- Ouyang, Y.; Le, Z.; Chen, G.; Ford, J.; Makedon, F. Entrapping adversaries for source protection in sensor networks. In Proceedings of the 2006 International Symposium on World of Wireless, Mobile and Multimedia Networks, New York, NY, USA, 26–29 June 2006; IEEE Computer Society: Washington, DC, USA, 2006; pp. 23–34. [Google Scholar]
- Bicakci, K.; Gultekin, H.; Tavli, B.; Bagci, I.E. Maximizing lifetime of event-unobservable wireless sensor networks. Comput. Stand. Interfaces 2011, 33, 401–410. [Google Scholar] [CrossRef]
- Liu, Y.; Dong, M.; Ota, K.; Liu, A. ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks. IEEE Trans. Inf. Forensics Secur. 2016, 11, 2013–2027. [Google Scholar] [CrossRef]
- Dong, M.; Ota, K.; Liu, A. RMER: Reliable and Energy Efficient Data Collection for Large-scale Wireless Sensor Networks. IEEE Internet Things J. 2016, 3, 511–519. [Google Scholar] [CrossRef]
- Yang, Q.; He, S.; Li, J.; Chen, J.; Sun, Y. Energy-Efficient Probabilistic Area Coverage in Wireless Sensor. IEEE Trans. Veh. Technol. 2015, 61, 367–377. [Google Scholar] [CrossRef]
- Wang, J.; Hu, C.; Liu, A. Comprehensive Optimization of Energy Consumption and Delay Performance for Green Communication in Internet of Things, Mobile Information Systems. Mob. Inf. Syst. 2017, 2017. [Google Scholar] [CrossRef]
- Badawy, G.; Sayegh, A.; Todd, T.D. Energy provisioning in solar-powered wireless mesh networks. IEEE Trans. Veh. Technol. 2010, 59, 3859–3871. [Google Scholar] [CrossRef]
- Dong, M.; Ota, K.; Yang, L.T.; Liu, A.; Guo, M. LSCD: A Low Storage Clone Detecting Protocol for Cyber-Physical Systems. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 2016, 35, 712–723. [Google Scholar] [CrossRef]
- Li, H.; Lin, X.; Yang, H.; Liang, X.; Lu, R.; Shen, X. EPPDR: An efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid. IEEE Trans. Parallel Distrib. Syst. 2014, 25, 2053–2064. [Google Scholar] [CrossRef]
- Chen, Z.; Liu, A.; Li, Z.; Choi, Y.-J.; Li, J. Distributed Duty Cycle Control for Delay Improvement in Wireless Sensor Networks. Peer-To-Peer Netw. Appl. 2017, 10, 559–578. [Google Scholar] [CrossRef]
- Xie, R.; Liu, A.; Gao, J. A residual energy aware schedule scheme for WSNs employing adjustable awake/sleep duty cycle. Wirel. Pers. Commun. 2016, 90, 1859–1887. [Google Scholar] [CrossRef]
- Zeng, D.; Li, P.; Guo, S.; Miyazaki, T.; Hu, J.; Xiang, Y. Energy minimization in multi-task software-defined sensor networks. IEEE Trans. Comput. 2015, 64, 3128–3139. [Google Scholar] [CrossRef]
- Liu, Y.; Liu, A.; Hu, Y.; Li, Z.; Choi, Y.-J.; Sekiya, H.; LI, J. FFSC: An Energy Efficiency Communications Approach for Delay Minimizing in Internet of Things. IEEE Access 2016, 4, 3775–3793. [Google Scholar] [CrossRef]
- Babu, B.S.; Jayashree, N.; Venkataram, P. Performance analysis of Steiner tree-based decentralization mechanism (STDM) for privacy protection in wireless sensor networks. Int. J. Netw. Secur. 2013, 15, 331–340. [Google Scholar]
- Chai, G.; Xu, M.; Xu, W.; Lin, Z. Enhancing Sink-Location Privacy in Wireless Sensor Networks through k–Anonymity. Int. J. Distrib. Sens. Netw. 2012, 2012, 648058. [Google Scholar] [CrossRef]
- Ngai, E.C.; Rodhe, H.I. On providing location privacy for mobile sinks in wireless sensor networks. Wirel. Netw. 2013, 19, 115–130. [Google Scholar] [CrossRef]
- Villas, L.A.; Boukerche, A.; Ramos, H.S.; Fernandes de Oliveira, H.A.B.; de Araujo, R.B.; Loureiro, A.A.F. DRINA: A lightweight and reliable routing approach for in-network aggregation in wireless sensor networks. IEEE Trans. Comput. 2013, 62, 676–689. [Google Scholar] [CrossRef]
- Lattanzi, E.; Regini, E.; Acquaviva, A.; Bogliolo, A. Energetic sustainability of routing algorithms for energy-harvesting wireless sensor networks. Comput. Commun. 2007, 30, 2976–2986. [Google Scholar] [CrossRef]
- The OMNET++ Discrete Event Simulation System. Version 4.1. 2013. Available online: http://www.omnetpp.org (accessed on July 2014).
Parameter | Value |
---|---|
Threshold distance (d0) (m) | 87 |
Sensing range rs (m) | 15 |
Eelec (nJ/bit) | 50 |
efs (pJ/bit/m2) | 10 |
eamp (pJ/bit/m4) | 0.0013 |
Initial energy (J) | 0.5 |
Parameter | Value |
---|---|
Network radius (R) (m) | 500 |
Protocols used | Shortest routing |
Transmission radius of nodes (m) | 50 |
Node density (/m2) | 0.002 |
An energy harvesting cycle (hours) | 24 |
A data transmission cycle (minutes) | 5 |
Time (O’clock) | Solar Radiation Value (Wh/m2) | ||||
8/1 | 8/2 | 8/3 | 8/4 | 8/5 | |
1 | 0 | 0 | 0 | 0 | 0 |
2 | 0 | 0 | 0 | 0 | 0 |
3 | 0 | 0 | 0 | 0 | 0 |
4 | 0 | 0 | 0 | 0 | 0 |
5 | 0 | 0 | 0 | 0 | 0 |
6 | 0 | 0 | 0 | 0 | 0 |
7 | 27 | 20 | 21 | 19 | 21 |
8 | 134 | 57 | 71 | 74 | 99 |
9 | 428 | 126 | 194 | 172 | 293 |
10 | 637 | 426 | 228 | 272 | 615 |
11 | 808 | 696 | 365 | 338 | 790 |
12 | 929 | 848 | 607 | 375 | 905 |
13 | 994 | 948 | 853 | 613 | 969 |
14 | 988 | 967 | 882 | 577 | 973 |
15 | 928 | 837 | 765 | 592 | 911 |
16 | 808 | 581 | 659 | 697 | 761 |
17 | 636 | 319 | 547 | 478 | 578 |
18 | 431 | 328 | 280 | 394 | 383 |
19 | 214 | 142 | 189 | 189 | 163 |
20 | 47 | 27 | 36 | 37 | 32 |
21 | 0 | 0 | 0 | 0 | 0 |
22 | 0 | 0 | 0 | 0 | 0 |
23 | 0 | 0 | 0 | 0 | 0 |
24 | 0 | 0 | 0 | 0 | 0 |
© 2017 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Huang, C.; Ma, M.; Liu, Y.; Liu, A. Preserving Source Location Privacy for Energy Harvesting WSNs. Sensors 2017, 17, 724. https://doi.org/10.3390/s17040724
Huang C, Ma M, Liu Y, Liu A. Preserving Source Location Privacy for Energy Harvesting WSNs. Sensors. 2017; 17(4):724. https://doi.org/10.3390/s17040724
Chicago/Turabian StyleHuang, Changqin, Ming Ma, Yuxin Liu, and Anfeng Liu. 2017. "Preserving Source Location Privacy for Energy Harvesting WSNs" Sensors 17, no. 4: 724. https://doi.org/10.3390/s17040724
APA StyleHuang, C., Ma, M., Liu, Y., & Liu, A. (2017). Preserving Source Location Privacy for Energy Harvesting WSNs. Sensors, 17(4), 724. https://doi.org/10.3390/s17040724