Internet DRAFT - draft-zhou-rrg-lp-wsn

draft-zhou-rrg-lp-wsn



Network Working Group                                            L. Zhou
Internet-Draft                                                  J. Huang
Expires: November 29, 2014                          SouthEast University
                                                            May 28, 2014


     The Location Privacy of Wireless Sensor Networks: Attacks and
                            Countermeasures
                        draft-zhou-rrg-lp-wsn-00

Abstract

   With the related applications of wireless sensor networks getting
   into our lives quickly, the research of WSN is growing more and more
   necessary.  The most significant problem which threatens the
   successful deployment of sensor systems is privacy, there are many
   protocols providing the security of news content for the WSNs.
   However, due to the open feature of sensor networks, context
   information is still in an exposed state, which makes the network be
   vulnerable to traffic analysis attack and hop by hop tracing back
   packet attack.  Thus location privacy protection programs have been
   proposed.  In this paper, we analyze and compare the existing major
   schemes comprehensively, meanwhile illustrate their theoretical
   models, principles and the advantages and disadvantages in detail.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on November 29, 2014.

Copyright Notice

   Copyright (c) 2014 IETF Trust and the persons identified as the
   document authors.  All rights reserved.





Zhou & Huang            Expires November 29, 2014               [Page 1]

Internet-Draft                     CTA                          May 2014


   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
   2.  The Attack Models . . . . . . . . . . . . . . . . . . . . . .   4
     2.1.  The Model of Source Attackers . . . . . . . . . . . . . .   4
     2.2.  The Model of Sink Attackers . . . . . . . . . . . . . . .   5
   3.  Location Privacy Protection Agreements  . . . . . . . . . . .   5
     3.1.   Source Location Privacy Protection Protocols . . . . . .   5
       3.1.1.   Phantom Routing (PhR)  . . . . . . . . . . . . . . .   6
       3.1.2.   Protocol Using Source-based Restricted Flooding
               (PUSBRF)  . . . . . . . . . . . . . . . . . . . . . .   6
     3.2.   Sink Location Privacy Protection Protocols . . . . . . .   7
       3.2.1.   Location-privacy Routing Protocol (LPR)  . . . . . .   8
       3.2.2.  Differential Enforced Fractal Propagation (DEFP)  . .   8
     3.3.  Both Location Privacy Protection Protocols  . . . . . . .   8
   4.  Performance Comparison  . . . . . . . . . . . . . . . . . . .   9
   5.  Security Consideration  . . . . . . . . . . . . . . . . . . .  13
   6.  IANA Consideration  . . . . . . . . . . . . . . . . . . . . .  13
   7.  References  . . . . . . . . . . . . . . . . . . . . . . . . .  13
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  14

1.  Introduction

   With the rise of Internet of things, wireless sensor network (WSN)
   which is an integral part of Internet of things have a very broad
   application prospects.

   WSNs consist of a large number of micro sensor nodes, those nodes are
   capable of sensing information, computing and communicating.
   However, due to the low cost of these nodes, the storage capacity of
   battery is small, the computing capability of node processors is low,
   and the communication of wireless communication device is limited.
   Overall wireless sensor networks have the following characteristics:
   large-scale, self-organizing, multi-hop routing, dynamic, resource-
   constrained and applications related.  These features make the
   wireless sensor networks have broad application prospects in
   military, environment, medical treatment, smart home.




Zhou & Huang            Expires November 29, 2014               [Page 2]

Internet-Draft                     CTA                          May 2014


   Wireless sensor networks could be used to collect sensitive
   information or deployed in hostile or unprotected environment, which
   make protecting the privacy of sensor nodes be crucial in the current
   WSNs, the privacy issues in WSNs are divided into two categories:
   content privacy and context privacy.  In order to solve the problem
   of content privacy, for now, many encryption and authentication
   mechanisms[RFC4948][RFC4949]have been proposed and used, and can
   basically meet the corresponding requirements.  But due to the open
   feature of WSNs, the exposure of context information can cause the
   user's secret leak to the attacker, especially attacker can locate
   the source node or destination node (base station) through traffic
   analysis and hop track packet stream.  The location of source node
   and base station are very sensitive in many WSN applications such as
   in precious animals detection system, the position of animals (source
   node) can't be exposed to illegal hunters; in battlefield information
   collection system, the position of soldier (sink node) who accepts a
   variety of information can't be exposed to the enemy.  Because of the
   importance and necessity of location privacy, this paper has a
   research on principles, advantages and disadvantages of current main
   location privacy protection agreement (PhR[PhR](GROW[GROW], PRLA
   [PRLA]), PUSBRF[PUSBRF], LPR [LPR], LPSS[LPSS], DEFP[DEFP]).

   Based on the property of object which needs to be protected, this
   paper divides the possible attackers into two categories: the
   attackers who attack source node and the attackers who attack sink
   node, and establishes corresponding models according to their
   individual features.  According to the attacker models we propose
   appropriate protection agreements and discuss their advantages and
   disadvantages.

   The main contributions of this paper are as follows:

   (1) We divide possible attackers into two categories based on the
   property of object which needs to be protected for the first time,
   and establish the corresponding attack models;

   (2) We put forward the corresponding settlement agreements in
   accordance with attack models on the basis of scientific ideas that
   discovering problems then solving them, meanwhile we conduct
   comprehensive analyses and comparisons on the main location privacy
   protection agreements systematically for the first time;

   (3) We summarize the maximum intensity attacker that each privacy
   protection agreement can handle by analyzing and comparing, then
   conclude the respective applicable scenario of each agreement.






Zhou & Huang            Expires November 29, 2014               [Page 3]

Internet-Draft                     CTA                          May 2014


2.  The Attack Models

   The objects protected in WSNs are usually the source node (such as in
   precious animals detection system, the position of the node which has
   monitored animals can't be exposed to illegal hunters) and the sink
   node (such as in battlefield information collection system, the
   location of the last node which is responsible for transferring a
   variety of information to the soldiers can't be exposed to the
   enemy).  According to the property of object which needs to be
   protected we divide possible attackers into two categories: the
   attackers who attack source node (source attackers) and the attackers
   who attack sink node (sink attackers).  This article assumes that two
   types of attackers both have the following characteristics: ①
   attackers have excellent hardware, sufficient storage space and
   powerful computation ability; ② attackers can detect traffic
   only in one region, but are not capable of decrypting data packets
   [PRLA]; ③ attackers can only trace the nodes sending data
   packets but the nodes receiving data packets.

2.1.  The Model of Source Attackers

   The process of attacker tracing back source node's location is
   described as follows: the attacker starts monitoring at the sink
   node, when monitored a message, he can deduce that the signal is
   issued by node A through wireless signal positioning device, then
   moves immediately to node A to continue to wait, when a new message
   received he determines that it was issued by node B and then quickly
   moves to node B, repeat this process can trace to the location of the
   source node.

   This paper divides the source attackers into two categories based on
   the sources attackers' tracking method: the patient source attacker
   and the careful source attacker.

   The model of patient source attacker is described as follows: the
   attacker follows a simple and natural attack strategy: he starts on
   the position of sink node (base station) to wait until a new message
   is heard, and then immediately move to the node that generated the
   message, repeat this process until the location of the source node is
   traced.

   The model of cautious source attacker is described as follows:
   because some privacy protection technology [3] could lead an attacker
   to strand at a location remote from the real source node, the
   strategy of cautious source attacker is limiting the eavesdropping
   time in one position, if he has not received any new messages within
   a specified time interval, he thinks that he was misled to current




Zhou & Huang            Expires November 29, 2014               [Page 4]

Internet-Draft                     CTA                          May 2014


   position, and then hops back to the previous position to continue
   listening.

2.2.  The Model of Sink Attackers

   Sink attackers determine which nodes are on the transmission path
   according to the time sequence of date packet transmission, then
   mobile hop by hop, and finally get to the sink node.  The process of
   attacker tracking sink node's position is described as follows:
   assuming the attacker listening for message transmitting within the
   range of one hop at node C, he monitors that node C sends a data
   packet at first, then node B transmits a data packet subsequently,
   the attacker moves to the node B immediately and infers that the
   transmission path at this time is C to B, according to this method,
   the attacker tracks the location of the nodes which are one hop from
   the base station as having captured the sink node.

   Similarly sink attackers are also divided into two categories: the
   patient sink attacker and the cautious sink attacker.  The principle
   of their attacker model is similar to the principle of corresponding
   source attacker model, not repeat them.

3.  Location Privacy Protection Agreements

   In order to prevent these attackers from destroying the location
   privacy security of wireless sensor networks, a series of security
   protocols are proposed, such as: phantom routing (PhR), source
   location privacy preservation protocol in wireless sensor networks
   using source-based restricted flooding (PUSBRF), location-privacy
   routing protocol (LPR), location privacy support scheme (LPSS),
   differential enforced fractal propagation (DEFP).  This section will
   classify these main protocols and describe the principle of each
   protocol in detail.

   In this paper, we divide the main privacy and security protocols
   which are mentioned above into three categories: source location
   privacy protection protocols, sink location privacy protection
   protocols and both location privacy protection protocol.  Source
   location privacy protection protocols include: PhR, PUSBRF; sink
   location privacy protection protocols include: LPR, DEFP; and both
   location privacy protection protocol includes LPSS.

3.1.  Source Location Privacy Protection Protocols








Zhou & Huang            Expires November 29, 2014               [Page 5]

Internet-Draft                     CTA                          May 2014


3.1.1.  Phantom Routing (PhR)

   Take the panda-hunter model[PhR] for example, the description of
   phantom routing is decribed as follows: in PhR , the transmission of
   each information goes through two phases:① the random walk
   phase , may be a pure random walk or a directional walk (based on
   sector or hop count between the node and the sink node[PhR]);②
   subsequent flooding/single-path routing phase, which will send the
   information to the sink.  When the source node sends a message, the
   message is unicasted Hwalk hops randomly, then pass it to the base
   station based on the baseline (probability) flooding[SECH]or single-
   path routing[PhR].  Because of PhR, after an attacker intercepted
   messages i he will wait a long time before receiving the next message
   i+1, when he finally receives the message i+1, the instant sender of
   this message may lead the attacker to the position which is away from
   the true source node.

   On the basis of phantom routing (PhR) also proposed the phantom
   routing with location angle (PRLA)[SECE], PRLA is consist of three
   phases:① the sink node floods a query message in the whole
   network, so that each node can creates the shortest path to the sink
   and divides its neighboring nodes into two direction collections
   according to the distance between neighboring nodes and the
   sink;② the source node produces a limited flooding with the
   range of random walk, this process makes each node can get the
   inclination angle of respective neighboring nodes and calculate the
   transmitting messages possibility of each neighboring node;③
   the source node sends date packets to the sink node, each data packet
   will be transmitted Hw hops in a random walk way based on the
   inclination angle, then along the shortest route path goes to the
   sink node from the phantom source node.

   PRLA is essentially an improvement of PhR's random walk phase, to a
   degree it avoids the generation of the offset path[PUSBRF], on the
   basis of PhR it further improves the safety time.

   Greedy random walk (GROW) is essentially an improvement of PhR's
   random walk phase too, in GROW, the sensor node each time selects a
   neighboring node from those who did not participate in the random
   walk phase, in this way, random walking is always trying to cover a
   area where hasn't accessed to by greedy strategy[GROW], thereby
   improving the ability of sensor networks against attackers.

3.1.2.  Protocol Using Source-based Restricted Flooding (PUSBRF)

   PUSBRF protocol is consist of four phases:① network security
   initialization phase;② source node h hops limited flooding
   phase;③ h hops directional routing phase, the direction of each



Zhou & Huang            Expires November 29, 2014               [Page 6]

Internet-Draft                     CTA                          May 2014


   hop is selected by the current node based on the minimum hop value
   that its neighboring apart from the source node;④ the shortest
   path routing phase.

   The process of network initialization phase is described as follows:
   complete the establishment of the key, discover the neighboring nodes
   to achieve the information of minimum hop value that each ordinary
   nodes apart from the base station, and each node pre-loads the
   following parameters: the public key (Kpub) used for message
   encryption, the list of neighboring nodes (Tu), hop value h, then
   generate a base-station broadcast in the whole network, the base
   station broadcasts the initialization message BM={BRO_BASE,ID,hop_bs}
   in the entire network, in which BRO_BASE indicates the type of
   messages, ID indicates the identity of the node that sent the
   message, hop_bs indicates the hop count of the message which is
   initially 0., PRLA is consist of three phases:① the sink node
   floods a query message in the whole network, so that each node can
   creates the shortest path to the sink and divides its neighboring
   nodes into two direction collections according to the distance
   between neighboring nodes and the sink;② the source node
   produces a limited flooding with the range of random walk, this
   process makes each node can get the inclination angle of respective
   neighboring nodes and calculate the transmitting messages possibility
   of each neighboring node;③ the source node sends date packets
   to the sink node, each data packet will be transmitted Hw hops in a
   random walk way based on the inclination angle, then along the
   shortest route path goes to the sink node from the phantom source
   node.

   The process of the source node h hops limited flooding phase is
   described as follows: it makes the source node realize the broadcast
   in whole network within h hops, each node which is in the rage of h
   hops from the source node gets the minimal distance between itself
   and the source, then in list Tu adds the minimal hop value that the
   neighboring nodes away from the source node and records the value.

   The phantom source nodes generated in h hops directional routing
   phase are far enough away from the real source node and their
   location is diverse.  The shortest path routing achieves transmitting
   packets from the phantom source node to the base station in a
   shortest period of time.

3.2.  Sink Location Privacy Protection Protocols








Zhou & Huang            Expires November 29, 2014               [Page 7]

Internet-Draft                     CTA                          May 2014


3.2.1.  Location-privacy Routing Protocol (LPR)

   Because the goal of routing protocols is to transmit a packet along
   the shortest possible path to the destination, the packets'
   forwarding direction is always pointing to the receiver.  Then the
   attacker will determine the wright node which the real package goes
   to according to the general trend of path.  In order to resist this
   kind of problem LPR protocol has been proposed.

   LPR randomizes routing path, so that the forward direction of
   packages does not always point to the receiver.  The route consists
   of two phases: ① each sensor node divides his neighboring nodes
   into two lists: a closer list which is consist of the neighboring
   nodes whose distance to the destination is shorter than its own; a
   further list which is consist of the neighboring nodes whose distance
   to the destination is longer than equal to its own, the specific
   classification criteria refer to the literature [LPR]. ②When a
   sensor node forwards a date packet, he chooses a neighbor node in one
   of the two lists randomly as the next hop node of the package, and
   the selection probability from the further list as the next hop node
   is Pf, so the selection probability from the closer list as the next
   hop node is 1-Pf.

3.2.2.  Differential Enforced Fractal Propagation (DEFP)

   DEFP is a simple distributed algorithm based on DFP[DEFP].  The key
   idea of the program is to leave early packet forwarding nodes have a
   higher chance of false packet transmission in the next phase, at the
   beginning DEFP allocates one vote to every neighboring node.  When a
   node selects one of his neighboring nodes as the next node which is
   false packets forwarded to, the votes of the node increase k.
   According to this approach, after using lottery scheduling algorithm
   [SECH], when a node has forwarded a fake packet to one of its
   neighboring nodes, it will continue to forward other fake packets to
   the same neighboring node with rising probability.

3.3.  Both Location Privacy Protection Protocols

   The program consists of two phases:① Each sensor node divides
   his neighboring nodes into three sets: a small gradient [SECT]set
   comprised of the neighboring nodes with smaller gradient value; an
   equivalent gradient set comprised of the neighboring nodes with the
   same gradient value; a large gradient comprised of the neighboring
   nodes with larger gradient value. ② When a neighboring node
   transmits a packet, he selects the next hop node from the equivalent
   gradient set with the probability Pi, or selects the next hop node
   from the small gradient set with the probability 1-Pi.  LPSS also can
   be used combine with the fake package strategy.



Zhou & Huang            Expires November 29, 2014               [Page 8]

Internet-Draft                     CTA                          May 2014


4.  Performance Comparison

   This section compares the performance of the location privacy
   security protocols mainly by three parameters: security strength
   (safety time), transmission delay, communication overhead.

   (1) Safety time (privacy protection strength): the number of packages
   sent by the source node before the target node exposed to the enemy
   (before hunters capturing the panda or enemy discovering soldiers who
   receive information), the more of packages be sent the longer of
   safety period, conversely the shorter of safety period;

   (2) Energy loss (communication overhead): the average hop value
   through which the data packet sent by the source node eventually
   arrives at the sink node (base station), and the lager of the hop
   value the greeter of communication overhead, conversely the smaller
   of communication overhead;

   (3) Propagation delay (transmission delay): the period in which the
   data packet sent by the source node eventually arrives at the sink
   node (base station), obviously lager of the average hop value the
   longer of transmission delay, conversely the shorter of transmission
   delay.  Combining with the consequence in (2) can easily conclude
   that the communication overhead is proportional to transmission
   delay.

   In order to facilitate the comparison, source location privacy
   protection protocols all use the same simulation configuration: in
   the OMNet[SECT]simulation environment, we distribute 10000 sensor
   nodes uniformly in the network with area of 6000*6000 m2, in which
   the communication radius of each node is 110m.  So the average number
   of neighboring nodes of each node is 8.64, weakly connected nodes
   (node number of neighboring nodes is less than or equal to 3) account
   for only about 1%, the attackers begin tracking from the base
   station.

   The communication overhead is closely related to two parameters: the
   hop value of random walks and the distance between the source node
   and the base station.  When research the changing trend with one
   parameter, we need to assume the other parameter as a fixed value.
   Assume that the distance between the source node and the base station
   are 60 hops, the relationship between communication overhead and hop
   count of random directional walks shows that:① With the number
   of random directional hops increasing, the communication overhead
   (average transmission delay) of PhR and PUSBRF both increase.  This
   is because with the number of random directional hops increasing,
   date packets need forward more times during random routing phase to
   reach phantom source nodes, however, this phase doesn't make



Zhou & Huang            Expires November 29, 2014               [Page 9]

Internet-Draft                     CTA                          May 2014


   contribution to pass packets to the base station, thus their
   communication overhead improves.② When the random directed hop
   value is fixed, the communication overhead of PUSBRF is slightly
   higher, because the directed walk of PhR is based on the number of
   hops between the node to the base station, so PhR only need the base
   station broadcast in the whole network, but from the above mentioned
   phases of PUSBRF protocol we can see, PUSBRF requires not only the
   base station broadcast in the whole network but also needs the source
   node broadcast in the whole network within h hops.

   Make the value of random directional hops as h=15, then the trend of
   the two protocols between the communication overhead and hops from
   the source node to the base station shows that: ① the
   communication overhead (average transmission delay) of PhR and PUSBRF
   both increase with the distance between the source node and the base
   station increasing.  This is because with increasing distance between
   the source node and the base station, the data needs to go through
   more hops to reach the base station.② when the hop value of two
   protocols between the source node and the base station are the same,
   the communication overhead of them are about the same.

   (3) The security period is closely related to two parameters: the
   value of random directional hops and the distance from the source
   node to the base station.  Assume that the distance between the
   source node and the base station are 60 hops, then the trend of the
   security period and the random directional hop value shows that:
   ① The security period of PhR and PUSBRF both increase with h
   increasing.  This is because the increasing h makes the distance
   between the phantom source nodes generated by two protocols and the
   real source node further, then generates more random paths which make
   the source attackers more difficult to trace. ② When the random
   directional hop value are the same, the security period of PUSBRF is
   much longer than PhR's, this indicates that the safety performance of
   PUSBRF is better than PhR's.  This is because phantom source nodes
   generated by PUSBRF are more diverse geographically than which are
   generated by PhR[PRLA].

   Make the value of random directional hops as h=15, the trend of the
   security period and the distance from the source node to the base
   station shows that: ① With the increasing of the hop count
   between the source node and the base station, the security period of
   PhR and PUSBRF also increases.  This is because when the hop count is
   larger, the more hops that source attackers need to trace back to the
   real source node. ② When the hop count between the source node
   and the base station of two protocols are the same, the safety
   performance of PUSBRF is better than PhR's, indicating that the
   safety performance of PUSBRF better than PhR, the reason is the same
   as above.



Zhou & Huang            Expires November 29, 2014              [Page 10]

Internet-Draft                     CTA                          May 2014


   The performance comparison of above two protocols and LPSS used with
   fake packets shows that: the safety performance of pure LPSS is
   between PhR and PUSBRF, so are communication overhead and
   transmission delay, when LPSS is used with the false packet strategy,
   the safety time increased substantially and the communication
   overhead becomes larger, but the transmission delay is still close to
   pure LPSS protocol, which is because the transmission paths of true
   packets are the same with pure LPSS, fake packets just used to
   confuse attackers, and don't affect the transmission of true packets.

   In summary, compared to the pure flooding and single- path routing,
   PhR can resist the attacker's packet tracing attack to some extent,
   but the phantom source nodes generated by PhR concentrate in one area
   with high probability; PUSBRF protocol makes up this deficiency, it
   can generate phantom source nodes which are geographical diversity
   with equal probability, and enhance the security of the source node's
   location privacy effectively, however the improvement of security
   period at the cost of increasing of communication overhead, so the
   communication overhead of PUSBRF is more than PhR's, the transmission
   delay is longer too, and can't weigh between the security period and
   the communication overhead; gets the weigh between security period
   and transmission delay by adjusting the value of the parameters Pi.
   When LPSS is used combines with false packet strategy, it can achieve
   impressive safety performance, but at the cost of communication
   overhead increasing.

   The above three protocols can withstand source attackers (including
   patient source attackers and cautious source attackers), and are more
   resistant to cautious source attackers[SECW], their pros and cons
   make we should select the appropriate protocol according to specific
   application requirements.

   The simulation results of location privacy protocols which can
   protect the sink node (base station) are shown as follows:

   In order to facilitate the comparison, sink location privacy
   protection protocols all use the same simulation configuration: in
   the OMNet simulation environment, we distribute 2500 sensor nodes
   uniformly in a sensor network, make the average number of neighboring
   nodes of each node be 8, and attackers began tracking from the source
   node.

   (1) At the packet forwarding phase LPR protocol selects the next hop
   node from the further list with probability Pf, and get the trend
   between the transmission delay and hop count from the source node to
   the sink node of pure LPR when Pf is 0.0%, 25%, 37.5%, meanwhile
   compare with DEFP.  The resulet showa that: ① with the
   increasing of distance between the source node and the base station,



Zhou & Huang            Expires November 29, 2014              [Page 11]

Internet-Draft                     CTA                          May 2014


   the transmission delay of two protocols both increase.  This is
   because when the source node is far away from the base station, sink
   attackers at the source node need to track more hops to reach the
   base station;② when the distance from the source node to the
   base station are the same in LPR, the transmission delay increases
   with the increasing of Pf.  This is because Pf is the probability
   with which we select the next hop from the further list, the larger
   of Pf the more likely to choose the next hop from the further list,
   which extends the transmission path;③ when the distance between
   the source node and the base station are the same, the transmission
   delay of LPR is longer than DEFP's.

   (2) The trend between security period and Pf of pure LPR protocol and
   compare with DEFP shows that: ① with the increasing of Pf, the
   security period of LPR increases.  This is because Pf is the
   probability with which we select the next hop from the further list,
   the larger of Pf the more likely to choose the next hop from the
   further list, which extends the transmission path, so sink attackers
   need trace a longer time to reach the base station;② the
   security period of LPR is longer than DEFP's, and the larger of Pf,
   the higher amplitude of LPR's security period longer than DEFP's.

   The performance comparison of above two protocols with fake packets
   strategy, pure LPSS and LPSS with fake packets strategy indicates
   that: when DEFP, LPR, LPSS all used with fake packets strategy, the
   security period of three protocols all improving, the transmission
   delay remain constant, but the energy consumption increasing.

   In summary, LPR can get the balance between privacy protection
   strength (security period) and energy consumption by adjusting Pf,
   LPR with fake packets strategy can effectively improve the safety
   performance of the program compared with DEFP, but its transmission
   delay and communication overhead are far greater than DEFP's, LPSS
   get the trade-off between transmission delay and security period by
   adjusting Pi, and with the increasing of hop counts between the
   source node and the sink node, the safety strength (security
   period)of LPSS increases evidently dramatically than LPR, but LPSS
   can only play full advantage when it is used with fake packets
   strategy, otherwise it isn't superior than LPR and DEFP
   comprehensively.

   The above three protocols can resist sink attackers (including of
   patience sink attackers and cautious sink attackers), and they all
   have their pros and cons, we need select the appropriate protocol
   according to specific application requirements.






Zhou & Huang            Expires November 29, 2014              [Page 12]

Internet-Draft                     CTA                          May 2014


5.  Security Consideration

   This paper divides attackers into two types based on the properties
   of the objects which need be protected: source attackers and sink
   attackers, then establishes corresponding attack models, after that
   we propose appropriate protocol in accordance with attack models,
   including phantom routing (PhR), source location privacy preservation
   protocol in wireless sensor networks using source-based restricted
   flooding (PUSBRF), location-privacy routing protocol (LPR), location
   privacy support scheme (LPSS), differential enforced fractal
   propagation (DEFP).  At last we have comprehensive analysis and
   comparison of these location privacy protection protocols
   systematically, mean while sum up the advantages and disadvantages of
   each protocol.

6.  IANA Consideration

   To be completed.

7.  References

   [RFC4948]  Perring, A., Szewczyk, R., Tygar, D., Wen, V., and D.
              Culle, "Spins: security protocols for sensor networks",
              May 2007.

   [RFC4949]  Eschenaur, L. and V. Gligor, "A key-management scheme for
              distributed sensor networks", August 2007.

   [PhR]      Kamat, P., Zhang, Y., Trappe, W., and C. Ozturk,
              "Enhancing source location privacy in sensor network
              routing", August 2005.

   [GROW]     Xi, Y., Shi, W., and L. Andersson, "Preserving source
              location privacy in monitoring-based wireless sensor
              networks", August 2006.

   [PRLA]     W P, Wang., Chen, L., and Wang. J X, "A source--location
              privacy protocol in WSN based on locational angle", August
              2008.

   [PUSBRF]   Juan, C., Binxing, F., and Y. Lihua, "A Source--Location
              Privacy Preservation Protocol in Wireless Sensor Networks
              Using Source--Based Restricted Flooding", August 2010.

   [LPR]      Jian, Y. and S. Chen, "Protecting Receiver-Location
              privacy in Wireless Sensor networks", August 2007.





Zhou & Huang            Expires November 29, 2014              [Page 13]

Internet-Draft                     CTA                          May 2014


   [LPSS]     Kang, L., "Protecting location privacy in large--scale
              wireless sensor networks", August 2009.

   [DEFP]     Deng, J., Han, R., and S. Mishra, "Countermeasures against
              traffic analysis attacks in wireless sensor networks",
              October 2005.

   [SECH]     Cheng, Z. and W. Heinzelman, "Flooding Strategy for Target
              Discovery in Wireless Networks", April 2003.

   [SECE]     Waldspurger, C. and W. Weihl, "Lottery scheduling:
              Flexible proportional-share resource management", November
              1994.

   [SECW]     Ouyang, Y., Le, Z., Chen, G., Ford, J., and F. Makedon,
              "Entrapping adversaries for source protection in sensor
              networks", Jone 2006.

   [SECT]     Mallanda, C., "Simulating Wireless Sensor Networks with
              OMNeT++[EB/OL]", Jone 2000.

Authors' Addresses

   Lin Zhou
   SouthEast University
   SouthEast University,Nanjing,210012

   Email: 573823136@qq.com


   Jie Huang
   SouthEast University
   SouthEast University,Nanjing,210012

   Email: jhuang@seu.edu.cn
















Zhou & Huang            Expires November 29, 2014              [Page 14]