{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T21:38:18Z","timestamp":1769031498392,"version":"3.49.0"},"reference-count":24,"publisher":"MDPI AG","issue":"11","license":[{"start":{"date-parts":[[2015,11,17]],"date-time":"2015-11-17T00:00:00Z","timestamp":1447718400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Wireless sensor networks are widely used to monitor valuable objects such as rare animals or armies. Once an object is detected, the source, i.e., the sensor nearest to the object, generates and periodically sends a packet about the object to the base station. Since attackers can capture the object by localizing the source, many protocols have been proposed to protect source location. Instead of transmitting the packet to the base station directly, typical source location protection protocols first transmit packets randomly for a few hops to a phantom location, and then forward the packets to the base station. The problem with these protocols is that the generated phantom locations are usually not only near the true source but also close to each other. As a result, attackers can easily trace a route back to the source from the phantom locations. To address the above problem, we propose a new protocol for source location protection based on limited flooding, named SLP. Compared with existing protocols, SLP can generate phantom locations that are not only far away from the source, but also widely distributed. It improves source location security significantly with low communication cost. We further propose a protocol, namely SLP-E, to protect source location against more powerful attackers with wider fields of vision. The performance of our SLP and SLP-E are validated by both theoretical analysis and simulation results.<\/jats:p>","DOI":"10.3390\/s151129129","type":"journal-article","created":{"date-parts":[[2015,11,17]],"date-time":"2015-11-17T10:23:41Z","timestamp":1447755821000},"page":"29129-29148","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Hiding the Source Based on Limited Flooding for Sensor Networks"],"prefix":"10.3390","volume":"15","author":[{"given":"Juan","family":"Chen","sequence":"first","affiliation":[{"name":"Department of Information Science and Technology, Dalian Maritime University, Dalian 116026, China"}]},{"given":"Zhengkui","family":"Lin","sequence":"additional","affiliation":[{"name":"Department of Information Science and Technology, Dalian Maritime University, Dalian 116026, China"}]},{"given":"Ying","family":"Hu","sequence":"additional","affiliation":[{"name":"Department of Information Science and Technology, Dalian Maritime University, Dalian 116026, China"}]},{"given":"Bailing","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Harbin Institute of Technology, Weihai 264209, China"}]}],"member":"1968","published-online":{"date-parts":[[2015,11,17]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1016\/j.pmcj.2014.01.006","article-title":"On protecting end-to-end location privacy against local eavesdropper in Wireless Sensor Networks","volume":"16","author":"Chen","year":"2015","journal-title":"J. Pervasive Mob. Comput."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1016\/j.pmcj.2012.10.002","article-title":"Using data mules to preserve source location privacy in Wireless Sensor Networks","volume":"11","author":"Raj","year":"2014","journal-title":"J. Pervasive Mob. Comput."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Ozturk, C., Zhang, Y., and Trappe, W. (2004, January 25\u201329). Source-location privacy in energy constrained sensor networks routing. Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, Washington, DC, USA.","DOI":"10.1145\/1029102.1029117"},{"key":"ref_4","unstructured":"Kamat, P., Zhang, Y., Trappe, W., and Ozturk, C. (2005, January 10). Enhancing source-location privacy in sensor network routing. Proceedings of the 25th IEEE International Conference on Distributed Computing Systems, Columbus, OH, USA."},{"key":"ref_5","unstructured":"Li, Q.H., and Cao, G.H. (2013, January 18\u201322). Providing privacy-aware incentives for mobile sensing. Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications (PerCom), San Diego, CA, USA."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"1613","DOI":"10.1002\/wcm.2300","article-title":"Designing robust routing protocols to protect base stations in wireless sensor networks","volume":"14","author":"Chen","year":"2014","journal-title":"J Wirel. Commun. Mob. Comput."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1805","DOI":"10.1109\/TPDS.2011.302","article-title":"A cloud-based scheme for protecting source-location privacy against hotspot-locating attack in wireless sensor networks","volume":"23","author":"Ahmoud","year":"2012","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Kanthakumar, P., and Xiao, L. (2013). Sensor node source privacy and packet recovery under eavesdropping and node compromise attacks. ACM Trans. Sens. Netw., 9.","DOI":"10.1145\/2489253.2489267"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Wang, W.P., Chen, L., and Wang, J.X. (2008, January 19\u201323). A source-location privacy protocol in WSN based on locational angle. Proceedings of the 2008 IEEE International Conference on Communications, Beijng, China.","DOI":"10.1109\/ICC.2008.315"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1109\/TMC.2011.32","article-title":"Protecting location privacy in sensor networks against a global eavesdropper","volume":"11","author":"Mehta","year":"2012","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Yang, Y., Shao, M., Zhu, S.C., and Cao, G. (2013). Towards statistically strong source anonymity for sensor networks. ACM Trans. Sens. Netw., 9.","DOI":"10.1145\/2480730.2480737"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1109\/TMC.2011.267","article-title":"Toward a Statistical Framework for Source Anonymity in Sensor Networks","volume":"12","author":"Cuellar","year":"2013","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_13","unstructured":"Rui, S., Goswami, M., Jie, G., and Gu, X. (2013, January 14\u201319). Is random walk truly memoryless\u2014Traffic analysis and source location privacy under random walks. Proceedings of the 2013 IEEE INFOCOM, Turin, Italy."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Spachos, P., Song, L., Bui, F.M., and Hatzinakos, D. (July, January 28). Improving source-location privacy through opportunistic routing in wireless sensor networks. Proceedings of the 2011 IEEE Symposium on  Computers and Communications (ISCC), Kerkyra, Greece.","DOI":"10.1109\/ISCC.2011.5983942"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Spachos, P., Toumpakaris, D., and Hatzinakos, D. (2014, January 18\u201321). Angle-based Dynamic Routing Scheme for Source Location Privacy in Wireless Sensor Networks. Proceedings of the 2014 IEEE 79th Vehicular Technology Conference (VTC Spring), Seoul, Korea.","DOI":"10.1109\/VTCSpring.2014.7022833"},{"key":"ref_16","unstructured":"Reed, M., Syverson, P., and Goldschlag, D. (1996, January 9\u201313). Proxies for anonymous routing. Proceedings of the 12th Annual Computer Security Applications Conference, San Diego, CA, USA."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Reiter, M., and Rubin, A. (1998). Crowds: Anonymity for web transactions. Trans. Inf. Syst. Secur. (TISSEC), 1.","DOI":"10.1145\/290163.290168"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Chen, J., Du, X., and Fang, B. (2011). An efficient anonymous communication protocol for wireless sensor networks. Wirel. Commun. Mob. Comput., 12.","DOI":"10.1002\/wcm.1205"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Sheu, J., Jiang, J., and Tu, C. (2008, January 19\u201323). Anonymous path routing in wireless sensor networks. Proceedings of the 2008 IEEE International Conference on Communications, Beijing, China.","DOI":"10.1109\/ICC.2008.515"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Luo, X., Ji, X., and Park, M. (2010, January 21\u201323). Location privacy against traffic analysis attacks in wireless sensor networks. Proceedings of the 2010 International Conference on Information Science and Applications (ICISA), Seoul, Korea.","DOI":"10.1109\/ICISA.2010.5480564"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"1238","DOI":"10.1109\/SURV.2013.011413.00118","article-title":"Providing source location privacy in wireless sensor networks: A survey","volume":"15","author":"Conti","year":"2013","journal-title":"J. Commun. Surv. Tutor."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Kang, L. (2009, January 14\u201318). Protecting Location Privacy in Large-Scale Wireless Sensor Networks. Proceedings of the 2009 IEEE International Conference on Communications, Dresden, Germany.","DOI":"10.1109\/ICC.2009.5199372"},{"key":"ref_23","first-page":"393","article-title":"Multimedia sensor networks based on ultrawideband chaotic radio pulses","volume":"60","author":"Dmitriev","year":"2015","journal-title":"J. Commun. Technol."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Saleh, S., Ahmed, M., Ali, B.M., Rasid, M.F.A., and Ismail, A. (2014). A survey on energy awareness mechanisms in routing protocols for wireless sensor networks using optimization methods. Trans. Emerg. Telecommun. Technol., 25.","DOI":"10.1002\/ett.2679"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/15\/11\/29129\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T20:52:14Z","timestamp":1760215934000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/15\/11\/29129"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11,17]]},"references-count":24,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2015,11]]}},"alternative-id":["s151129129"],"URL":"https:\/\/doi.org\/10.3390\/s151129129","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,11,17]]}}}