{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:19:37Z","timestamp":1761401977359,"version":"build-2065373602"},"reference-count":21,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2018,12,31]],"date-time":"2018-12-31T00:00:00Z","timestamp":1546214400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61876017"],"award-info":[{"award-number":["61876017"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>With the wide application of wireless sensor networks (WSNs), secure data sharing in networks is becoming a hot research topic and attracting more and more attention. A huge challenge is securely transmitting the data from the source node to the sink node. Except for eavesdropping the information stored in the packages, the adversary may also attempt to analyze the contextual information of the network to locate the source node. In this paper, we proposed a secure data sharing approach to defend against the adversary. Specifically, we first design a secret key mechanism to guarantee the security of package delivery between a pair of nodes. Then, a light-weighted secret sharing scheme is designed to map the original message to a set of shares. Finally, the shares are delivered to the sink node independently based on a proper random routing algorithm. Simulation results illustrate that our approach can defend against the eavesdropping and tracing-back attack in an energy-efficient manner.<\/jats:p>","DOI":"10.3390\/s19010114","type":"journal-article","created":{"date-parts":[[2018,12,31]],"date-time":"2018-12-31T07:22:30Z","timestamp":1546240950000},"page":"114","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["An Untraceable Data Sharing Scheme in Wireless Sensor Networks"],"prefix":"10.3390","volume":"19","author":[{"given":"Dong","family":"Chen","sequence":"first","affiliation":[{"name":"School of Software Engineering, Beijing Jiaotong University, Beijing 100044, China"}]},{"given":"Wei","family":"Lu","sequence":"additional","affiliation":[{"name":"School of Software Engineering, Beijing Jiaotong University, Beijing 100044, China"}]},{"given":"Weiwei","family":"Xing","sequence":"additional","affiliation":[{"name":"School of Software Engineering, Beijing Jiaotong University, Beijing 100044, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8687-8820","authenticated-orcid":false,"given":"Na","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Beijing University of Posts and Telecommunications, Beijing 100876, China"}]}],"member":"1968","published-online":{"date-parts":[[2018,12,31]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Raja, B., Rajakumar, R., Dhavachelvan, P., and Vengattaraman, T. (2017, January 15\u201317). A survey on classification of network structure routing protocols in wireless sensor networks. Proceedings of the IEEE International Conference on Computational Intelligence and Computing Research, Chennai, India.","DOI":"10.1109\/ICCIC.2016.7919552"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1016\/j.jnca.2015.09.008","article-title":"Applications of wireless sensor networks for urban areas: A survey","volume":"60","author":"Rashid","year":"2016","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_3","first-page":"99","article-title":"Real-World Applications of Distributed Clustering Mechanism in Dense Wireless Sensor Networks","volume":"2","author":"Prabhu","year":"2013","journal-title":"Int. J. Comput. Commun. Netw."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1805","DOI":"10.1109\/TPDS.2011.302","article-title":"A Cloud-Based Scheme for Protecting Source-Location Privacy against Hotspot-Locating Attack in Wireless Sensor Networks","volume":"23","author":"Mahmoud","year":"2012","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1016\/j.ins.2018.02.064","article-title":"Source-Location Privacy Full Protection in Wireless Sensor Networks","volume":"444","author":"Wang","year":"2018","journal-title":"Inf. Sci."},{"key":"ref_6","first-page":"1","article-title":"Towards statistically strong source anonymity for sensor networks","volume":"9","author":"Yang","year":"2013","journal-title":"ACM Trans. Sens. Netw."},{"key":"ref_7","unstructured":"Yang, Y., Shao, M., Zhu, S., Urgaonkar, B., and Cao, G. (April, January 31). Towards event source unobservability with minimum network traffic in sensor networks. Proceedings of the ACM Conference on Wireless Network Security, Alexandria, VA, USA."},{"key":"ref_8","unstructured":"Kamat, P., Zhang, Y., Trappe, W., and Ozturk, C. (2005, January 6\u201310). Enhancing Source-Location Privacy in Sensor Network Routing. Proceedings of the IEEE International Conference on Distributed Computing Systems, Columbus, OH, USA."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Ozturk, C., Zhang, Y., and Trappe, W. (2004, January 25). Source-location privacy in energy-constrained sensor network routing. Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks, Washington, DC, USA.","DOI":"10.1145\/1029102.1029117"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1512","DOI":"10.1016\/j.comnet.2009.02.002","article-title":"Privacy-aware routing in sensor networks","volume":"53","author":"Wang","year":"2009","journal-title":"Comput. Netw."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Pongaliur, K., and Xiao, L. (2011, January 10\u201315). Maintaining source privacy under eavesdropping and node compromise attacks. Proceedings of the INFOCOM, Shanghai, China.","DOI":"10.1109\/INFCOM.2011.5934959"},{"key":"ref_12","unstructured":"Yasmin, R., Ritter, E., and Wang, G. (July, January 29). An Authentication Framework for Wireless Sensor Networks using Identity-Based Signatures. Proceedings of the IEEE International Conference on Computer and Information Technology, IEEE Computer Society, Bradford, UK."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"750","DOI":"10.1109\/TPDS.2013.43","article-title":"Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks","volume":"25","author":"Lu","year":"2014","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Banerjee, P., Jacobson, D., and Lahiri, S.N. (2007, January 12\u201314). Security and performance analysis of a secure clustering protocol for sensor networks. Proceedings of the IEEE International Symposium on Network Computing and Applications, Cambridge, MA, USA.","DOI":"10.1109\/NCA.2007.40"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Zhang, K., Wang, C., and Wang, C. (2008, January 12\u201314). A Secure Routing Protocol for Cluster-Based Wireless Sensor Networks Using Group Key Management. Proceedings of the International Conference on Wireless Communications, NETWORKING and Mobile Computing, Dalian, China.","DOI":"10.1109\/WiCom.2008.889"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Lu, R., Lin, X., Zhu, H., and Shen, X. (2010, January 23\u201327). TESP2: Timed Efficient Source Privacy Preservation Scheme for Wireless Sensor Networks. Proceedings of the 2010 IEEE International Conference on Communications, Cape Town, South Africa.","DOI":"10.1109\/ICC.2010.5502142"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1016\/j.csi.2011.01.001","article-title":"Maximizing lifetime of event-unobservable wireless sensor networks","volume":"33","author":"Bicakci","year":"2011","journal-title":"Comput. Standards Interfaces"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Del-Valle-Soto, C., Mex-Perera, C., Monroy, R., and Nolazco-Flores, J.A. (2017). MPH-M, AODV-M and DSR-M Performance Evaluation under Jamming Attacks. Sensors, 17.","DOI":"10.3390\/s17071573"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Karp, B., and Kung, H.T. (2000, January 6\u201311). GPSR: Greedy perimeter stateless routing for wireless networks. Proceedings of the International Conference on Mobile Computing and NETWORKING, Boston, MA, USA.","DOI":"10.1145\/345910.345953"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Intanagonwiwat, C., Govindan, R., and Estrin, D. (2000, January 6\u201311). Directed diffusion: A scalable and robust communication paradigm for sensor networks. Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, Boston, MA, USA.","DOI":"10.1145\/345910.345920"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Wang, N., and Zeng, J. (2017). All-Direction Random Routing for Source-Location Privacy Protecting against Parasitic Sensor Networks. Sensors, 17.","DOI":"10.3390\/s17030614"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/1\/114\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T15:36:49Z","timestamp":1760197009000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/1\/114"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,31]]},"references-count":21,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2019,1]]}},"alternative-id":["s19010114"],"URL":"https:\/\/doi.org\/10.3390\/s19010114","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2018,12,31]]}}}