{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T09:40:14Z","timestamp":1773740414215,"version":"3.50.1"},"reference-count":33,"publisher":"MDPI AG","issue":"9","license":[{"start":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T00:00:00Z","timestamp":1556755200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Wireless Sensor Network is a network of large number of nodes with limited power and computational capabilities. It has the potential of event monitoring in unattended locations where there is a chance of unauthorized access. The work that is presented here identifies and addresses the problem of eavesdropping in the exposed environment of the sensor network, which makes it easy for the adversary to trace the packets to find the originator source node, hence compromising the contextual privacy. Our scheme provides an enhanced three-level security system for source location privacy. The base station is at the center of square grid of four quadrants and it is surrounded by a ring of flooding nodes, which act as a first step in confusing the adversary. The fake node is deployed in the opposite quadrant of actual source and start reporting base station. The selection of phantom node using our algorithm in another quadrant provides the third level of confusion. The results show that Dissemination in Wireless Sensor Networks (DeLP) has reduced the energy utilization by 50% percent, increased the safety period by 26%, while providing a six times more packet delivery ratio along with a further 15% decrease in the packet delivery delay as compared to the tree-based scheme. It also provides 334% more safety period than the phantom routing, while it lags behind in other parameters due to the simplicity of phantom scheme. This work illustrates the privacy protection of the source node and the designed procedure may be useful in designing more robust algorithms for location privacy.<\/jats:p>","DOI":"10.3390\/s19092050","type":"journal-article","created":{"date-parts":[[2019,5,7]],"date-time":"2019-05-07T03:15:46Z","timestamp":1557198946000},"page":"2050","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["An Enhanced Source Location Privacy based on Data Dissemination in Wireless Sensor Networks (DeLP)"],"prefix":"10.3390","volume":"19","author":[{"given":"Naveed","family":"Jan","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering, CECOS University of IT and Emerging Sciences, Peshawar 250000, Pakistan"}]},{"given":"Ali","family":"Al-Bayatti","sequence":"additional","affiliation":[{"name":"School of Computer Science and Informatics, De Montfort University, Leicester LE1 9BH, UK"}]},{"given":"Naseer","family":"Alalwan","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Community College, King Saud University, Riyadh 11437, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5903-7383","authenticated-orcid":false,"given":"Ahmed","family":"Alzahrani","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Community College, King Saud University, Riyadh 11437, Saudi Arabia"}]}],"member":"1968","published-online":{"date-parts":[[2019,5,2]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/MWC.2004.1368893","article-title":"Routing techniques in wireless sensor networks: A survey","volume":"11","author":"Kamal","year":"2004","journal-title":"IEEE Wirel. Commun."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Ozturk, C., Zhang, Y., and Trappe, W. (2004, January 25). Source-location privacy in energy-constrained sensor network routing. Proceedings of the 2nd ACM workshop on Security of Ad Hoc and Sensor Networks, SASN \u201804, Washington, DC, USA.","DOI":"10.1145\/1029102.1029117"},{"key":"ref_3","unstructured":"Kamat, P., Zhang, Y., Trappe, W., and Ozturk, C. (2005, January 6\u201310). Enhancing Source-Location Privacy in Sensor Network Routing. Proceedings of the 25th IEEE International Conference on Distributed Computing Systems, Columbus, OH, USA."},{"key":"ref_4","unstructured":"Xi, Y., Schwiebert, L., and Shi, W. (2006, January 25\u201329). Preserving Source Location Privacy in Monitoring-Based Wireless Sensor Networks. Proceedings of the 20th International Parallel and Distributed Processing Symposium, IPDPS, Rhodes Island, Greece."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Dong, M., Ota, K., and Liu, A. (2015, January 26\u201328). Preserving Source-Location Privacy through Redundant Fog Loop for Wireless Sensor Networks. Proceedings of the 2015 IEEE International Conference on Computer and Information Technology, Ubiquitous Computing and Communications, Dependable, Autonomic and Secure Computing, Pervasive Intelligence and Computing (CIT\/IUCC\/DASC\/PICOM), Liverpool, UK.","DOI":"10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.274"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"1805","DOI":"10.1109\/TPDS.2011.302","article-title":"Cloud-Based Scheme for Protecting Source Location Privacy Against Hotspot-Locating Attack in Wireless Sensor Networks","volume":"23","author":"Mahmoud","year":"2012","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"633","DOI":"10.1109\/ACCESS.2014.2332817","article-title":"Achieving source location privacy and network lifetime maximization through tree-based diversionary routing in wireless sensor networks","volume":"2","author":"Long","year":"2014","journal-title":"IEEE Access"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"29129","DOI":"10.3390\/s151129129","article-title":"Hiding the Source Based on Limited Flooding for Sensor Networks","volume":"15","author":"Chen","year":"2015","journal-title":"Sensors"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Hu, R., Dong, X., and Wang, D. (2014). Protecting Data Source Location Privacy in Wireless Sensor Networks against a Global Eavesdropper. Int. J. Distrib. Sens. Netw., 10.","DOI":"10.1155\/2014\/492802"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Mutalemwa, L.C., and Shin, S. (2018). Strategic Location-Based Random Routing for Source Location Privacy in Wireless Sensor Networks. Sensors, 18.","DOI":"10.3390\/s18072291"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Mutalemwa, L.C., and Shin, S. (2019). Achieving Source Location Privacy Protection in Monitoring Wireless Sensor Networks through Proxy Node Routing. Sensors, 19.","DOI":"10.3390\/s19051037"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Tefera, M.K., and Yang, X. (2019). A Game-Theoretic Framework to Preserve Location Information Privacy in Location-Based Service Applications. Sensors, 19.","DOI":"10.3390\/s19071581"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Wang, J., Zhu, R., Liu, S., and Cai, Z. (2018). Node Location Privacy Protection Based on Differentially Private Grids in Industrial Wireless Sensor Networks. Sensors, 18.","DOI":"10.3390\/s18020410"},{"key":"ref_14","first-page":"1","article-title":"A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks","volume":"4","author":"Padmavathi","year":"2009","journal-title":"Int. J. Comput. Sci. Inf. Secur."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1023\/A:1016598314198","article-title":"SPINS: Security protocols for sensor networks","volume":"8","author":"Perrig","year":"2002","journal-title":"Wirel. Netw."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Eschenaur, L., and Gligor, V. (2002, January 18\u201322). A key-management scheme for distributed sensor networks. Proceedings of the 9th ACM Conference on Computer and Communications Security, Washington, DC, USA.","DOI":"10.1145\/586110.586117"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Bohge, M., and Trappe, W. (2003, January 19). An authentication framework for hierarchical ad hoc sensor networks. Proceedings of the 2003 ACM Workshop on Wireless Security, San Diego, CA, USA.","DOI":"10.1145\/941322.941324"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Zhang, L. (2006, January 3\u20136). A self-adjusting directed random walk approach for enhancing source-location privacy in sensor network routing. Proceedings of the 2006 International Conference on Wireless Communications and Mobile Computing, Vancouver, BC, Canada.","DOI":"10.1145\/1143549.1143558"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Li, Y., and Ren, J. (2010, January 15\u201319). Source-Location Privacy through Dynamic Routing in Wireless Sensor Networks. Proceedings of the IEEE INFOCOM, San Diego, CA, USA.","DOI":"10.1109\/INFCOM.2010.5462096"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Gottumukkala, V.P.V., Pandit, V., Li, H., and Agrawal, D.P. (2012, January 10\u201315). Base-station Location Anonymity and Security Technique (BLAST) for Wireless Sensor Networks. Proceedings of the 2012 IEEE International Conference on Communications (ICC), Ottawa, ON, Canada.","DOI":"10.1109\/ICC.2012.6364762"},{"key":"ref_21","unstructured":"Hu, L., and Evans, D. (October, January 26). Localization for mobile sensor networks. Proceedings of the 10th Annual International Conference on Mobile Computing and Networking (MobiCom \u201804), Philadelphia, PA, USA."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Pudasaini, A., Devi, N.D., Hwang, S.S., and Shin, S. (2017, January 4\u20137). Directional random routing for enhancing source location privacy in wireless sensor networks. Proceedings of the 2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN), Milan, Italy.","DOI":"10.1109\/ICUFN.2017.7993806"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Huang, C., Ma, M., Liu, Y., and Liu, A. (2017). Preserving Source Location Privacy for Energy Harvesting WSNs. Sensors, 17.","DOI":"10.3390\/s17040724"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"272","DOI":"10.1109\/TMC.2004.16","article-title":"ASCENT: Adaptive Self-Configuring Sensor Networks Topologies","volume":"3","author":"Cerpa","year":"2004","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_25","unstructured":"Ye, W., Heidemann, J., and Estrin, D. (2002, January 23\u201327). An Energy-Efficient MAC Protocol for Wireless Sensor Networks. Proceedings of the IEEE INFOCOM\u201902, New York, NY, USA."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1145\/358549.358563","article-title":"Untraceable electronic mail, return addresses, and digital pseudonyms","volume":"24","author":"Chaum","year":"1981","journal-title":"Commun. ACM"},{"key":"ref_27","first-page":"482","article-title":"Anonymous connections and onion routing","volume":"16","author":"Syverson","year":"1997","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Shi, R., Goswami, M., Gao, J., and Gu, X. (2013, January 14\u201319). Is random walk truly memoryless\u2014Traffic analysis and source location privacy under random walks. Proceedings of the IEEE INFOCOM, Turin, Italy.","DOI":"10.1109\/INFCOM.2013.6567114"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"2631","DOI":"10.1007\/s13369-016-2281-5","article-title":"Modeling of Wireless Sensor Networks with Minimum Energy Consumption","volume":"42","author":"Ali","year":"2017","journal-title":"Arab. J. Sci. Eng."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"1637","DOI":"10.1007\/s13369-015-1641-x","article-title":"Distance-Based Residual Energy-Efficient Stable Election Protocol for WSNs","volume":"40","author":"Mittal","year":"2015","journal-title":"Arab. J. Sci. Eng."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"3771","DOI":"10.1007\/s13369-014-1059-x","article-title":"Balancing the Network Clusters for the Lifetime Enhancement in Dense Wireless Sensor Networks","volume":"39","author":"Abusaimeh","year":"2014","journal-title":"Arab. J. Sci. Eng."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1007\/s13369-012-0207-4","article-title":"Sensor Management Under Tracking Accuracy and Energy Constraints in Wireless Sensor Networks","volume":"37","author":"Zoghi","year":"2012","journal-title":"Arab. J. Sci. Eng."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"669","DOI":"10.1007\/s13369-016-2304-2","article-title":"ECS: An Energy-Efficient Approach to Select Cluster-Head in Wireless Sensor Networks","volume":"42","author":"Pati","year":"2017","journal-title":"Arab. J. Sci. Eng."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/9\/2050\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T12:48:46Z","timestamp":1760186926000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/9\/2050"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,2]]},"references-count":33,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2019,5]]}},"alternative-id":["s19092050"],"URL":"https:\/\/doi.org\/10.3390\/s19092050","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,5,2]]}}}