{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T03:26:19Z","timestamp":1760239579804,"version":"build-2065373602"},"reference-count":26,"publisher":"MDPI AG","issue":"22","license":[{"start":{"date-parts":[[2020,11,22]],"date-time":"2020-11-22T00:00:00Z","timestamp":1606003200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"EU Horizon 2020 DOMINOES Project","award":["771066"],"award-info":[{"award-number":["771066"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Anonymous technology is an effective way for protecting users\u2019 privacy. Anonymity in sensor networks is to prevent the unauthorized third party from revealing the identities of the communication parties. While, in unstable wireless sensor networks, frequent topology changes often lead to route-failure in anonymous communication. To deal with the problems of anonymous route-failure in unstable sensor networks, in this paper we propose a fully anonymous routing protocol with self-healing capability in unstable sensor networks by constructing a new key agreement scheme and proposing an anonymous identity scheme. The proposed protocol maintains full anonymity of sensor nodes with the self-healing capability of anonymous routes. The results from the performance analysis show that the proposed self-healing anonymity-focused protocol achieves full anonymity of source nodes, destination nodes, and communication association.<\/jats:p>","DOI":"10.3390\/s20226683","type":"journal-article","created":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T01:28:48Z","timestamp":1606094928000},"page":"6683","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["FarpScusn: Fully Anonymous Routing Protocol with Self-Healing Capability in Unstable Sensor Networks"],"prefix":"10.3390","volume":"20","author":[{"given":"Fengyin","family":"Li","sequence":"first","affiliation":[{"name":"School of Computer Science, Qufu Normal University, Rizhao 276826, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7410-7220","authenticated-orcid":false,"given":"Ying","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Qufu Normal University, Rizhao 276826, China"}]},{"given":"Hongwei","family":"Ju","sequence":"additional","affiliation":[{"name":"Experimental Teaching and Equipments Management Center,  Qufu Normal University, Rizhao 276826, China"}]},{"given":"Yanli","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Qufu Normal University, Rizhao 276826, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9483-8204","authenticated-orcid":false,"given":"Zhaojie","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Qufu Normal University, Rizhao 276826, China"}]},{"given":"Huiyu","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Informatics, University of Leicester, Leicester LE1 7RH, UK"}]}],"member":"1968","published-online":{"date-parts":[[2020,11,22]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Maddikunta, P.K.R., Srivastava, G., Gadekallu, T.R., Deepa, N., and Boopathy, P. (2020). Predictive model for battery life in IoT networks. IET Intell. Transp. Syst.","DOI":"10.1049\/iet-its.2020.0009"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Maddikunta, P.K.R., Gadekallu, T.R., Srivastava, R.K.G., Parizi, R.M., and Khan, M.S. (2020). Green communication in IoT networks using a hybrid optimization algorithm. Comput. Commun.","DOI":"10.1016\/j.comcom.2020.05.020"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1016\/j.future.2017.09.043","article-title":"Energy and interoperable aware routing for throughput optimization in clustered IoT-wireless sensor networks","volume":"81","author":"Shah","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"4187","DOI":"10.1109\/TII.2019.2936869","article-title":"BeCome: Blockchain-Enabled Computation Offloading for IoT in Mobile Edge Computing","volume":"16","author":"Xu","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Qi, L., Hu, C., Zhang, X., Khosravi, M.R., Sharma, S., Pang, S., and Wang, T. (2020). Privacy-aware Data Fusion and Prediction with Spatial-Temporal Context for Smart City Industrial Environment. IEEE Trans. Ind. Inform.","DOI":"10.1109\/TII.2020.3012157"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Qi, L., Wang, X., Xu, X., Dou, W., and Li, S. (2020). Privacy-Aware Cross-Platform Service Recommendation based on Enhanced Locality-Sensitive Hashing. IEEE Trans. Netw. Sci. Eng.","DOI":"10.1109\/TNSE.2020.2969489"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., and Syverson, P. (2004). Tor: The Second-Generation Onion Router. Paul Syverson.","DOI":"10.21236\/ADA465464"},{"key":"ref_8","unstructured":"Mougy, A.E., and Sameh, S. (2018, January 19\u201321). Preserving Privacy in Wireless Sensor Networks using Onion Routing. Proceedings of the 2018 International Symposium on Networks, Computers and Communications (ISNCC), Rome, Italy."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Zhou, L., Shan, Y., and Chen, X. (2019, January 15\u201317). An Anonymous Routing Scheme for Preserving Location Privacy in Wireless Sensor Networks. Proceedings of the 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), Chengdu, China.","DOI":"10.1109\/ITNEC.2019.8728980"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Baranov, N., Bashkin, M., and Bashkin, V.A. (2019, January 26\u201328). Self-Healing Anonymous Routing in Unstable Sensor Networks. Proceedings of the 2019 7th International Conference on Future Internet of Things and Cloud (FiCloud), Istanbul, Turkey.","DOI":"10.1109\/FiCloud.2019.00020"},{"key":"ref_11","unstructured":"Chen, W. (2009). A Study on Fast Self-healing Routinghealing Routing Technology. [Ph.D. Thesis, PLA Information Engineering University]."},{"key":"ref_12","first-page":"14","article-title":"Research on centralized self-healing routing algorithm based on wireless mesh network","volume":"41","author":"Zhang","year":"2015","journal-title":"Electron. Technol. Appl."},{"key":"ref_13","unstructured":"Zhu, J., and Tu, P. (2012). A Node Identification Mechanism Based on Shared Key in Wireless Sensor Networks. Mod. Electron. Technol."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1016\/j.comcom.2020.04.018","article-title":"Multi-Dimensional Quality-Driven Service Recommendation with Privacy-Preservation in Mobile Edge Environment","volume":"157","author":"Zhong","year":"2020","journal-title":"Comput. Commun."},{"key":"ref_15","unstructured":"Chen, J., Cui, G., Hong, L., and Fu, C. (2007). Security Anonymous On-demand Routing Protocol in ad hoc Networks. Comput. Sci."},{"key":"ref_16","first-page":"7","article-title":"A Study on Cluster Routing Algorithm for Wireless Sensor Networks Based on Energy Optimization","volume":"2","author":"Wang","year":"2018","journal-title":"Fujian Comput."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Sy, D., Chen, R., and Bao, L. (2006, January 9\u201312). ODAR: On-Demand Anonymous Routing in Ad Hoc Networks. Proceedings of the 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems, Vancouver, BC, Canada.","DOI":"10.1109\/MOBHOC.2006.278565"},{"key":"ref_18","unstructured":"Xia, Z. (2017). Research on AODV Based High Dynamic Stability Routing Protocol. [Ph.D. Thesis, Harbin Institute of Technology]."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Cramer, R., Damgard, I., and Nielsen, J.B. (2001). Multiparty Computation from Threshold Homomorphic Encryption. Advances in Cryptology \u2014EUROCRYPT 2001. EUROCRYPT 2001, Springer.","DOI":"10.1007\/3-540-44987-6_18"},{"key":"ref_20","first-page":"1","article-title":"Paillier Analysis of Homomorphism and Efficiency of Public Key Cryptosystem","volume":"20","author":"Bai","year":"2012","journal-title":"J. Beijing Inst. Electron. Sci. Technol."},{"key":"ref_21","unstructured":"Kanwal, G. (2015, January 16\u201319). Communication Scheme for Wireless Sensor Networks to maintain Anonymity. Proceedings of the 2015 International Conference on Computing, Networking and Communications (ICNC), Garden Grove, CA, USA."},{"key":"ref_22","first-page":"75","article-title":"A node location method for wireless sensor networks based on random walk","volume":"41","author":"Yin","year":"2018","journal-title":"J. Beijing Univ. Posts Telecommun."},{"key":"ref_23","first-page":"65","article-title":"A Review of Wireless Sensor Networks","volume":"14","author":"Wu","year":"2018","journal-title":"Sci. Technol. Innov. Appl."},{"key":"ref_24","first-page":"943","article-title":"Network Fault and Self-healing Routing Model and Algorithm","volume":"40","author":"Xu","year":"2010","journal-title":"Chin. Sci. Inf. Sci."},{"key":"ref_25","first-page":"201","article-title":"A Wireless Sensor Network Location Algorithm Based on Reliable Beacon and Node Degree Estimation","volume":"39","author":"Qian","year":"2019","journal-title":"Comput. Appl."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"298","DOI":"10.1016\/j.scs.2018.02.022","article-title":"3D weighted centroid algorithm & RSSI ranging model strategy for node localization in WSN based on smart devices","volume":"39","author":"Shah","year":"2018","journal-title":"Sustain. Cities Soc."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/22\/6683\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T10:35:46Z","timestamp":1760178946000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/22\/6683"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,22]]},"references-count":26,"journal-issue":{"issue":"22","published-online":{"date-parts":[[2020,11]]}},"alternative-id":["s20226683"],"URL":"https:\/\/doi.org\/10.3390\/s20226683","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2020,11,22]]}}}