{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:08:40Z","timestamp":1773655720383,"version":"3.50.1"},"reference-count":27,"publisher":"MDPI AG","issue":"5","license":[{"start":{"date-parts":[[2019,5,5]],"date-time":"2019-05-05T00:00:00Z","timestamp":1557014400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61402225"],"award-info":[{"award-number":["61402225"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61373015"],"award-info":[{"award-number":["61373015"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["41301407"],"award-info":[{"award-number":["41301407"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"the National Natural Science Foundation of Jiangsu Province","award":["BK20140832"],"award-info":[{"award-number":["BK20140832"]}]},{"name":"the China Postdoctoral Science Foundation","award":["2013M540447"],"award-info":[{"award-number":["2013M540447"]}]},{"name":"the Jiangsu Postdoctoral Science Foundation","award":["1301020C"],"award-info":[{"award-number":["1301020C"]}]},{"name":"State Key Laboratory for smart grid protection and operation control Foundation"},{"name":"Science and Technology Funds from National Electric Net Ltd.(The Research on Key Technologies of Distributed Parallel Database Storage and Processing based on Big Data)"},{"name":"the Foundation of Graduate Innovation Center in NUAA","award":["kfjj20181608"],"award-info":[{"award-number":["kfjj20181608"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>With the aim of addressing the problem of high overhead and unstable performance of the existing Source Location Privacy (SLP) protection algorithms, this paper proposes an efficient algorithm based on Circular Trap (CT) which integrates the routing layer and MAC layer protocol to provide SLP protection for WSNs. This algorithm allocates time slots for each node in the network by using Time Division Multiple Access (TDMA) technology, so that data loss caused by channel collisions can be avoided. At the same time, a circular trap route is formed to induce an attacker to first detect the packets from the nodes on the circular route, thereby moving away from the real route and protecting the SLP. The experimental results demonstrate that the CT algorithm can prevent the attacker from tracking the source location by 20% to 50% compared to the existing cross-layer SLP-aware algorithm.<\/jats:p>","DOI":"10.3390\/sym11050632","type":"journal-article","created":{"date-parts":[[2019,5,9]],"date-time":"2019-05-09T11:22:35Z","timestamp":1557400955000},"page":"632","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["An Efficient Source Location Privacy Protection Algorithm Based on Circular Trap for Wireless Sensor Networks"],"prefix":"10.3390","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0350-3952","authenticated-orcid":false,"given":"Yiting","family":"Wang","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4903-2666","authenticated-orcid":false,"given":"Liang","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China"}]},{"given":"Wenzhao","family":"Gao","sequence":"additional","affiliation":[{"name":"Department of Computer Science, The University of Hong Kong, Hong Kong 999077, China"}]}],"member":"1968","published-online":{"date-parts":[[2019,5,5]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Szewczyk, R., Mainwaring, A., Polastre, J., Anderson, J., and Culler, D. (2004, January 3\u20135). An analysis of a large scale habitat monitoring application. Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, Baltimore, MD, USA.","DOI":"10.1145\/1031495.1031521"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1109\/JETCAS.2013.2243032","article-title":"Design of a WSN platform for long-term environmental monitoring for IoT applications","volume":"3","author":"Lazarescu","year":"2013","journal-title":"IEEE J. Emerg. Sel. Top. Circuit. Syst."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Tellez, M., El-Tawab, S., and Heydari, H.M. (2016, January 29). Improving the security of wireless sensor networks in an IoT environmental monitoring system. Proceedings of the 2016 IEEE Systems and Information Engineering Design Symposium (SIEDS), Charlottesville, VA, USA.","DOI":"10.1109\/SIEDS.2016.7489330"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"29535","DOI":"10.3390\/s151129535","article-title":"A real-time monitoring system of industry carbon monoxide based on wireless sensor networks","volume":"15","author":"Yang","year":"2015","journal-title":"Sensors"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/WC-M.2006.250358","article-title":"Mobeyes: Smart mobs for urban monitoring with a vehicular sensor network","volume":"13","author":"Lee","year":"2006","journal-title":"IEEE Wirel. Commun."},{"key":"ref_6","first-page":"1207","article-title":"Internet of things based smart transportation systems","volume":"2","author":"Sherly","year":"2015","journal-title":"Int. Res. J. Eng. Technol."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"14050","DOI":"10.3390\/s140814050","article-title":"Analysis of vehicle detection with WSN-based ultrasonic sensors","volume":"14","author":"Jo","year":"2014","journal-title":"Sensors"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Srivastava, J.R., and Sudarshan, T. (2013, January 27\u201330). Intelligent traffic management with wireless sensor networks. Proceedings of the 2013 ACS International Conference on Computer Systems and Applications (AICCSA), Ifrane, Morocco.","DOI":"10.1109\/AICCSA.2013.6616429"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"266","DOI":"10.1109\/SURV.2013.050113.00191","article-title":"A survey of intrusion detection systems in wireless sensor networks","volume":"16","author":"Butun","year":"2014","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Furtak, J., Zieli\u0144ski, Z., and Chudzikiewicz, J. (2016, January 12\u201314). Security techniques for the WSN link layer within military IoT. Proceedings of the 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), Reston, VA, USA.","DOI":"10.1109\/WF-IoT.2016.7845508"},{"key":"ref_11","unstructured":"Stankovic, J., Cao, Q., Doan, T., Fang, L., He, Z., Kiran, R., Lin, S., Son, S., Stoleru, R., and Wood, A. (2005, January 2\u20133). Wireless sensor networks for in-home healthcare: Potential and challenges. Proceedings of the High Confidence Medical Device Software and Systems (HCMDSS) Workshop, Philadelphia, PA, USA."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"602","DOI":"10.1016\/j.future.2016.12.023","article-title":"CUIDATS: An RFID\u2013WSN hybrid monitoring system for smart health care environments","volume":"78","author":"Adame","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Ozturk, C., Zhang, Y., and Trappe, W. (2004, January 25). Source-location privacy in energy-constrained sensor network routing. Proceedings of the 2nd ACM workshop on Security of ad hoc and Sensor Networks, Washington, DC, USA.","DOI":"10.1145\/1029102.1029117"},{"key":"ref_14","unstructured":"Kamat, P., Zhang, Y., Trappe, W., and Ozturk, C. (2005, January 6\u201310). Enhancing source-location privacy in sensor network routing. Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS\u201905), Columbus, OH, USA."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Lightfoot, L., Li, Y., and Ren, J. (2010, January 6\u201310). Preserving source-location privacy in wireless sensor network using STaR routing. Proceedings of the 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, Miami, FL, USA.","DOI":"10.1109\/GLOCOM.2010.5683603"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Huang, J., Sun, M., Zhu, S., Sun, Y., Xing, C.C., and Duan, Q. (2015, January 13\u201317). A source-location privacy protection strategy via pseudo normal distribution-based phantom routing in WSNs. Proceedings of the 30th Annual ACM Symposium on Applied Computing, Salamanca, Spain.","DOI":"10.1145\/2695664.2695843"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1109\/TMC.2011.32","article-title":"Protecting location privacy in sensor networks against a global eavesdropper","volume":"11","author":"Mehta","year":"2012","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_18","unstructured":"Yang, Y., Shao, M., Zhu, S., Urgaonkar, B., and Cao, G. (April, January 31). Towards event source unobservability with minimum network traffic in sensor networks. Proceedings of the First ACM Conference on Wireless Network Security, Alexandria, VA, USA."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Kirton, J., Bradbury, M., and Jhumka, A. (2017, January 5\u20138). Source location privacy-aware data aggregation scheduling for wireless sensor networks. Proceedings of the 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), Atlanta, GA, USA.","DOI":"10.1109\/ICDCS.2017.171"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1238","DOI":"10.1109\/SURV.2013.011413.00118","article-title":"Providing source location privacy in wireless sensor networks: A survey","volume":"15","author":"Conti","year":"2013","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"298","DOI":"10.1007\/s11859-016-1174-5","article-title":"A novel routing strategy to provide source location privacy in wireless sensor networks","volume":"21","author":"Li","year":"2016","journal-title":"Wuhan Univ. J. Nat. Sci."},{"key":"ref_22","first-page":"203","article-title":"Intelligent Silent Zone for Source-Location Privacy Based on Context-Awareness in WSNs","volume":"23","author":"Qian","year":"2018","journal-title":"Trans. Nanjing Univ. Aeronaut. Astronaut."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Shao, M., Hu, W., Zhu, S., Cao, G., Krishnamurth, S., and La Porta, T. (2009, January 22\u201326). Cross-layer enhanced source location privacy in sensor networks. Proceedings of the 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, Rome, Italy.","DOI":"10.1109\/SAHCN.2009.5168923"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Cionca, V., Newe, T., and Dad\u00e2rlat, V. (2008, January 25\u201331). TDMA protocol requirements for wireless sensor networks. Proceedings of the 2008 Second International Conference on Sensor Technologies and Applications (sensorcomm 2008), Cap Esterel, France.","DOI":"10.1109\/SENSORCOMM.2008.69"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Bai, R.G., Qu, Y.G., Guo, Y., and Zhao, B.H. (2007, January 11\u201314). An energy-efficient TDMA MAC for wireless sensor networks. Proceedings of the 2nd IEEE Asia-Pacific Service Computing Conference (APSCC 2007), Tsukuba Science City, Japan.","DOI":"10.1109\/APSCC.2007.4414443"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"312","DOI":"10.1109\/ACCESS.2016.2515096","article-title":"BEST-MAC: Bitmap-assisted efficient and scalable TDMA-based WSN MAC protocol for smart cities","volume":"4","author":"Alvi","year":"2016","journal-title":"IEEE Access"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/s10619-007-7018-8","article-title":"Adaptive processing of historical spatial range queries in peer-to-peer sensor networks","volume":"22","author":"Coman","year":"2007","journal-title":"Distrib. Parallel Databases"}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/11\/5\/632\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T12:49:17Z","timestamp":1760186957000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/11\/5\/632"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,5]]},"references-count":27,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2019,5]]}},"alternative-id":["sym11050632"],"URL":"https:\/\/doi.org\/10.3390\/sym11050632","relation":{},"ISSN":["2073-8994"],"issn-type":[{"value":"2073-8994","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,5,5]]}}}