Sink Node location privacy in sensor networks deployed in Industrial Internet of Things (IIOT) is one of the challenging tasks because of data security and protection. In industrial sensor networks, sensor nodes transfer data packets from a source node to sink node (base station) by using the multi-hop technique. Based on the nature of the sensor network, adversaries may easily track the sink node location by traffic analysis. There are many approaches to overcome this problem. In this paper, we proposed an approach to preserve the privacy of the sink node in addition to secured data transmission from adversaries attacks. In our work, random fake sink node (RFSN) approach is used to mislead the adversary. After forming the clusters, and cluster heads (CH), one of the cluster head will be selected randomly as fake sink node (FSN), and all other CHs send fake data packets to this FSN to mislead adversary. Fake sink nodes are changed dynamically at intervals to make it difficult for an adversary to distinguish between FSN and original sink node. The simulation results show the privacy of the sink node location is preserved from the adversaries with an elongated lifetime of sensor nodes. The simulation result also proved that the proposed approach with RSA algorithm has provided more security with low packet loss.
IIOT, wireless sensor network, privacy preservation, adversaries attacks, Random fake sink node, RFSN-RSA, cluster head
 Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E. (2002). Wireless sensor networks: A survey. Computer Networks 38(4): 393–422. https://doi.org/ 10.1016/S1389-1286(01)00302-4
 Hansen E, Neander J, Nolin M, Bj M. (2009). Efficient Cluster Formation for Sensor Networks, 1–8.
 Li N, Zhang N, Das SK, Thuraisingham B. (2009). Privacy preservation in wireless sensor networks: A state-of-the-art survey. Ad Hoc Networks 7(8): 1501–1514. https://doi.org/10.1016/j.adhoc.2009.04.009
 Poe WY, Schmitt JB. (2009). Sink placement without location information in large-scale wireless sensor networks. Asian Internet Engineering Conference 69-76. https://doi.org/10.1145/1711113.1711126
 Ebrahimi Y, Younis M. (2011). Using deceptive packets to increase base-station anonymity in wireless sensor network. In 2011 7th International Wireless Communications and Mobile Computing Conference, IEEE 842–847. https://doi.org/10.1109/IWCMC.2011.5982656
 Ying B, Gallardo JR, Makrakis D, Mouftah HT. (2011). Concealing of the sink location in wsns by artificially homogenizing traffic intensity. In 2011 IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2011. https://doi.org/10.1109/ INFCOMW.2011.5928957
 Liu Z, Xu W. (2012). Determining sink location through Zeroing-In attackers in wireless sensor networks. Wireless Networks 18(3): 335–349. https://doi.org/10.1007/s11276-011-0403-2
 Wang G, Kim D, Cho G. (2012). A secure cluster formation scheme in wireless sensor networks. International Journal of Distributed Sensor Networks 2012. https://doi.org/10.1155/2012/301750
 Chen F, Li R. (2013). Sink node placement strategies for wireless sensor networks. Wireless Personal Communications. https://doi.org/10.1007/s11277-011-0453-x
 Ngai ECH, Rodhe I. (2013). On providing location privacy for mobile sinks in wireless sensor networks. Wireless Networks 19(1): 115–130. https://doi.org/10.1007/s11276-012-0454-z
 Singh DP, Goudar RH, Wazid M. (2013). Hiding the sink location from the passive attack in WSN. In Procedia Engineering. https://doi.org/10.1016/ j.proeng.2013.09.072
 Al-Haija QA, Smadi M, Al-JA’Fari M, Al-ShuA’Ibi A. (2014). Efficient FPGA implementation of RSA coprocessor using scalable modules. Procedia Computer Science 34(Eicm): 647–654. https://doi.org/10.1016/ j.procs.2014.07.092
 Jain TK, Saini DS, Bhooshan SV. (2014). Cluster head selection in a homogeneous wireless sensor network ensuring full connectivity with minimum isolated nodes. Journal of Sensors 2014. https://doi.org/10.1155/2014/724219
 Ying BD, Makrakis D, Mouftah HT. (2014). Anti-traffic analysis attack for location privacy in WSNs. https://doi.org/10.1186/1687-1499-2014-131
 Abuzneid AS, Sobh T, Faezipour M. (2015). An enhanced communication protocol for location privacy in WSN. International Journal of Distributed Sensor Networks 2015. https://doi.org/10.1155/2015/697098
 Bangash Y, Zeng L, Feng D. (2015). MimiBS: Mimicking Base-Station to provide location privacy protection in wireless sensor networks. Proceedings of the 2015 IEEE International Conference on Networking, Architecture and Storage, NAS 2015 158–166. https://doi.org/10.1109/NAS.2015.7255210
 Chen H, Lou W. (2015). On protecting end-to-end location privacy against local eavesdropper in wireless sensor networks. Pervasive and Mobile Computing 16(PA) 36–50. https://doi.org/10.1016/j.pmcj.2014.01.006
 Long J, Liu A, Dong M, Li Z. (2015). An energy-efficient and sink-location privacy enhanced scheme for WSNs through ring based routing. Journal of Parallel and Distributed Computing 81–82, 47–65. https://doi.org/10.1016/j.jpdc.2015.04.003
 Zhang JD, Chow CY. (2015). REAL: A Reciprocal Protocol for Location Privacy in Wireless Sensor Networks. IEEE Transactions on Dependable and Secure Computing. https://doi.org/10.1109/TDSC.2014.2366467
 Wang J, Wang F, Cao Z, Lin F, Wu J. (2017). Sink location privacy protection under direction attack in wireless sensor networks. Wireless Networks. https://doi.org/10.1007/s11276-015-1179-6
 Baroutis N, Younis M. (2017). Load-conscious maximization of base-station location privacy in wireless sensor networks. Computer Networks 124, 126–139. https://doi.org/10.1016/j.comnet.2017.06.021
 Sirajuddin M, Rupa Ch, Prasad A. (2018). A trusted model using improved-AODV in MANETS with packet loss reduction mechanism. Journal of Advances in Modelling and Analysis B 61(1): 15-22.
 Liyanage M, Chang C, Srirama S, Loke S. (2018). Indoor people density sensing using Wi-Fi and channel state informatin. Journal of Advances in Modelling and Analysis B 61(1): 37-47.