3.2 Adversary Model
Given the network model above, the goal of adversary
is to find the location of source node. In this section
we describe what type of adversary we assume.
According to (Conti et al., 2013), adversaries can
be classified according to different categories: based
on their behaviors, adversaries can be external or in-
ternal, and can be active or passive. An external ad-
versary cannot compromise a sensor node whereas
an internal sensor node can. An active adversary
can modify the behavior or the message traffic of
the nodes whereas a passive adversary cannot. More
about adversary types can be found in (Conti et al.,
2013).
Based on its capabilities, an adversary can be clas-
sified as global or local (Conti et al., 2013). A global
adversary can view the entire network whereas a lo-
cal adversary can view only the neighbourhood. More
specifically, a local adversary needs to trace the trans-
mitted packets to locate the source as the adversary
can see only its neighbourhood. Whereas a global ad-
versary need to trace packets as it can see the source
directly from the message traffic. Therefore, it is
harder to provide location privacy against global ad-
versaries.
In this work, we assume a global, external, and
passive adversary. In other words, we assume the ad-
versary to have a device that is capable to monitor
the whole network traffic. We also assume that the
adversary knows the locations of all sensor nodes in
the network, can eavesdrop, store and analyze pack-
ets. We also assume that the adversary cannot can-
not alter packets, compromise nodes, and identify the
source location based on the eavesdropped packets.
4 PROBLEM STATEMENT AND
PROPOSED SOLUTION
In this section, we define the problem and present a
solution for the problem.
4.1 Problem Statement
Given the network and adversary models, the ques-
tion is: how source nodes are able to quickly route the
packets towards the sink such that the global adver-
sary cannot detect the source nodes, and at the same
time utilize the energy efficiently.
If the source node is the only node transmitting in
a given time interval, as the global adversary has the
ability to monitor message transmissions in the net-
work, the adversary can locate the source node with-
out difficulty. For that reason, not only the source
node, but also fake sources should keep transmitting
fake packets to obfuscate the adversary. As the most
energy is consumed due to packet transmissions, the
number of transmitted fake packets should be reduced
as much as possible without decreasing the privacy
of the source nodes; and the real packets should be
routed towards the sink as quick as possible. Now the
question is which nodes should transmit fake pack-
ets, how frequently they should transmit, and how real
packets should be routed towards the sink.
Formally, we can summarize the problem as fol-
lows: Given a network topology G = (V,E), the total
number of transmitted packets P
T
= P
T
R
+ P
T
F
during
the interval T , where P
T
R
and P
T
F
are the numbers of
transmitted real and fake packets, respectively. As the
number of real packets, P
T
R
, cannot be decreased, the
objective is to reduce P
T
F
as much as possible and se-
lect a path p = s,u,v, ...,S, where s is a source node
and S is the sink, such that p delivers the real packet
of s as quickly as possible.
4.2 Proposed Solution
A straightforward solution to this problem is to let all
nodes, both source nodes and fake sources, transmit
packets periodically even if there is no real packet to
send. That is, in every time interval t ≤ T , P
t
= P
t
R
+
P
t
F
= |V | even if P
t
R
= 0, which means P
t
= P
t
F
= |V |.
In such a case, the adversary cannot differentiate the
source node from fake sources. However, transmit-
ting fake packets periodically is costly as the packet
transmission and reception operations consume the
largest amount of energy (Akyildiz et al., 2002b).
Another solution is to have nodes send pack-
ets probabilistically, that is, as in (Ouyang et al.,
2008), (Bushnag et al., 2017), nodes send packets
based on a probability. In a specific time interval, a
node randomly chooses a number, if that number is
smaller than a threshold value, then the node sends a
packet. However, there is a trade-off between packet
overhead and delay. If the delay is decreased, then
the packet overhead is increased or vice versa. More-
over, this approach decreases the delivery ratio. That
is, real packets may not reach the sink.
Our scheme, called Snowflake (see Algorithm 1),
addresses this problem by changing the mechanism
of sending fake packets. Snowflake does not use a
probabilistic packet transmission, but uses a periodic
packet transmissions to make the delivery ratio 100%.
Despite periodic packet transmissions Snowflake can
still reduce the packet overhead and delay. The idea is
to have relatively small number of nodes, called main
nodes, send packets frequently, and the rest, a con-
Snowflake: An Adaptive Energy and Delay Efficient Scheme for Source Location Privacy in Wireless Sensor Networks
83