Dynamic Privacy-Aware Routing (DyPAR) for Wireless Sensor Networks
Article Sidebar
Main Article Content
Abstract: The rapid expansion of the Internet of Things (IoT) has enabled pervasive sensing, automation, and data-driven decision-making. However, privacy and security challenges remain critical in Wireless Sensor Networks (WSNs), where limited computational and energy resources render traditional routing protocols vulnerable to traffic analysis, identity spoofing, and data manipulation. Existing routing schemes emphasize performance or energy efficiency but lack adaptive, privacy-aware mechanisms capable of responding to dynamic threats.
This paper presents Dynamic Privacy-Aware Routing (DyPAR), an adaptive probabilistic routing protocol that balances privacy preservation, energy efficiency, and computational feasibility for large-scale IoT networks. DyPAR incorporates entropy-based relay selection, dynamic adjustment of forwarding probabilities, and context-aware weighting to reduce adversarial traceability while maintaining efficient routing. The protocol integrates lightweight privacy-preserving components, including Efficient Key Management (EfKM), Privacy-Aware Data Aggregation (PrADA), and an Adaptive Privacy Parameter Change Mechanism (A2PCM) for real-time adjustment based on network conditions and data sensitivity.
Extensive simulations across heterogeneous network sizes and attack models show that DyPAR achieves high privacy compliance, strong resilience against Sybil, eavesdropping, and data-tampering attacks, and improved packet delivery performance relative to established privacy-aware routing baselines. While DyPAR maintains low energy consumption in benign scenarios, computational and energy overhead increase under multi-vector adversarial conditions, highlighting the need for further optimization in ultra–resource-constrained environments.
Future work will explore (i) lightweight cryptographic integration to reduce energy cost, (ii) federated learning–based adaptive routing to enhance real-time privacy decisions, (iii) real world and energy-efficient clustering for large-scale deployments, and (iv) blockchain-enabled distributed trust frameworks to mitigate identity spoofing and coordinated attacks.
Overall, DyPAR offers a scalable, adaptive, and privacy-preserving routing solution for next-generation IoT systems, providing a strong foundation for secure and resilient sensor network communication.
Downloads
References
Cisco. (2022). IoT device growth and market projections.
Statista. (2023). Global IoT market trends.
Stošić, L., Dimitrovska, M., & Stamenkova, L. P. (2023). From concept to reality: Understanding the Internet of Things. Science International. Retrieved from http://scienceij.com
Li, X., Wang, J., & Zhao, Y. (2023). IoT security and privacy challenges: A review. IEEE Internet of Things Journal.
Zyoud, S., & Zyoud, A. H. (2024). Internet of Things supporting sustainable solid waste management: Global insights, hotspots, and research trends. International Journal of Environmental Science. doi:10.1007/s13762-024-06146-x
Sicari, S., Rizzardi, A., Coen-Porisini, A., & Cappiello, C. (2014). Security, privacy, and trust in Internet of Things: The road ahead. Computer Networks, 76, 146–164.
Perkins, C. E., & Royer, E. M. (1999). Ad hoc On-Demand Distance Vector (AODV) routing. In Proc. 2nd IEEE Workshop on Mobile Computing Systems and Applications.
Heinzelman, W. B., Chandrakasan, A. P., & Balakrishnan, H. (2000). Energy-efficient communication protocol for wireless microsensor networks. IEEE Transactions on Wireless Communications, 1(4), 660–670.
Karp, B., & Kung, H. T. (2000). GPSR: Greedy perimeter stateless routing for wireless networks. In Proc. 6th Annu. Int. Conf. Mobile Comput. Netw. ACM.
Punniakodi, S., Samundiswary, P., Dananjayan, S., & Perumal, D. (2010). Secured Greedy Perimeter Stateless Routing for wireless sensor networks. International Journal of Ad Hoc, Sensor & Ubiquitous Computing, 1(2). doi:10.5121/ijasuc.2010.1202
Pirzada, A., & McDonald, C. (2007). Trusted Greedy Perimeter Stateless Routing. In Proceedings of IEEE ICON, pp. 206–211. doi:10.1109/ICON.2007.4444087
Sharma, S., Panda, S., Ramteke, R., & Kumar, S. (2012). Analysis of GPSR and its relevant attacks in wireless sensor networks. ACEEE International Journal on Network Security, 3(1).
Zhang, Y., Zhang, W., & Fang, Y. (2006). Anonymous communication in mobile ad hoc networks. IEEE Transactions on Vehicular Technology.
Lu, R., Lin, X., Zhu, H., & Shen, X. (2008). SPARK: A new attack-resilient anonymity protocol for wireless ad hoc networks. IEEE Transactions on Dependable and Secure Computing.
Zhang, J., Wang, Y., & Zhou, L. (2020). Adaptive privacy‐preserving mechanisms for IoT systems. Sensors.
Shi, W., Zhang, Y., & Lin, P. (2022). Lightweight cryptography for IoT: Challenges and solutions. IEEE Transactions on Computers.
Intanagonwiwat, C., Govindan, R., & Estrin, D. (2000). Directed diffusion: A scalable and robust communication paradigm for sensor networks. In Proc. 6th Annu. Int. Conf. Mobile Comput. Netw.
Perkins, C. E., Belding-Royer, E., & Das, S. (2003). Ad hoc On-Demand Distance Vector (AODV) routing. RFC 3561.
Nisha, S., & Suresh, M. (2024). Red-zone-based randomized angular routing for IoT security. Springer.
Behera, N. K., Radhika, A., & Merin, J. B. (2024). AI-enhanced intrusion detection and cluster head selection for QoS optimization in wireless sensor networks. Nanotechnology Research and Practice. Retrieved from http://nano-ntp.com
Kumar, A., & Malik, R. (2024). Machine learning-based routing attack detection in IoT networks. IEEE Internet of Things Journal.
Alwhbi, I. A., & Zou, C. C. (2024). Encrypted network traffic analysis and classification utilizing machine learning. Sensors, 24(11).
Kumar, P., & Lee, H.-J. (2012). Security issues in healthcare applications using wireless medical sensor networks: A survey. Sensors, 12(1), 55–91. doi:10.3390/s120100055
Daemen, J., & Rijmen, V. (2002). The design of Rijndael: AES—The Advanced Encryption Standard. Springer.
Gupta, P., Sharma, R., & Singh, M. (2024). Lightweight cryptographic solutions for IoT: A survey. ACM Transactions on Sensor Networks.
Khashan, O. A., Ahmad, R., & Khafajah, N. M. (2021). An automated lightweight encryption scheme for secure and energy-efficient communication in wireless sensor networks. Ad Hoc Networks, 114, 102495.
Nguyen, D. T., & Thai, P. (2024). Context-based authentication and secure federated learning for IoT anomaly detection. TU Darmstadt.
Wang, T., Liu, Z., & Zhang, Y. (2023). Blockchain-based secure data transmission in large-scale IoT networks. IEEE Internet of Things Journal.
Hoomod, H. K., Naif, J. R., & Ahmed, I. S. (2020). A new intelligent hybrid encryption algorithm for IoT data based on modified PRESENT-Speck and a novel 5D chaotic system. Periodicals of Engineering and Natural Sciences.
Saini, S. K. (2024). Shortest path routing algorithms for IoT communication based on graph theory. International Journal of Advanced Multidisciplinary Scientific Research.
Husnoo, M. A., Anwar, A., Chakrabortty, R. K., & Doss, R. (2021). Differential privacy for IoT-enabled critical infrastructure: A comprehensive survey. IEEE.
Makhdoom, I., Abolhasan, M., Lipman, J., & Shariati, N. (2024). Securing personally identifiable information: A survey of state-of-the-art techniques and a way forward. IEEE Transactions on Dependable and Secure Computing.
Yang, J. (2025). AFM-DViT: A framework for IoT-driven medical image analysis. Internet of Things, Elsevier.
Dwivedi, A. D., & Srivastava, G. (2023). Security analysis of lightweight IoT encryption algorithms: SIMON and SIMECK. Internet of Things, Elsevier.
He, M., Zhao, X., & Wang, X. (2024). An efficient DDoS detection method based on packet grouping via online data flow processing. IEEE Transactions on Sustainable Computing.
Kostiuk, Y., Skladannyi, P., Korshun, N., Bebeshko, B., & Khorolska, K. (2024). Cybersecurity threats and privacy mechanisms in edge computing. Cybersecurity. Available: https://elibrary.kubg.edu.ua/id/eprint/50153/1/Y_Kostiuk_P_Skladannyi_N_Korshun_B_Bebeshko_K_Khorolska_CPITS_2024_3826.pdf
Panadés, J., & Yuguero, R. (2025). Privacy-aware federated learning in large-scale IoT networks.
Kaswan, K. S., & Dhatterwal, J. S. (2024). Energy consumption and efficiency in federated learning for IoT. IET.
Dhanalakshmi, N. (2025). Unmasking encryption effects and modified deep learning approaches for attack classification in WSN. Elsevier.
Gramegna, F. (2025). Distributed reasoning for the autonomous coordination of smart object networks. PhD thesis, University of Naples Federico II.
Nguyen, C. H., Hoang, D. T., & Nguyen, D. N. (2024). Homomorphic encryption-enabled federated learning for privacy-preserving intrusion detection in resource-constrained IoV networks. In Proc. IEEE VTC2024.
Sermcheep, S. (2024). Digital connectivity in ASEAN: Enhancing IoT privacy mechanisms. In Indo-Pacific and ASEAN: New balances and new challenges. Available: https://books.google.com/books?hl=en&lr=&id=p6YtEQAAQBAJ&pg=RA1-PT79.
Anagnostopoulos, C., et al. (2024). Multimodal federated learning in AIoT systems: Existing solutions, applications, and challenges. IEEE.
Al-Azzawi, R. M. A., & Al-Dabbagh, S. S. M. (2023). Securing data in IoT-RFID-based systems using lightweight cryptography algorithms. In Proc. Int. Conf. Reliable Systems. Springer.
Hoomod, H. K., Humadi, Q., Yousif, I. A., & Hussein, S. A. (2023). New hybrid lightweight data encryption algorithm for operating system protocol in Internet-of-Things environment. ResearchGate preprint.
Al-Azzawi, R. M. A., & Al-Dabbagh, S. S. M. (2023). Securing data in IoT-RFID-based systems using lightweight cryptography algorithm. In Proc. Int. Conf. Reliable Systems. Springer.
Jasim, N. A., & ALRkabi, H. (2022). Design and implementation of a smart system for monitoring electrical energy based on the Internet of Things. Wasit Journal of Engineering Sciences.
Sevin, A., & Çavuşoğlu, Ü. (2024). Design and performance analysis of a SPECK-based lightweight hash function. Electronics (MDPI).
Safavat, S., & Rawat, D. B. (2023). Improved multiresolution neural network for mobility-aware security and content caching for Internet of Vehicles. IEEE Internet of Things Journal.
Sleem, L., & Couturier, R. (2021). Speck-R: An ultra lightweight cryptographic scheme for Internet of Things. Multimedia Tools and Applications. Available: https://link.springer.com/article/10.1007/s11042-020-09625-8
Panimalar, S., & Jacob, T. P. (2024). A congestion-aware routing system in wireless sensor networks based on bee colonies and intelligent butterfly optimisation. Wireless Personal Communications. Springer.
Ahmed, B., & Zakarya, B. (2024). ANEL: A novel efficient and lightweight authentication scheme for enhancing security in vehicular ad hoc networks using elliptic curve cryptography. Studies in Engineering and Exact Sciences.
Puthiyidam, J. J., Joseph, S., & Bhushan, B. (2024). Enhanced authentication security for IoT client nodes through T-ECDSA integrated into MQTT broker. The Journal of Supercomputing. Springer.
Ali, W., Din, I. U., & Almogren, A. (2024). Federated learning-based privacy-aware location prediction model for Internet of Vehicular Things. IEEE Transactions on Dependable and Secure Computing.
Shah, Z., Levula, A., Khurshid, K., Ahmed, J., & Ullah, I. (2021). Routing protocols for mobile Internet of Things: A survey on challenges and solutions. Electronics. MDPI.
Zhou, X., Huang, K., Li, L., & Zhang, M. (2024). I/O-efficient multi-criteria shortest paths query processing on large graphs. IEEE Transactions on Knowledge and Data Engineering.
Hu, Y., Xie, F., Yang, J., Zhao, J., Mao, Q., & Zhao, F. (2024). Efficient path planning algorithm based on laser SLAM and optimized visibility graph for robots. Remote Sensing. MDPI.
Jiang, W., Han, H., Zhang, Y., Wang, J., He, M., & Gu, W. (2024). Graph neural networks for routing optimization: Challenges and opportunities. Sustainability, 16(21). MDPI.
Zhao, G., Wang, Y, Mu, T., & Meng, Z. (2024). Reinforcement learning-assisted multi-UAV task allocation and path planning for IIoT. IEEE Internet of Things Journal.
Almuzaini, K. K., Joshi, S., Ojo, S., Agrawal, M., & Suman, P. (2024). Surveillance monitoring-based routing optimization for wireless sensor networks. Wireless Networks. Springer.
Li, N., Shi, Z., Jin, J., Feng, J., Zhang, A., Xie, M., & Zhao, Y. (2024). Design of intelligent firefighting and smart escape route planning system based on improved ant colony algorithm. Sensors. MDPI.
Mini, S., Tosh, D. K., & Desai, P. R. (2022). Edge-based optimal routing in SDN-enabled Industrial IoT. IEEE Internet of Things Journal.
Cao, S., Liu, S., Yang, Y., Du, W., Zhan, Z., Wang, D., & Zhang, W. (2022). High-security routing for IoT networks using advanced encryption protocols. IEEE Transactions on Dependable and Secure Computing.
Abdulrazzaq, M. R., & Gaata, M. T. (2022). Finding shortest path in road networks based on jam-distance graph and Dijkstra’s algorithm. In Next Generation of Internet of Things.
Zhao, L., Li, Z., Al-Dubai, A. Y., Min, G., & Li, J. (2021). A novel prediction-based temporal graph routing algorithm for software-defined vehicular networks. IEEE Transactions on Vehicular Technology.
Kapadia, N., & Mehta, R. (2023). Dynamic route optimization for IoT-based intelligent waste collection vehicle routing system. Intelligent Decision Technologies.
Cao, Q., Jin, B., Zhou, P., Chen, W., & Cao, B. (2024). CECEHO-GCS: A new green energy-efficient clustering protocol based on intelligent optimization theory in Industrial IoT. IEEE Internet of Things Journal.
Priyadarshi, R. (2024). Energy-efficient routing in wireless sensor networks: A metaheuristic and artificial intelligence-based approach—a comprehensive review. Archives of Computational Methods in Engineering. Springer.
Chen, Y., Hao, S., & Nazif, H. (2021). A privacy-aware approach for managing the energy of cloud-based IoT resources using an improved optimization algorithm. IEEE Internet of Things Journal.
Cao, J., Zhang, D., Zhou, H., & Wan, P. (2019). Energy-aware privacy-preserving data transmission in IoT-dense networks. IEEE Internet of Things Journal.
Arpitha, T., Chouhan, D., & Shreyas, J. (2024). Hybrid routing techniques for location privacy in IoT-enabled wireless sensor healthcare networks. SN Computer Science. Springer.
Zhao, B., Li, X., Liu, X., Pei, Q., & Li, Y. (2023). CrowdFA: A privacy-preserving mobile crowdsensing paradigm via federated analytics. IEEE Transactions on Mobile Computing.
Farrea, K. A., Baig, Z., Doss, R. R. M., & Liu, D. (2024). Provably secure optimal homomorphic signcryption for satellite-based Internet of Things. Computer Networks. Elsevier.
Marchang, N. (2024). A federated learning privacy framework for environmental data processing. Wiley.
Cao, S., Liu, S., Yang, Y., Du, W., Zhan, Z., Wang, D., & Zhang, W. (2025). A hybrid and efficient federated learning for privacy preservation in IoT devices. Ad Hoc Networks. Elsevier.
Agarwal, G., Sanghi, A., & Falade, A. (2024). End-to-end security and privacy for multi-cloud environments. In Proc. AIP Conference Proceedings.
Trakadas, P., Nomikos, N., Michailidis, E., & Zahariadis, T. (2019). Hybrid clouds for data-intensive, 5G-enabled IoT applications: An overview, key issues, and relevant architecture. Sensors. MDPI.
Michailidis, P. (2024). Adaptive optimization of intelligent agents in IoT security. Didaktorika.
Tatipatri, N., & Arun, S. L. (2024). A comprehensive review on cyberattacks in power systems: Impact analysis, detection, and cybersecurity. IEEE Access.
Alhakami, H. (2024). Enhancing IoT security: Quantum-level resilience against threats. Computers, Materials & Continua. TechScience.
Alotaibi, N. D., Alsaadi, M. S., & Ali, W. A. (2024). Advanced IoT technology and protocols: Review and future perspectives. ResearchGate preprint.
Alyami, M., Zou, C., & Solihin, Y. (2024). Adaptive segmentation: A tradeoff between packet-size obfuscation and performance. IEEE.
Sánchez, L., Minerva, R., & Lee, G. M. (2020). IoTRec: The IoT recommender for smart parking systems. IEEE Transactions on Emerging Topics in Computing, 8(2), 429–440.
Hossain, M. M., & Hasan, R. (2017). Boot-IoT: A privacy-aware authentication scheme for secure bootstrapping of IoT nodes. In Proc. IEEE International Congress on Internet of Things.
Razaque, A., Amsaad, F., & Abdulgader, M. (2022). A mobility-aware human-centric cyber–physical system for efficient and secure smart healthcare. IEEE Internet of Things Journal.
Fouda, M. M., Fadlullah, Z. M., & Ibrahem, M. I. (2024). Privacy-preserving data-driven learning models for emerging communication networks: A comprehensive survey. IEEE Communications Surveys & Tutorials.
Nguyen, T. H., Herbert, V., & Carpov, S. (2019). On the design of a privacy-preserving collaborative platform for cybersecurity. In International Conference on Computer Safety, Reliability, and Security. Springer.
Wei, D., Xi, N., Ma, J., & Li, J. (2021). Protecting your offloading preference: Privacy-aware online computation offloading in mobile blockchain. In Proc. IEEE/ACM International Symposium.
Tsaousoglou, G., Steriotis, K., & Kontogiorgos, D. (2020). Truthful, practical, and privacy-aware demand response in the smart grid via a distributed and optimal mechanism. IEEE Transactions on Smart Grid.
Lombardi, F., & Di Pietro, R. (2011). Secure virtualization for cloud computing. Journal of Network and Computer Applications, 34(4), 1113–1122.
Zhang, H., Chen, J., & Wang, Y. (2021). Adaptive privacy-preserving routing for secure cloud-based IoT networks. IEEE Transactions on Cloud Computing, 9(3), 512–526.
Hassan, M., Rahman, A. M., & Li, C. (2022). Privacy-aware adaptive security mechanisms in cloud computing: A survey. IEEE Access, 10, 89123–89140.
Bastos, D., Costa, N., & Rocha, N. P. (2024). A comprehensive survey on the societal aspects of smart cities. Applied Sciences, 14(17), 7823.
da Silva, M., Viterbo, J., & Bernardini, F. (2018). Identifying privacy functional requirements for crowdsourcing applications in smart cities. In Proc. 2018 IEEE International Conference on Smart Cities.
Jabbar, R., Kharbeche, M., Al-Khalifa, K., & Krichen, M. (2020). Blockchain for the Internet of Vehicles: A decentralized IoT solution for vehicle communication using Ethereum. Sensors, 20(14), 3928.
Villalba, L. J. G., Orozco, A. L. S., Cabrera, A. T., & Abbas, C. J. B. (2009). Routing protocols in wireless sensor networks. Sensors, 9(11), 8399–8421.
Singh, S. K., & Gupta, D. (2020). Security-aware routing protocols for wireless sensor networks: A comprehensive review. IEEE Access, 8, 167789–167814.
Taheri, H., Mosavi, M. R., & Alaei, B. (2021). Latency-aware privacy-preserving routing in wireless sensor networks. Ad Hoc Networks, 114, 102453.
Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). A survey on sensor networks. IEEE Communications Magazine, 40(8), 102–114.
Shahzad, M., Al-Turjman, F., & Imran, M. (2020). Secure and low-latency dynamic scheduling for Industrial Internet of Things. IEEE Transactions on Industrial Informatics, 16(3), 2023–2031.
Al-Turjman, F., Mostarda, L., & Garcia, C. F. (2019). Energy efficiency awareness in smart cities. IEEE Access, 7, 5412–5423.
Al-Kahtani, M. S. (2012). Survey on security attacks in vehicular ad hoc networks (VANETs). In Proc. 6th International Conference on Signal Processing and Communication Systems.
Wang, X., Hu, J., Lin, H., & Garg, S. (2021). QoS and privacy-aware routing for 5G-enabled Industrial Internet of Things: A federated reinforcement learning approach. IEEE Transactions on Industrial Informatics, 17(10), 6995–7004.
Yao, A., Li, G., Li, X., Jiang, F., Xu, J., & Liu, X. (2023). Differential privacy in edge computing-based smart city applications: Security issues, solutions and future directions. Array, 6, 100177.
Ebrahim, M., & Hafid, A. (2023). Privacy-aware load balancing in fog networks: A reinforcement learning approach. Computer Networks, 223, 109396.
Hossain, M., Xue, K., & Othman, W. (2020). Physically secure lightweight and privacy-preserving message authentication protocol for VANET in smart city. IEEE Transactions on Vehicular Technology, 69(12), 14593–14606.
Mao, B., Liu, J., & Kato, N. (2023). Security and privacy on 6G network edge: A survey. IEEE Communications Surveys & Tutorials.
Ali, B., Gregory, M. A., & Li, S. (2021). Multi-access edge computing architecture, data security and privacy: A review. IEEE Access, 9, 85991–86010.
Zhang, D., Ma, Y., Hu, X. S., & Wang, D. (2020). Toward privacy-aware task allocation in social sensing-based edge computing systems. IEEE Internet of Things Journal, 7(5), 4026–4037.
Ranaweera, P., & Jurcut, A. D. (2021). Survey on multi-access edge computing security and privacy. IEEE Communications Surveys & Tutorials, 23(4), 1855–1885.
Santana Martínez, J. R., Sánchez González, L., & Muñoz, J. A. (2020). A privacy-aware crowd management system for smart cities and smart buildings. IEEE Transactions on Industrial Informatics.
Alam, T. (2024). Data privacy and security in autonomous connected vehicles in smart city environment. Big Data and Cognitive Computing, 8(3), 95.
Hussain, T., Yang, B., Rahman, H. U., Iqbal, A., & Ali, F. (2022). Improving source location privacy in Social Internet of Things using a hybrid phantom routing technique. Computers & Security, 118, 103030.
Kumar, G., Rathore, R. S., Thakur, K., & Almadhor, A. (2023). Dynamic routing approach for enhancing source location privacy in wireless sensor networks. Wireless Networks, 29, 1332–1350.
Wang, X., et al. (2022). Federated learning-driven privacy-aware routing for 5G-enabled IoT systems. IEEE Internet of Things Journal, 9, 314–325.
Zhang, M. (2022). Machine learning-enabled energy optimization in IoT networks. IEEE Transactions on Sustainable Computing, 7, 45–60.
Luo, F. (2021). Lightweight cryptographic algorithms for resource-constrained IoT systems. Sensors, 21(10), 3459.
Gupta, B. (2023). Scalable privacy-aware IoT routing using hierarchical clustering. ACM Internet of Things Journal, 5, 101–112.
Patel, A. (2022). Blockchain-based trust management for secure IoT routing. IEEE Transactions on Blockchain Technology, 3, 77–89.

This work is licensed under a Creative Commons Attribution 4.0 International License.
All articles published in our journal are licensed under CC-BY 4.0, which permits authors to retain copyright of their work. This license allows for unrestricted use, sharing, and reproduction of the articles, provided that proper credit is given to the original authors and the source.