REAL: A Reciprocal Protocol for Location Privacy in Wireless Sensor Networks

被引:15
|
作者
Zhang, Jia-Dong [1 ]
Chow, Chi-Yin [1 ]
机构
[1] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China
关键词
Location privacy; k-anonymity; wireless sensor networks; location monitoring systems; aggregate locations; ENERGY-EFFICIENT; K-ANONYMITY; ARCHITECTURE; ALGORITHM;
D O I
10.1109/TDSC.2014.2366467
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
K-anonymity has been used to protect location privacy for location monitoring services in wireless sensor networks (WSNs), where sensor nodes work together to report k-anonymized aggregate locations to a server. Each k-anonymized aggregate location is a cloaked area that contains at least k persons. However, we identify an attack model to show that overlapping aggregate locations still pose privacy risks because an adversary can infer some overlapping areas with less than k persons that violates the k-anonymity privacy requirement. In this paper, we propose a reciprocal protocol for location privacy (REAL) in WSNs. In REAL, sensor nodes are required to autonomously organize their sensing areas into a set of non-overlapping and highly accurate k-anonymized aggregate locations. To confront the three key challenges in REAL, namely, self-organization, reciprocity property and high accuracy, we design a state transition process, a locking mechanism and a time delay mechanism, respectively. We compare the performance of REAL with current protocols through simulated experiments. The results show that REAL protects location privacy, provides more accurate query answers, and reduces communication and computational costs.
引用
收藏
页码:458 / 471
页数:14
相关论文
共 50 条
  • [1] A Protocol for Sink Location Privacy Protection in Wireless Sensor Networks
    Ying, Bidi
    Makrakis, Dimitrios
    Mouftah, Hussein T.
    2011 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE (GLOBECOM 2011), 2011,
  • [2] An Efficient Privacy Preserving Protocol for Source Location Privacy in Wireless Sensor Networks
    Roy, Pradecp Kumar
    Rijhim
    Singh, Jyoti Prakash
    Kumar, Prabhat
    PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2016, : 1093 - 1097
  • [3] A Routing Protocol for Source Location Privacy in Wireless Sensor Networks with Multiple Sources
    Berdibek, Asset
    Saginbekov, Sain
    Q2SWINET'19: PROCEEDINGS OF THE 15TH ACM INTERNATIONAL SYMPOSIUM ON QOS AND SECURITY FOR WIRELESS AND MOBILE NETWORKS, 2019, : 93 - 99
  • [4] Location Privacy Issues in Wireless Sensor Networks
    Kur, Jiri
    Stetsko, Andriy
    FUTURE OF IDENTITY IN THE INFORMATION SOCIETY, 2009, : 160 - 169
  • [5] Protecting the sink location privacy in wireless sensor networks
    Lin Yao
    Lin Kang
    Pengfei Shang
    Guowei Wu
    Personal and Ubiquitous Computing, 2013, 17 : 883 - 893
  • [6] The Location Privacy of Wireless Sensor Networks: Attacks and Countermeasures
    Zhou, Lin
    Wan, Changsheng
    Huang, Jie
    Pei, Bei
    Chen, Changsong
    2014 NINTH INTERNATIONAL CONFERENCE ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA), 2014, : 64 - 71
  • [7] A survey on location privacy protection in Wireless Sensor Networks
    Jiang, Jinfang
    Han, Guangjie
    Wang, Hao
    Guizani, Mohsen
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 125 : 93 - 114
  • [8] Analysis of location privacy solutions in wireless sensor networks
    Rios, R.
    Lopez, J.
    IET COMMUNICATIONS, 2011, 5 (17) : 2518 - 2532
  • [9] Protecting the sink location privacy in wireless sensor networks
    Yao, Lin
    Kang, Lin
    Shang, Pengfei
    Wu, Guowei
    PERSONAL AND UBIQUITOUS COMPUTING, 2013, 17 (05) : 883 - 893
  • [10] Location privacy and resilience in wireless sensor networks querying
    Di Pietro, Roberto
    Viejo, Alexandre
    COMPUTER COMMUNICATIONS, 2011, 34 (03) : 515 - 523