REAL: A Reciprocal Protocol for Location Privacy in Wireless Sensor Networks

被引:15
|
作者
Zhang, Jia-Dong [1 ]
Chow, Chi-Yin [1 ]
机构
[1] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China
关键词
Location privacy; k-anonymity; wireless sensor networks; location monitoring systems; aggregate locations; ENERGY-EFFICIENT; K-ANONYMITY; ARCHITECTURE; ALGORITHM;
D O I
10.1109/TDSC.2014.2366467
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
K-anonymity has been used to protect location privacy for location monitoring services in wireless sensor networks (WSNs), where sensor nodes work together to report k-anonymized aggregate locations to a server. Each k-anonymized aggregate location is a cloaked area that contains at least k persons. However, we identify an attack model to show that overlapping aggregate locations still pose privacy risks because an adversary can infer some overlapping areas with less than k persons that violates the k-anonymity privacy requirement. In this paper, we propose a reciprocal protocol for location privacy (REAL) in WSNs. In REAL, sensor nodes are required to autonomously organize their sensing areas into a set of non-overlapping and highly accurate k-anonymized aggregate locations. To confront the three key challenges in REAL, namely, self-organization, reciprocity property and high accuracy, we design a state transition process, a locking mechanism and a time delay mechanism, respectively. We compare the performance of REAL with current protocols through simulated experiments. The results show that REAL protects location privacy, provides more accurate query answers, and reduces communication and computational costs.
引用
收藏
页码:458 / 471
页数:14
相关论文
共 50 条
  • [41] Virtual Source-Based Location Privacy for Wireless Sensor Networks
    Raja, R. Altis
    Valli, S.
    IETE JOURNAL OF RESEARCH, 2015, 61 (05) : 475 - 481
  • [42] A Probabilistic Source Location Privacy Protection Scheme in Wireless Sensor Networks
    Wang, Hao
    Han, Guangjie
    Zhang, Wenbo
    Guizani, Mohsen
    Chan, Sammy
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (06) : 5917 - 5927
  • [43] Source Location Privacy Using Data Mules in Wireless Sensor Networks
    Singh, Jyoti Prakash
    Roy, Pradeep Kumar
    Singh, Sunil Kumar
    Kumar, Prabhat
    PROCEEDINGS OF THE 2016 IEEE REGION 10 CONFERENCE (TENCON), 2016, : 2743 - 2747
  • [44] Protecting Source Location Privacy in Wireless Sensor Networks with Data Aggregation
    Yang, Wenbo
    Zhu, Wen Tao
    UBIQUITOUS INTELLIGENCE AND COMPUTING, 2010, 6406 : 252 - 266
  • [45] Energy-Aware Location Privacy Routing for Wireless Sensor Networks
    Zhang, Jingjing
    Jin, Zhengping
    SECURITY, PRIVACY AND ANONYMITY IN COMPUTATION, COMMUNICATION AND STORAGE, (SPACCS 2016), 2016, 0067 : 26 - 32
  • [46] Hybrid online protocols for source location privacy in wireless sensor networks
    Bradbury, Matthew
    Jhumka, Arshad
    Leeke, Matthew
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2018, 115 : 67 - 81
  • [47] An Anonymous Routing Scheme for Preserving Location Privacy in Wireless Sensor Networks
    Zhou, Liming
    Shan, Yingzi
    Chen, Xiaopan
    PROCEEDINGS OF 2019 IEEE 3RD INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2019), 2019, : 262 - 265
  • [48] Probabilistic receiver-location privacy protection in wireless sensor networks
    Rios, Ruben
    Cuellar, Jorge
    Lopez, Javier
    INFORMATION SCIENCES, 2015, 321 : 205 - 223
  • [49] A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
    Chow, Chi-Yin
    Mokbel, Mohamed F.
    He, Tian
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2011, 10 (01) : 94 - 107
  • [50] Providing location privacy against a global adversary in wireless sensor networks
    Zhou, Liming
    Wen, Qiaoyan
    Zhou, L. (zhouliming1985@gmail.com), 2013, Binary Information Press, Flat F 8th Floor, Block 3, Tanner Garden, 18 Tanner Road, Hong Kong (10): : 5043 - 5053