Probabilistic routing in wireless networks with privacy guarantees

被引:2
|
作者
Koh, Jing Yang [1 ]
Peters, Gareth W. [2 ]
Nevat, Ido [3 ]
Leong, Derek [4 ]
机构
[1] NUS, Singapore, Singapore
[2] Heriot Watt Univ, Dept Actuarial Math & Stat, Edinburgh, Midlothian, Scotland
[3] TUMCREATE, Cooling Singapore, Singapore, Singapore
[4] I2R, Singapore, Singapore
基金
新加坡国家研究基金会;
关键词
Location privacy; Probabilistic routing; k-anonymity; Bayesian traffic analysis; LOCATION PRIVACY;
D O I
10.1016/j.comcom.2019.12.045
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider the source-destination location privacy problem for routing in wireless networks. Previous routing schemes mainly provided privacy protection by minimizing the average detection probability of traffic analysis attempts. However, they do not seek to provide strict privacy guarantees of the vulnerable source-destination pairs, which could still be relatively easy to identify. To address this gap in the literature, we propose the (k, epsilon)-anonymity property for routing in wireless networks with privacy guarantees. We consider a Bayesian maximum-a-posteriori (MAP) inference-based adversary and design a probabilistic routing scheme that uses a statistical decision-making framework to compute the minimum-cost (k, epsilon)-anonymous paths. A routing scheme is (k, epsilon)-anonymous if there are k or more distinct source-destination pairs within an epsilon-tolerance of the MAP probability. We compare our approach against a baseline routing scheme that minimizes the average detection probability of the adversary, and our simulation results show that our approach provides significantly better (k, epsilon)-anonymity privacy guarantees while achieving comparable average adversarial detection probability. We also studied how the adversary's prior beliefs affect its detection probability and Bayes risk.
引用
收藏
页码:228 / 237
页数:10
相关论文
共 50 条
  • [21] Adaptive data aggregation with probabilistic routing in wireless sensor networks
    Lu, Yao
    Comsa, Ioan-Sorin
    Kuonen, Pierre
    Hirsbrunner, Beat
    WIRELESS NETWORKS, 2016, 22 (08) : 2485 - 2499
  • [22] ZERO: Probabilistic Routing for Deploy and Forget Wireless Sensor Networks
    Vilajosana, Xavier
    Llosa, Jordi
    Carlos Pacho, Jose
    Vilajosana, Ignasi
    Juan, Angel A.
    Lopez Vicario, Jose
    Morell, Antoni
    SENSORS, 2010, 10 (10) : 8920 - 8937
  • [23] Probabilistic routing protocol for a hybrid wireless underground sensor networks
    Adel, Ahmed
    Norsheila, Fisal
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2013, 13 (02): : 142 - 156
  • [24] Adaptive Communication Networks with Privacy Guarantees
    Alaeddini, Atiye
    Morgansen, Kristi
    Mesbahi, Mehran
    2017 AMERICAN CONTROL CONFERENCE (ACC), 2017, : 4460 - 4465
  • [25] A Probabilistic Source Location Privacy Protection Scheme in Wireless Sensor Networks
    Wang, Hao
    Han, Guangjie
    Zhang, Wenbo
    Guizani, Mohsen
    Chan, Sammy
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (06) : 5917 - 5927
  • [26] Probabilistic receiver-location privacy protection in wireless sensor networks
    Rios, Ruben
    Cuellar, Jorge
    Lopez, Javier
    INFORMATION SCIENCES, 2015, 321 : 205 - 223
  • [27] Dual mode wireless routing with QoS guarantees
    Chen, YC
    Hsu, PY
    2005 BEIJING INTERNATIONAL CONFERENCE ON IMAGING: TECHNOLOGY AND APPLICATIONS FOR THE 21ST CENTURY, 2005, : 158 - 159
  • [28] Energy-Efficient Coverage Guarantees Scheduling and Routing Strategy for Wireless Sensor Networks
    Le, Nam-Tuan
    Jang, Yeong Min
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
  • [29] Energy-Aware Location Privacy Routing for Wireless Sensor Networks
    Zhang, Jingjing
    Jin, Zhengping
    SECURITY, PRIVACY AND ANONYMITY IN COMPUTATION, COMMUNICATION AND STORAGE, (SPACCS 2016), 2016, 0067 : 26 - 32
  • [30] An Anonymous Routing Scheme for Preserving Location Privacy in Wireless Sensor Networks
    Zhou, Liming
    Shan, Yingzi
    Chen, Xiaopan
    PROCEEDINGS OF 2019 IEEE 3RD INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2019), 2019, : 262 - 265