On the Trade-Off between User-Location Privacy and Queried-Location Privacy in Wireless Sensor Networks

被引:0
|
作者
Vogt, Ryan [1 ]
Nascimento, Mario A. [1 ]
Harms, Janelle [1 ]
机构
[1] Univ Alberta, Dept Comp Sci, Edmonton, AB T6G 2M7, Canada
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
By eavesdropping on a user's query in a sensor network, an adversary can deduce both the user's location and his/her area of interest. In many domains it is desitable to guarantee privary of both places. We propose an effective way to measure how well issuing a disperse set of k queries protects the user's area of interest However, issing k queries instead of one facilitates the adversary determining the user's location. To address that issue, we define a quantitative measure of how much information the k queries leak about the user's location Experiments reveral that how dispersed the k queries are has no effect on the privacy of the user's location. Howerver, smaller k. randomized routing, and non-broadcast transmission improve the user's location privacy. We also show that compromissing nodes in the user's network yields no significant advantage to the adversary over an eavesdropping strategy.
引用
收藏
页码:241 / 254
页数:14
相关论文
共 50 条
  • [1] On the Trade-off between Privacy and Information Quality in Location Based Services
    Apollonio, Francesco
    Bedogni, Luca
    Gori, Giacomo
    Melis, Andrea
    Prandini, Marco
    2024 IEEE 21ST CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2024, : 994 - 997
  • [2] Location Privacy Issues in Wireless Sensor Networks
    Kur, Jiri
    Stetsko, Andriy
    FUTURE OF IDENTITY IN THE INFORMATION SOCIETY, 2009, : 160 - 169
  • [3] Protecting the sink location privacy in wireless sensor networks
    Lin Yao
    Lin Kang
    Pengfei Shang
    Guowei Wu
    Personal and Ubiquitous Computing, 2013, 17 : 883 - 893
  • [4] Analysis of location privacy solutions in wireless sensor networks
    Rios, R.
    Lopez, J.
    IET COMMUNICATIONS, 2011, 5 (17) : 2518 - 2532
  • [5] Protecting the sink location privacy in wireless sensor networks
    Yao, Lin
    Kang, Lin
    Shang, Pengfei
    Wu, Guowei
    PERSONAL AND UBIQUITOUS COMPUTING, 2013, 17 (05) : 883 - 893
  • [6] The Location Privacy of Wireless Sensor Networks: Attacks and Countermeasures
    Zhou, Lin
    Wan, Changsheng
    Huang, Jie
    Pei, Bei
    Chen, Changsong
    2014 NINTH INTERNATIONAL CONFERENCE ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA), 2014, : 64 - 71
  • [7] A survey on location privacy protection in Wireless Sensor Networks
    Jiang, Jinfang
    Han, Guangjie
    Wang, Hao
    Guizani, Mohsen
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 125 : 93 - 114
  • [8] Location privacy and resilience in wireless sensor networks querying
    Di Pietro, Roberto
    Viejo, Alexandre
    COMPUTER COMMUNICATIONS, 2011, 34 (03) : 515 - 523
  • [9] An Efficient Privacy Preserving Protocol for Source Location Privacy in Wireless Sensor Networks
    Roy, Pradecp Kumar
    Rijhim
    Singh, Jyoti Prakash
    Kumar, Prabhat
    PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2016, : 1093 - 1097
  • [10] Node Location Privacy Protection in Unattended Wireless Sensor Networks
    Zhou, ZhiGang
    Wang, Yu
    Li, PanPan
    Chang, XinGong
    Luo, JiWei
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2021, 2021