Location Privacy Preservation in Wireless Sensor Networks
Author:
Affiliation:

Clc Number:

Fund Project:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    This paper provides a state-of-the-art survey of location privacy-preserving techniques in WSNs. First, the network model, the attack model and the performance evaluation model are reviewed. Then, existing work is classified into four types, including path camouflage, entrapment attracting, network anonymity and communication control. Further, the key mechanisms of typical location privacy-preserving protocols are elaborated. Performance analysis and comparison show that all these four strategies affect communication and energy efficiency in some degree. In addition, the path camouflage strategy mainly aims at hop-by-hop trace attack, the network anonymity strategy aims at ID analysis attack, while the entrapment attraction and communication control strategies are capable of resisting multiple types of attacks. Finally, suggestions for future research are provided.

    Reference
    Related
    Cited by
Get Citation

彭辉,陈红,张晓莹,范永健,李翠平,李德英.无线传感器网络位置隐私保护技术.软件学报,2015,26(3):617-639

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:April 02,2014
  • Revised:August 28,2014
  • Adopted:
  • Online: December 12,2014
  • Published:
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063