Location Privacy Preservation in Wireless Sensor Networks
Author:
Affiliation:

  • Article
  • | |
  • Metrics
  • |
  • Reference [76]
  • |
  • Related [20]
  • |
  • Cited by [1]
  • | |
  • Comments
    Abstract:

    This paper provides a state-of-the-art survey of location privacy-preserving techniques in WSNs. First, the network model, the attack model and the performance evaluation model are reviewed. Then, existing work is classified into four types, including path camouflage, entrapment attracting, network anonymity and communication control. Further, the key mechanisms of typical location privacy-preserving protocols are elaborated. Performance analysis and comparison show that all these four strategies affect communication and energy efficiency in some degree. In addition, the path camouflage strategy mainly aims at hop-by-hop trace attack, the network anonymity strategy aims at ID analysis attack, while the entrapment attraction and communication control strategies are capable of resisting multiple types of attacks. Finally, suggestions for future research are provided.

    Reference
    [1] Ren FY, Huang HN, Lin C. Wireless sensor networks. Ruan Jian Xue Bao/Journal of Software, 2003,14(7):1282-1291 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/14/1282.htm
    [2] Ozturk C, Zhang Y, Trappe W. Source-Location privacy in energy-constrained sensor network routing. In: Proc. of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2004). IEEE, 2004. 88-93. [doi: 10.1145/1029102.1029117]
    [3] Fan YJ, Chen H, Zhang XY. Data privacy preservation in wireless sensor networks. Chinese Journal of Computers, 2012,35(6): 1131-1146 (in Chinese with English abstract). [doi: 10.3724/SP.J.1016.2012.01131]
    [4] He WB, Liu X, Nguyen H, Nahrstedt K, Abdelzaher T. Pda: Privacy-preserving data aggregation in wireless sensor networks. In: Proc. of the 26th IEEE Int'l Conf. on Computer Communications INFOCOM. IEEE, 2007. 2045-2053. [doi: 10.1109/INFCOM. 2007.237]
    [5] Zhang F, He L, He WB, Liu X. Data perturbation with state-dependent noise for participatory sensing. In: Proc. of the 32th IEEE Int'l Conf. on Computer Communications INFOCOM. IEEE, 2012. 2246-2254. [doi: 10.1109/INFCOM.2012.6195610]
    [6] Liu CX, Liu Y, Zhang ZJ, Cheng ZY. High energy-efficient and privacy-preserving secure data aggregation for wireless sensor networks. Int'l Journal of Communication Systems, 2013,26(3):380-394. [doi: 10.1002/dac.2412]
    [7] Yang DJ, Fang X, Xue GL. Truthful incentive mechanisms for k-anonymity location privacy. In: Proc. of the 32th IEEE Int'l Conf. on Computer Communications INFOCOM. IEEE, 2013. 2994-3002. [doi: 10.1109/INFCOM.2013.6567111]
    [8] He WB, Nguyen H, Liu X, Nahrstedt K, Abdelzaher T. iPDA: An integrity-protecting private data aggregation scheme for wireless sensor networks. In: Proc. of the 2008 IEEE Int'l Conf. on Military Communications Conf. MILCOM. IEEE, 2008. 1-7. [doi: 10. 1109/MILCOM.2008.4753645]
    [9] Yang G, Wang AQ, Chen ZJ, Xu J, Wang HY. An energy-saving privacy-preserving data aggregation algorithm. Chinese Journal of Computers, 2011, 34(5):792-800 (in Chinese with English abstract). [doi: 10.3724/SP.J.1016.2011.00792]
    [10] Castelluccia C, Mykletun E, Tsudik G. Efficient aggregation of encrypted data in wireless sensor networks. In: Proc. of the 2th IEEE Int'l Conf. on Mobile and Ubiquitous Systems: Networking and Services. MobiQuitous: IEEE, 2005. 109-117. [doi: 10.1109/ MOBIQUITOUS.2005.25]
    [11] Feng TM, Wang C, Zhang WS, Ruan L. Confidentiality protection for distributed sensor data aggregation. In: Proc. of the 27th IEEE Int'l Conf. on Computer Communications INFOCOM. IEEE, 2008. 56-60. [doi: 10.1109/INFOCOM.2008.20]
    [12] Papadopoulos S, Kiayias A, Papadias D. Secure and efficient in-network processing of exact SUM queries. In: Proc. of the 27th IEEE Int'l Conf. on Data Engineering (ICDE 2011). IEEE, 2011. 517-528. [doi: 10.1109/ICDE.2011.5767886]
    [13] Fan YJ, Chen H. Verifiable privacy-preserving top-k query protocol in two-tiered sensor networks. Chinese Journal of Computers, 2012,35(3):423-433 (in Chinese with English abstract). [doi: 10.3724/SP.J.1016.2012.00423]
    [14] Sheng B, Li Q. Verifiable privacy-preserving range query in two-tiered sensor networks. In: Proc. of the 27th IEEE Int'l Conf. on Computer Communications INFOCOM. IEEE, 2008. 46-50. [doi: 10.1109/INFOCOM.2008.18]
    [15] Shi J, Zhang R, Zhang YC. Secure range queries in tiered sensor networks. In: Proc. of the 28th IEEE Int'l Conf. on Computer Communications INFOCOM. IEEE, 2009. 945-953. [doi: 10.1109/INFCOM.2009.5062005]
    [16] Zhang R, Shi J, Zhang YC. Secure multidimensional range queries in sensor networks. In: Proc.of the 10th ACM Int'l Symp. on Mobile Ad Hoc Networking and Computing. ACM Press, 2009. 197-206. [doi: 10.1145/1530748.1530777]
    [17] Chen F, Liu AX. SafeQ: Secure and efficient query processing in sensor networks. In: Proc. of the 29th IEEE Int'l Conf. on Computer Communications INFOCOM. IEEE, 2010. 1-9. [doi: 10.1109/INFCOM.2010.5462094]
    [18] Subramanian N, Yang K, Zhang W, Qiao D. ElliPS: A privacy preserving scheme for sensor data storage and query. In: Proc. of the 28th IEEE Int'l Conf. on Computer Communications INFOCOM. IEEE, 2009. 936-944. [doi: 10.1109/INFCOM.2009.5062004]
    [19] Zhou AY, Yang B, Jin CQ, Ma Q. Location-Based service: Architecture and progress. Chinese Journal of Computers, 2011,34(7): 1155-1171 (in Chinese with English abstract). [doi: 10.3724/SP.J.1016.2011.01155]
    [20] Wang L, Meng XF. Location privacy preservation in big data era: A survey. Ruan Jian Xue Bao/Journal of Software, 2014,25(4): 693-712 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/4551.htm [doi: 10.13328/j.cnki.jos.004551]
    [21] Gruteser M, Grunwald D. Anonymous usage of location-based services through spatial and temporal cloaking. In: Proc. of the 1st ACM Int'l Conf. on Mobile Systems, Applications and Services. ACM Press, 2003. 31-42. [doi: 10.1145/1066116.1189037]
    [22] Dewri R. Local differential perturbations: Location privacy under approximate knowledge attackers. IEEE Trans. on Mobile Computing, 2013,12(12):2360-2372. [doi: 10.1109/TMC.2012.208]
    [23] Zhu ZC, Cao GH. Toward privacy preserving and collusion resistance in a location proof updating system. IEEE Trans. on Mobile Computing, 2013,12(1):51-64. [doi: 10.1109/TMC.2011.237]
    [24] Zhang JM, Zhao YJ, Jiang HB, Jia XD, Wang LM. Research on protection technology for location privacy in VANET. Journal of Communications, 2012,33(8):180-189 (in Chinese with English abstract).
    [25] Taha S, Shen X. A physical-layer location privacy-preserving scheme for mobile public hotspots in NEMO-based VANETs. IEEE Trans. on Intelligent Transportation Systems, 2013,99:1-16. [doi: 10.1109/TITS.2013.2265311]
    [26] Holiday M, Mittal N, Venkatesan S. Secure location verification with randomly-selected base stations. In: Proc. of the 18th IEEE Int'l Conf. on Distributed Computing Systems Workshops (ICDCSW 2011). IEEE, 2011. 119-122. [doi: 10.1109/ICDCSW. 2011. 44]
    [27] Christin D, Pons-Sorolla DR, Hollick M, Kanhere SS. TrustMeter: A trust assessment scheme for collaborative privacy mechanisms in participatory sensing applications. In: Proc. of the 9th IEEE Int'l Conf. on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP 2014). IEEE, 2014. 1-6. [doi: 10.1109/ISSNIP.2014.6827614]
    [28] Zeng YP, Cao JN, Hong J, Zhang S, Xie L. Secure localization and location verification in wireless sensor networks: A survey. The Journal of Supercomputing, 2013,64(3):685-701. [doi: 10.1007/s11227-010-0501-4]
    [29] Lin XD, Lu RX, Liang XH, Shen XM. STAP: A social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs. In: Proc. of the 30th IEEE Int'l Conf. on Computer Communications INFOCOM. IEEE, 2011. 2147-2155. [doi: 10.1109/ INFCOM.2011.5935026]
    [30] Groat MM, He W, Forrest S. KIPDA: k-indistinguishable privacy-preserving data aggregation in wireless sensor networks. In: Proc. of the INFOCOM. IEEE, 2011. 2024-2032. [doi: 10.1109/INFCOM.2011.5935010]
    [31] Radio direction finder. http://en.wikipedia.org/wiki/Radio_direction_finder
    [32] Wang HD, Sheng B, Li Q. Privacy-Aware routing in sensor networks. Computer Networks, 2009,53(9):1512-1529. [doi: 10.1016/ j.comnet.2009.02.002]
    [33] Li S, Zhu HJ, Gao ZY, Guan XP, Xing K, Shen XM. Location privacy preservation in collaborative spectrum sensing. In: Proc. of the 31th IEEE Int'l Conf. on Computer Communications INFOCOM. IEEE, 2012. 729-737. [doi: 10.1109/INFCOM.2012. 6195818]
    [34] Hong XY, Wang P, Kong JJ, Zheng QW, Liu J. Effective probabilistic approach protecting sensor traffic. In: Proc. of the 2005 IEEE Int'l Conf. on Military Communications Conf. (MILCOM 2005). IEEE, 2005. 169-175. [doi: 10.1109/MILCOM.2005. 1605681]
    [35] Kamat P, Zhang Y, Trappe W, Ozturk C. Enhancing source-location privacy in sensor network routing. In: Proc. of the 25th IEEE Int'l Conf. on Distributed Computing Systems (ICDCS 2005). IEEE, 2005. 599-608. [doi: 10.1109/ICDCS.2005.31]
    [36] Shaikh RA, Jameel H, d'Auriol BJ, Lee H, Lee S, Song YJ. Achieving network level privacy in wireless sensor networks. Sensors, 2010,10(3):1447-1472. [doi: 10.3390/s100301447]
    [37] Xi Y, Schwiebert L, Shi W. Preserving source location privacy in monitoring-based wireless sensor networks. In: Proc. of the 20th IEEE Int'l Conf. on Parallel and Distributed Processing Symp. (IPDPS 2006). IEEE, 2006. [doi: 10.1109/IPDPS.2006.1639682]
    [38] Wang WP, Chen L, Wang JX. A source-location privacy protocol in WSN based on locational angle. In: Proc. of the 2008 IEEE Int'l Conf. on Communications (ICC 2008). IEEE, 2008. 1630-1634. [doi: 10.1109/ICC.2008.315]
    [39] Chen J, Fang BX, Yin LH, Su S. A source location privacy preservation protocol in wireless sensor networks using source based restricted flooding. Chinese Journal of Computers, 2010,33(9):1736-1747 (in Chinese with English abstract). [doi: 10.3724/SP.J. 1016.2010.01736]
    [40] Li Y, Ren J. Mixing ring-based source-location privacy in wireless sensor networks. In: Proc. of the 18th IEEE Int'l Conf. on Computer Communications and Networks (ICCCN 2009). IEEE, 2009. 1-6. [doi: 10.1109/ICCCN]
    [41] Li Y, Ren J, Wu J. Quantitative measurement and design of source-location privacy schemes for wireless sensor networks. IEEE Trans. on Parallel and Distributed Systems, 2012,23(7):1302-1311. [doi: 10.1109/TPDS.2011.260]
    [42] Kang L. Protecting location privacy in large-scale wireless sensor networks. In: Proc. of the 2009 IEEE Int'l Conf. on Communications (ICC 2009). IEEE, 2009. 1-6. [doi: 10.1109/ICC.2009.5199372]
    [43] Lightfoot L, Li Y, Ren J. Preserving source-location privacy in wireless sensor network using STaR routing. In: Proc. of the 2010 IEEE Global Telecommunications Conf. on GLOBECOM. IEEE, 2010. 1-5. [doi: 10.1109/GLOCOM.2010.5683603]
    [44] Li Y, Ren J. Source-Location privacy through dynamic routing in wireless sensor networks. In: Proc. of the 29th IEEE Int'l Conf. on Computer Communications INFOCOM. IEEE, 2010. 1-9. [doi: 10.1109/INFCOM.2010.5462096]
    [45] Spachos P, Song L, Bui FM, Hatzinakos D. Improving source-location privacy through opportunistic routing in wireless sensor networks. In: Proc. of the 2011 IEEE Symp. on Computers and Communications (ISCC 2011). IEEE, 2011. 815-820. [doi: 10. 11 09/ISCC.2011.5983942]
    [46] Pongaliur K, Xiao L. Maintaining source privacy under eavesdropping and node compromise attacks. In: Proc. of the 29th IEEE Int'l Conf. on Computer Communications INFOCOM. IEEE, 2011. 1656-1664. [doi: 10.1109/INFCOM.2011.5934959]
    [47] Lopez J, Rios R, Cuellar J. Preserving Receiver-Location Privacy in Wireless Sensor Networks. Information Security Practice and Experience: Springer-Verlag, 2014. 15-27. [doi: 10.1007/978-3-319-06320-1_3]
    [48] Zhou LM, Wen QY. Energy efficient source location privacy protecting scheme in wireless sensor networks using ant colony optimization. Int'l Journal of Distributed Sensor Networks, 2014. [doi: 10.1155/2014/920510]
    [49] Ngai ECH, Rodhe I. On providing location privacy for mobile sinks in wireless sensor networks. Wireless Networks, 2013,19(1): 115-130. [doi: 10.1145/1641804.1641825]
    [50] Shi R, Goswami M, Gao J, Gu XF. Is random walk truly memoryless-traffic analysis and source location privacy under random walks. In: Proc. of the 32th IEEE Int'l Conf. on Computer Communications INFOCOM. IEEE, 2013. 3021-3029. [doi: 10.1109/ INFCOM.2013.6567114]
    [51] Mehta K, Liu D, Wright M. Protecting location privacy in sensor networks against a global eavesdropper. IEEE Trans. on Mobile Computing, 2012,11(2):320-336. [doi: 10.1109/TMC.2011.32]
    [52] Shao M, Yang Y, Zhu S, Cao G. Towards statistically strong source anonymity for sensor networks. In: Proc. of the 27th IEEE Int'l Conf. on Computer Communications INFOCOM. IEEE, 2008. [doi: 10.1109/INFOCOM.2008.19]
    [53] Majeed A, Liu K, Abu-Ghazaleh N. Tarp: Timing analysis resilient protocol for wireless sensor networks. In: Proc. of the 2009 IEEE Int'l Conf. on Wireless and Mobile Computing, Networking and Communications (WIMOB 2009). IEEE, 2009. 85-90. [doi: 10.1109/WiMob.2009.24]
    [54] Silvija KF, Fabrice LF, Predra S. The quality of source location protection in globally attacked sensor networks. In: Proc. of the 2011 IEEE Int'l Conf. on Pervasive Computing and Communications Workshops (PERCOM 2011). IEEE, 2011. 44-49. [doi: 10. 1109/PERCOMW.2011.5766931]
    [55] Chen H, Lou W. On protecting end-to-end location privacy against local eavesdropper in wireless sensor networks. In: Proc. of the Pervasive and Mobile Computing. 2014. [doi: 10.1016/j.pmcj.2014.01.006]
    [56] Mahmoud ME, Shen X. Secure and efficient source location privacy-preserving scheme for wireless sensor networks. In: Proc. of the 28th IEEE Int'l Conf. on Communications (ICC 2012). IEEE, 2012. 1123-1127. [doi: 10.1109/ICC.2012.6363763]
    [57] Xiao WC, Zhang H, Wen Q, Li WM. Passive RFID-supported source location privacy preservation against global eavesdroppers in WSN. In: Proc. of the 28th IEEE Int'l Conf. on Broadband Network & Multimedia Technology (IC-BNMT 2013). IEEE, 2013. 289-293. [doi: 10.1109/ICBNMT.2013.6823959]
    [58] Shi E, Chan THH, Rieffel EG, Chow R, Song D. Privacy-Preserving aggregation of time-series data. In: Proc. of the Annual Network & Distributed System Security Symp. (NDSS 2011). 2011. 4.
    [59] Thomason A, Leeke M, Bradbury M, Jhumka A. Evaluating the impact of broadcast rates and collisions on fake source protocols for source location privacy. In: Proc. of the 12th IEEE Int'l Conf. on Trust, Security and Privacy in Computing and Communications (TrustCom 2013). IEEE, 2013. 667-674. [doi: 10.1109/TrustCom.2013.81]
    [60] Yao L, Kang L, Shang P, Wu G. Protecting the sink location privacy in wireless sensor networks. Personal and Ubiquitous Computing, 2013,17(5):883-893. [doi: 10.1007/s00779-012-0539-9]
    [61] Chai GF, Xu M, Xu WY, Lin ZY. Enhancing sink-location privacy in wireless sensor networks through k-anonymity. Int'l Journal of Distributed Sensor Networks, 2012. [doi: 10.1155/2012/648058]
    [62] Ouyang Y, Le ZY, Chen GL, Ford J, Makedon F. Entrapping adversaries for source protection in sensor networks. In: Proc. of the 2006 Int'l Symp. on on World of Wireless, Mobile and Multimedia Networks (WOWMOM 2006). IEEE, 2006. 23-34. [doi: 10. 1109/WOWMOM.2006.40]
    [63] Kazatzopoulos L, Delakouridis C, Marias GF, Georgiadis P. iHIDE: Hiding sources of information in WSNs. In: Proc. of the 2th Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SECPERU 2006). 2006. 8-48. [doi: 10.1109/ SECPERU.2006.11]
    [64] Nezhad AA, Miri A, Makrakis D. Location privacy and anonymity preserving routing for wireless sensor networks. Computer Networks, 2008,52(18):3433-3452. [doi: 10.1016/j.comnet.2008.09.005]
    [65] Chen J, Du X, Fang B. An efficient anonymous communication protocol for wireless sensor networks. Wireless Communications and Mobile Computing, 2012,12(14):1302-1312. [doi: 10.1002/wcm.1205]
    [66] Mei Y, Jiang GZ, Zhang W, Cui YQ. A collaboratively hidden location privacy scheme for VANETs. Int'l Journal of Distributed Sensor Networks, 2014. [doi: 10.1155/2014/473151]
    [67] Di PR, Viejo A. Location privacy and resilience in wireless sensor networks querying. Computer Communications, 2011,34(3): 515-523. [doi: 10.1016/j.comcom.2010.05.014]
    [68] Li J, Li Y, Ren J, Wu J. Hop-by-Hop message authentication and source privacy in wireless sensor networks. IEEE Trans. on Parallel and Distributed Systems, 2014,25(5):1223-1232. [doi: 10.1109/TPDS.2013.119]
    [69] Dutta N, Saxena A, Chellappan S. Defending wireless sensor networks against adversarial localization. In: Proc. of the 11th IEEE Int'l Conf. on Mobile Data Management (MDM 2010). IEEE, 2010. 336-341. [doi: 10.1109/MDM.2010.75]
    [70] Rios R, Lopez J. Exploiting context-awareness to enhance source-location privacy in wireless sensor networks. The Computer Journal, 2011:55. [doi: 10.1093/comjnl/bxr055]
    [71] Shao M, Hu W, Zhu S, Cao G, Krishnamurth S, La Porta T. Cross-Layer enhanced source location privacy in sensor networks. In: Proc. of the 6th IEEE Int'l Conf. on Sensor, Mesh and Ad Hoc Communications and Networks (SECON 2009). IEEE, 2009. 1-9. [doi: 10.1109/SAHCN.2009.5168923]
    [72] Fan Y, Jiang Y, Zhu H, Shen X. An efficient privacy-preserving scheme against traffic analysis attacks in network coding. In: Proc. of the 28th IEEE Int'l Conf. on Computer Communications INFOCOM. IEEE, 2009. 2213-2221. [doi: 10.1109/INFCOM.2009. 5062146]
    [73] Fan Y, Chen J, Lin X, Shen X. Preventing traffic explosion and achieving source unobservability in multi-hop wireless networks using network coding. In: Proc. of the 2010 IEEE Int'l Conf. on Global Telecommunications Conf. (GLOBECOM 2010). IEEE, 2010. 1-5. [doi: 10.1109/ GLOCOM.2010.5683317]
    [74] Rana SS, Vaidya NH. A new ‘Direction' for source location privacy in wireless sensor networks. In: Proc. of the 2012 IEEE Int'l Conf. on Global Communications Conf. (GLOBECOM 2012). IEEE, 2012. 342-347. [doi: 10.1109/GLOCOM.2012.6503136]
    [75] Li N, Raj M, Liu D, Wright M, Das SK. Using Data Mules to Preserve Source Location Privacy in Wireless Sensor Networks. Distributed Computing and Networking. Springer-Verlag, 2012. 309-324. [doi: 10.1007/978-3-642-25959-3_23]
    [76] Jiang R, Luo J, Wang XP. An attack tree based risk assessment for location privacy in wireless sensor networks. In: Proc. of the 8th IEEE Int'l Conf. on Wireless Communications, Networking and Mobile Computing (WiCOM 2012). IEEE, 2012. 1-4. [doi: 10. 11 09/WiCOM.2012.6478402]
    Comments
    Comments
    分享到微博
    Submit
Get Citation

彭辉,陈红,张晓莹,范永健,李翠平,李德英.无线传感器网络位置隐私保护技术.软件学报,2015,26(3):617-639

Copy
Share
Article Metrics
  • Abstract:8075
  • PDF: 10011
  • HTML: 3687
  • Cited by: 0
History
  • Received:April 02,2014
  • Revised:August 28,2014
  • Online: December 12,2014
You are the first2034797Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063