Enhancing Sink-Location Privacy in Wireless Sensor Networks through k-Anonymity

被引:11
作者
Chai, Guofei [1 ]
Xu, Miao [2 ]
Xu, Wenyuan [2 ]
Lin, Zhiyun [1 ]
机构
[1] Zhejiang Univ, Coll Elect Engn, Hangzhou 310027, Zhejiang, Peoples R China
[2] Univ S Carolina, Dept Comp Sci & Engn, Columbia, SC 29208 USA
基金
美国国家科学基金会;
关键词
Complex networks - Radio communication - Nonlinear programming - Radio transmission - Constrained optimization - Sensor nodes;
D O I
10.1155/2012/648058
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the shared nature of wireless communication media, a powerful adversary can eavesdrop on the entire radio communication in the network and obtain the contextual communication statistics, for example, traffic volumes, transmitter locations, and so forth. Such information can reveal the location of the sink around which the data traffic exhibits distinctive patterns. To protect the sink-location privacy from a powerful adversary with a global view, we propose to achieve k-anonymity in the network so that at least k entities in the network are indistinguishable to the nodes around the sink with regard to communication statistics. Arranging the location of k entities is complex as it affects two conflicting goals: the routing energy cost and the achievable privacy level, and both goals are determined by a nonanalytic function. We model such a positioning problem as a nonlinearly constrained nonlinear optimization problem. To tackle it, we design a generic-algorithm-based quasi-optimal (GAQO) method that obtains quasi-optimal solutions at quadratic time. The obtained solutions closely approximate the optima with increasing privacy requirements. Furthermore, to solve k-anonymity sink-location problems more efficiently, we develop an artificial potential-based quasi-optimal (APQO) method that is of linear time complexity. Our extensive simulation results show that both algorithms can effectively find solutions hiding the sink among a large number of network nodes.
引用
收藏
页数:16
相关论文
共 30 条
[1]  
[Anonymous], 2008, P IEEE INFOCOM 27 C
[2]  
[Anonymous], 2002, Introduction to Cryptography with Coding Theory
[3]   Behavior-based coordination of large-scale robot formations [J].
Balch, T ;
Hybinette, M .
FOURTH INTERNATIONAL CONFERENCE ON MULTIAGENT SYSTEMS, PROCEEDINGS, 2000, :363-364
[4]   Random key predistribution schemes for sensor networks [J].
Chan, HW ;
Perrig, A ;
Song, D .
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, :197-213
[5]  
Conner W, 2006, LECT NOTES COMPUT SC, V4026, P202
[6]   Countermeasures against traffic analysis attacks in wireless sensor networks [J].
Deng, J ;
Han, R ;
Mishra, S .
First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Proceedings, 2005, :113-124
[7]  
Deng J, 2004, 2004 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, P637
[8]  
Dimarogonas Dimos V., 2007, 46th IEEE Conference on Decision and Control, P6148
[9]   Self-deployment and Coverage of Mobile Sensors within a Bounded Region [J].
Ding, Wei ;
Yan, Gangfeng ;
Lin, Zhiyun .
CCDC 2009: 21ST CHINESE CONTROL AND DECISION CONFERENCE, VOLS 1-6, PROCEEDINGS, 2009, :3683-3688
[10]  
Edith C., 2009, INT C WIRELESS COMMU, P269, DOI DOI 10.1145/1582379.1582439