Providing Source Location Privacy in Wireless Sensor Networks: A Survey

被引:124
|
作者
Conti, Mauro [1 ]
Willemsen, Jeroen [2 ]
Crispo, Bruno [3 ]
机构
[1] Univ Padua, I-35100 Padua, Italy
[2] Vrije Univ Amsterdam, Amsterdam, Netherlands
[3] Univ Trento, Dept Comp Sci & Informat Engn, Trento, Italy
来源
关键词
WSN Privacy; Location privacy; Source location privacy; Context privacy; CONCEALED DATA AGGREGATION; RANDOM FORWARDING GERAF; AD HOC; SECURITY; ENERGY; PRESERVATION; ANONYMITY; PROTOCOL; CONFIDENTIALITY; COMMUNICATION;
D O I
10.1109/SURV.2013.011413.00118
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks (WSNs) consist of numerous small nodes that can sense, collect, and disseminate information for many different types of applications. One of these applications is subject tracking and monitoring, in which the monitored subjects often need protection. For instance, a WSN can be deployed to monitor the movement of a panda in a national park. The panda needs protection from different adversaries, such as hunters and poachers. An adversary might trace the messages in the WSN to find the source node that sensed the panda, with the final aim of killing the panda. Hence the question is: how do we hide the location of the source node from the adversary? This question is relevant in several of the scenarios related to this application, such as patient monitoring and battlefield surveillance. In other words, the problem is to provide privacy to the source node: source location privacy. In this paper, we provide a survey of the state of the art in source location privacy. We first discuss the key concepts in source location privacy, such as anonymity, unobservability, safety period, and capture likelihood. Then, we present an overview of the solutions that provide source location privacy within a WSN, in relation to the assumptions about the adversary's capabilities. In particular, we summarize the concepts and solutions, which are categorized based on the core techniques used to provide source location privacy. We mention the limitations of the algorithms as found in the literature, classify the solutions based on their approach, and provide an overview of the assumptions on the adversarial capabilities related to each solution.
引用
收藏
页码:1238 / 1280
页数:43
相关论文
共 50 条
  • [1] Providing Source-Location Privacy in Wireless Sensor Networks
    Li, Yun
    Ren, Jian
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, 2009, 5682 : 338 - 347
  • [2] On Providing Location Privacy for Mobile Sinks in Wireless Sensor Networks
    Ngai, Edith C. -H.
    Rodhe, Ioana
    MSWIM09; PROCEEDINGS OF THE 12TH ACM INTERNATIONAL CONFERENCE ON MODELING, ANALYSIS, AND SYSTEMS, 2009, : 116 - 123
  • [3] On providing location privacy for mobile sinks in wireless sensor networks
    Ngai, Edith C. -H.
    Rodhe, Ioana
    WIRELESS NETWORKS, 2013, 19 (01) : 115 - 130
  • [4] On providing location privacy for mobile sinks in wireless sensor networks
    Edith C.-H. Ngai
    Ioana Rodhe
    Wireless Networks, 2013, 19 : 115 - 130
  • [5] A survey on location privacy protection in Wireless Sensor Networks
    Jiang, Jinfang
    Han, Guangjie
    Wang, Hao
    Guizani, Mohsen
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 125 : 93 - 114
  • [6] Providing Location Privacy Using Fake Sources in Wireless Sensor Networks
    Adilbekov, Ulugbek
    Adilova, Anar
    Saginbekov, Sain
    2018 IEEE 12TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT), 2018, : 225 - 228
  • [7] Providing location privacy against a global adversary in wireless sensor networks
    Zhou, Liming
    Wen, Qiaoyan
    Zhou, L. (zhouliming1985@gmail.com), 2013, Binary Information Press, Flat F 8th Floor, Block 3, Tanner Garden, 18 Tanner Road, Hong Kong (10): : 5043 - 5053
  • [8] Recent Advancements in Privacy-aware Protocols of Source Location Privacy in Wireless Sensor Networks: a Survey
    Roy, Pradeep
    Tripathy, Asis
    Singh, Sunil
    Li, Kuan-Ching
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2022, 19 (02) : 857 - 886
  • [9] A Confounding-Domain Randomized Approach for Providing Source Location Privacy Preservation for Wireless Sensor Networks
    Nisha
    Suresh, S.
    IETE TECHNICAL REVIEW, 2024, 41 (06) : 635 - 649
  • [10] Preserving Source-Location Privacy in Wireless Sensor Networks
    Li, Yun
    Ren, Jian
    2009 6TH ANNUAL IEEE COMMUNICATIONS SOCIETY CONFERENCE ON SENSOR, MESH AND AD HOC COMMUNICATIONS AND NETWORKS (SECON 2009), 2009, : 493 - 501