A survey on location privacy protection in Wireless Sensor Networks

被引:57
作者
Jiang, Jinfang [1 ]
Han, Guangjie [2 ]
Wang, Hao [1 ]
Guizani, Mohsen [3 ]
机构
[1] Hohai Univ, Dept Commun & Informat Syst, Changzhou, Peoples R China
[2] Dalian Univ Technol, Sch Software, Key Lab Ubiquitous Network & Serv Software Liaoni, Dalian 116024, Peoples R China
[3] Univ Idaho, Moscow, ID 83843 USA
基金
中国国家自然科学基金;
关键词
Wireless Sensor Networks; Location privacy preserving; Location anonymity; Phantom routing; ANONYMOUS COMMUNICATION PROTOCOL; SCHEME; EFFICIENT; WSNS;
D O I
10.1016/j.jnca.2018.10.008
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Location of sensor nodes is one of the most important and fundamental information for Wireless Sensor Networks (WSNs), because it provides basic support for many location-based applications (e.g., navigation and object tracking) and location-aware protocols (e.g., geographic location-based routing protocols). However, by extracting and analyzing the location information in packets, attackers can easily obtain the real position of source nodes or base station using hop-by-hop backtracking strategy, which is extremely harmful for the normal operation of sensor networks. So, we need to provide location anonymity for sensor networks. In this paper, we present a detail survey of existing Location Privacy Protection (LPP) techniques in WSNs. First, the network model, the attack model and the performance evaluation model are reviewed. Then, this survey provides a review of the literature about location privacy protection, which is classified into the following three categories: 1) source nodes' location privacy preserving, 2) sink nodes' location privacy preserving, and 3) location privacy preserving for both source and sink nodes. The details of location privacy preserving protocols are carefully analyzed, and the key mechanisms in each protocol are elaborated. In addition, the performance, including the network safety period, the packet transmission latency and the energy consumption, is analyzed and compared. Finally, the exiting problems and the future research issues are presented.
引用
收藏
页码:93 / 114
页数:22
相关论文
共 89 条
[1]   Fortified Anonymous Communication Protocol for Location Privacy in WSN: A Modular Approach [J].
Abuzneid, Abdel-Shakour ;
Sobh, Tarek ;
Faezipour, Miad ;
Mahmood, Ausif ;
James, John .
SENSORS, 2015, 15 (03) :5820-5864
[2]  
Agrawal R, 2003, SIGMOD 03, P86, DOI DOI 10.1145/872757.872771
[3]   A survey on sensor networks [J].
Akyildiz, IF ;
Su, WL ;
Sankarasubramaniam, Y ;
Cayirci, E .
IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (08) :102-114
[4]   Toward a Statistical Framework for Source Anonymity in Sensor Networks [J].
Alomair, Basel ;
Clark, Andrew ;
Cuellar, Jorge ;
Poovendran, Radha .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2013, 12 (02) :248-260
[5]  
[Anonymous], 2010, Proceedings of the Globecom Conference
[6]  
[Anonymous], 2008, P IEEE INFOCOM 27 C
[7]  
[Anonymous], COMPUT SCI INF SYST
[8]  
[Anonymous], INT J DISTRIBUTED SE
[9]  
[Anonymous], 2013, INT J DISTRIB SENS N
[10]  
[Anonymous], WIRELESS NETWORK