REAL: A Reciprocal Protocol for Location Privacy in Wireless Sensor Networks

被引:15
|
作者
Zhang, Jia-Dong [1 ]
Chow, Chi-Yin [1 ]
机构
[1] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China
关键词
Location privacy; k-anonymity; wireless sensor networks; location monitoring systems; aggregate locations; ENERGY-EFFICIENT; K-ANONYMITY; ARCHITECTURE; ALGORITHM;
D O I
10.1109/TDSC.2014.2366467
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
K-anonymity has been used to protect location privacy for location monitoring services in wireless sensor networks (WSNs), where sensor nodes work together to report k-anonymized aggregate locations to a server. Each k-anonymized aggregate location is a cloaked area that contains at least k persons. However, we identify an attack model to show that overlapping aggregate locations still pose privacy risks because an adversary can infer some overlapping areas with less than k persons that violates the k-anonymity privacy requirement. In this paper, we propose a reciprocal protocol for location privacy (REAL) in WSNs. In REAL, sensor nodes are required to autonomously organize their sensing areas into a set of non-overlapping and highly accurate k-anonymized aggregate locations. To confront the three key challenges in REAL, namely, self-organization, reciprocity property and high accuracy, we design a state transition process, a locking mechanism and a time delay mechanism, respectively. We compare the performance of REAL with current protocols through simulated experiments. The results show that REAL protects location privacy, provides more accurate query answers, and reduces communication and computational costs.
引用
收藏
页码:458 / 471
页数:14
相关论文
共 50 条
  • [21] Protecting receiver-location privacy in wireless sensor networks
    Jian, Ying
    Chen, Shigang
    Zhang, Zhan
    Zhang, Liang
    INFOCOM 2007, VOLS 1-5, 2007, : 1955 - +
  • [22] On providing location privacy for mobile sinks in wireless sensor networks
    Ngai, Edith C. -H.
    Rodhe, Ioana
    WIRELESS NETWORKS, 2013, 19 (01) : 115 - 130
  • [23] Differentially Private Location Privacy Preservation in Wireless Sensor Networks
    Chakraborty, Bodhi
    Verma, Shekhar
    Singh, Krishna Pratap
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 104 (01) : 387 - 406
  • [24] Providing Source Location Privacy in Wireless Sensor Networks: A Survey
    Conti, Mauro
    Willemsen, Jeroen
    Crispo, Bruno
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (03): : 1238 - 1280
  • [25] Privacy Protection of Node Location and Data in Wireless Sensor Networks
    Huan, He
    INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2016, 12 (11) : 34 - 39
  • [26] On providing location privacy for mobile sinks in wireless sensor networks
    Edith C.-H. Ngai
    Ioana Rodhe
    Wireless Networks, 2013, 19 : 115 - 130
  • [27] Jellyfish dynamic routing protocol with mobile sink for location privacy and congestion avoidance in wireless sensor networks
    Christopher, V. Bibin
    Jasper, J.
    JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 112
  • [28] A Robust Authentication Protocol with Privacy Protection for Wireless Sensor Networks
    Li, Xiong
    Niu, Jianwei
    Choo, Kim-Kwang Raymond
    RADIO FREQUENCY IDENTIFICATION AND IOT SECURITY, 2017, 10155 : 30 - 44
  • [29] Access Control Protocol With Node Privacy in Wireless Sensor Networks
    Kumar, Pardeep
    Gurtov, Andrei
    Iinatti, Jari
    Sain, Mangal
    Ha, Phuong H.
    IEEE SENSORS JOURNAL, 2016, 16 (22) : 8142 - 8150
  • [30] Location aware sensor routing protocol for mobile wireless sensor networks
    Hayes, Tom
    Ali, Falah H.
    IET WIRELESS SENSOR SYSTEMS, 2016, 6 (02) : 49 - 57