Probabilistic routing in wireless networks with privacy guarantees

被引:2
作者
Koh, Jing Yang [1 ]
Peters, Gareth W. [2 ]
Nevat, Ido [3 ]
Leong, Derek [4 ]
机构
[1] NUS, Singapore, Singapore
[2] Heriot Watt Univ, Dept Actuarial Math & Stat, Edinburgh, Midlothian, Scotland
[3] TUMCREATE, Cooling Singapore, Singapore, Singapore
[4] I2R, Singapore, Singapore
基金
新加坡国家研究基金会;
关键词
Location privacy; Probabilistic routing; k-anonymity; Bayesian traffic analysis; LOCATION PRIVACY;
D O I
10.1016/j.comcom.2019.12.045
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider the source-destination location privacy problem for routing in wireless networks. Previous routing schemes mainly provided privacy protection by minimizing the average detection probability of traffic analysis attempts. However, they do not seek to provide strict privacy guarantees of the vulnerable source-destination pairs, which could still be relatively easy to identify. To address this gap in the literature, we propose the (k, epsilon)-anonymity property for routing in wireless networks with privacy guarantees. We consider a Bayesian maximum-a-posteriori (MAP) inference-based adversary and design a probabilistic routing scheme that uses a statistical decision-making framework to compute the minimum-cost (k, epsilon)-anonymous paths. A routing scheme is (k, epsilon)-anonymous if there are k or more distinct source-destination pairs within an epsilon-tolerance of the MAP probability. We compare our approach against a baseline routing scheme that minimizes the average detection probability of the adversary, and our simulation results show that our approach provides significantly better (k, epsilon)-anonymity privacy guarantees while achieving comparable average adversarial detection probability. We also studied how the adversary's prior beliefs affect its detection probability and Bayes risk.
引用
收藏
页码:228 / 237
页数:10
相关论文
共 32 条
[21]  
Machanavajjhala A., 2007, ACM T KNOWL DISCOV D, V1, P3, DOI [10.1145/1217299.1217302, DOI 10.1145/1217299.1217302]
[22]  
MacKay D.J.C., 2002, Information Theory, Inference & Learning Algorithms
[23]   Protecting Location Privacy in Sensor Networks against a Global Eavesdropper [J].
Mehta, Kiran ;
Liu, Donggang ;
Wright, Matthew .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2012, 11 (02) :320-336
[24]  
Murphy KP, 2012, MACHINE LEARNING: A PROBABILISTIC PERSPECTIVE, P1
[25]   Covert Wireless Communication in Presence of a Multi-Antenna Adversary and Delay Constraints [J].
Shahzad, Khurram ;
Zhou, Xiangyun ;
Yan, Shihao .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (12) :12432-12436
[26]   ALERT: An Anonymous Location-Based Efficient Routing Protocol in MANETs [J].
Shen, Haiying ;
Zhao, Lianyu .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2013, 12 (06) :1079-1093
[27]   k-anonymity:: A model for protecting privacy [J].
Sweeney, L .
INTERNATIONAL JOURNAL OF UNCERTAINTY FUZZINESS AND KNOWLEDGE-BASED SYSTEMS, 2002, 10 (05) :557-570
[28]   Mixed Integer Linear Programming Formulation Techniques [J].
Vielma, Juan Pablo .
SIAM REVIEW, 2015, 57 (01) :3-57
[29]  
Wan ZG, 2012, IEEE INFOCOM SER, P73, DOI 10.1109/INFCOM.2012.6195820
[30]  
Wolsey L.A., 2000, IIE Transactions, V32, P2