On the Trade-Off between User-Location Privacy and Queried-Location Privacy in Wireless Sensor Networks

被引:0
|
作者
Vogt, Ryan [1 ]
Nascimento, Mario A. [1 ]
Harms, Janelle [1 ]
机构
[1] Univ Alberta, Dept Comp Sci, Edmonton, AB T6G 2M7, Canada
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
By eavesdropping on a user's query in a sensor network, an adversary can deduce both the user's location and his/her area of interest. In many domains it is desitable to guarantee privary of both places. We propose an effective way to measure how well issuing a disperse set of k queries protects the user's area of interest However, issing k queries instead of one facilitates the adversary determining the user's location. To address that issue, we define a quantitative measure of how much information the k queries leak about the user's location Experiments reveral that how dispersed the k queries are has no effect on the privacy of the user's location. Howerver, smaller k. randomized routing, and non-broadcast transmission improve the user's location privacy. We also show that compromissing nodes in the user's network yields no significant advantage to the adversary over an eavesdropping strategy.
引用
收藏
页码:241 / 254
页数:14
相关论文
共 50 条
  • [31] Preserving Mobile-Sink-Location Privacy in Wireless Sensor Networks
    Yao, Jianbo
    2010 2ND INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS PROCEEDINGS (DBTA), 2010,
  • [32] Providing Location Privacy Using Fake Sources in Wireless Sensor Networks
    Adilbekov, Ulugbek
    Adilova, Anar
    Saginbekov, Sain
    2018 IEEE 12TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT), 2018, : 225 - 228
  • [33] A Protecting Source-Location Privacy Scheme for Wireless Sensor Networks
    Miao, Xu
    Han, Guangjie
    He, Yu
    Wang, Hao
    Jiang, Jinfang
    2018 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE AND STORAGE (NAS), 2018,
  • [34] Source Location Privacy Using Data Mules in Wireless Sensor Networks
    Singh, Jyoti Prakash
    Roy, Pradeep Kumar
    Singh, Sunil Kumar
    Kumar, Prabhat
    PROCEEDINGS OF THE 2016 IEEE REGION 10 CONFERENCE (TENCON), 2016, : 2743 - 2747
  • [35] Source-location privacy full protection in wireless sensor networks
    Wang, Na
    Fu, Junsong
    Zeng, Jiwen
    Bhargava, Bharat K.
    INFORMATION SCIENCES, 2018, 444 : 105 - 121
  • [36] Analysis of location privacy/energy efficiency tradeoffs in wireless sensor networks
    Armenia, Sergio
    Morabito, Giacomo
    Palazzo, Sergio
    NETWORKING 2007: AD HOC AND SENSOR NETWORKS, WIRELESS NETWORKS, NEXT GENERATION INTERNET, PROCEEDINGS, 2007, 4479 : 215 - +
  • [37] A Probabilistic Source Location Privacy Protection Scheme in Wireless Sensor Networks
    Wang, Hao
    Han, Guangjie
    Zhang, Wenbo
    Guizani, Mohsen
    Chan, Sammy
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (06) : 5917 - 5927
  • [38] Virtual Source-Based Location Privacy for Wireless Sensor Networks
    Raja, R. Altis
    Valli, S.
    IETE JOURNAL OF RESEARCH, 2015, 61 (05) : 475 - 481
  • [39] Protecting Source Location Privacy in Wireless Sensor Networks with Data Aggregation
    Yang, Wenbo
    Zhu, Wen Tao
    UBIQUITOUS INTELLIGENCE AND COMPUTING, 2010, 6406 : 252 - 266
  • [40] Hybrid online protocols for source location privacy in wireless sensor networks
    Bradbury, Matthew
    Jhumka, Arshad
    Leeke, Matthew
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2018, 115 : 67 - 81