Optimal Privacy-Preserving Probabilistic Routing for Wireless Networks

被引:24
作者
Koh, Jing Yang [1 ]
Leong, Derek [1 ]
Peters, Gareth W. [2 ]
Nevat, Ido [3 ]
Wong, Wai-Choong [4 ]
机构
[1] ASTAR, Inst Infocomm Res, Singapore 138632, Singapore
[2] UCL, Dept Stat Sci, London WC1E 6BT, England
[3] TUMCREATE, Singapore 138602, Singapore
[4] Natl Univ Singapore, Dept Elect & Comp Engn, Singapore 119077, Singapore
关键词
Location privacy; privacy-utility trade-off; probabilistic routing; Bayesian traffic analysis; wireless routing; SOURCE-LOCATION PRIVACY; COMMUNICATION; ANONYMITY;
D O I
10.1109/TIFS.2017.2698424
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Privacy-preserving routing protocols in wireless networks frequently utilize additional artificial traffic to hide the identities of communicating source-destination pairs. Usually, the addition of artificial traffic is done heuristically with no guarantees that the transmission cost, latency, and so on, are optimized in every network topology. In this paper, we explicitly examine the privacy-utility tradeoff problem for wireless networks and develop a novel privacy-preserving routing algorithm called optimal privacy enhancing routing algorithm (OPERA). OPERA uses a statistical decision-making framework to optimize the privacy of the routing protocol given a utility (or cost) constraint. We consider global adversaries with both lossless and lossy observations that use the Bayesian maximum-a-posteriori (MAP) estimation strategy. We formulate the privacy-utility tradeoff problem as a linear program, which can be efficiently solved. Our simulation results demonstrate that OPERA reduces the adversary's detection probability by up to 50% compared to the random Uniform and Greedy heuristics, and up to five times compared to a baseline scheme. In addition, OPERA also outperforms the conventional information-theoretic mutual information approach.
引用
收藏
页码:2105 / 2114
页数:10
相关论文
共 30 条
[1]   Increasing base-station anonymity in wireless sensor networks [J].
Acharya, Uday ;
Younis, Mohamed .
AD HOC NETWORKS, 2010, 8 (08) :791-809
[2]  
[Anonymous], 2012, MACHINE LEARNING PRO
[3]  
Chambers B. A., 2002, THESIS
[4]   UNTRACEABLE ELECTRONIC MAIL, RETURN ADDRESSES, AND DIGITAL PSEUDONYMS [J].
CHAUM, DL .
COMMUNICATIONS OF THE ACM, 1981, 24 (02) :84-88
[5]  
Coble AR, 2010, UCAMCLTR785
[6]   Providing Source Location Privacy in Wireless Sensor Networks: A Survey [J].
Conti, Mauro ;
Willemsen, Jeroen ;
Crispo, Bruno .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (03) :1238-1280
[7]   Countermeasures against traffic analysis attacks in wireless sensor networks [J].
Deng, J ;
Han, R ;
Mishra, S .
First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Proceedings, 2005, :113-124
[8]   A Dummy-Based Approach for Preserving Source Rate Privacy [J].
Diyanat, Abolfazl ;
Khonsari, Ahmad ;
Shariatpanahi, Seyed Pooya .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (06) :1321-1332
[9]  
Doddavenkatappa M., 2011, Revised Selected Papers, V90, P302, DOI [10.1007/978-3-642-29273-6_23, DOI 10.1007/978-3-642-29273-6_23]
[10]   Privacy Aware Learning [J].
Duchi, John C. ;
Jordan, Michael I. ;
Wainwright, Martin J. .
JOURNAL OF THE ACM, 2014, 61 (06) :1-57