On providing location privacy for mobile sinks in wireless sensor networks

被引:0
作者
Edith C.-H. Ngai
Ioana Rodhe
机构
[1] Uppsala University,Department of Information Technology
来源
Wireless Networks | 2013年 / 19卷
关键词
Wireless sensor networks; Privacy; Data collection; Location; Mobility;
D O I
暂无
中图分类号
学科分类号
摘要
A common practice in sensor networks is to collect sensing data and report them to the sinks or to some pre-defined data rendezvous points via multi-hop communications. Attackers may locate the sink easily by reading the destination field in the packet header or predicting the arrival of the sink at the rendezvous points, which opens up vulnerabilities to location privacy of the sinks. In this paper, we propose a random data collection scheme to protect the location privacy of mobile sinks in wireless sensor networks. Data are forwarded along random paths and stored at the intermediate nodes probabilistically in the network. The sinks will move around randomly to collect data from the local nodes occasionally, which prevents the attackers from predicting their locations and movements. We analyze different kind of attacks threatening the location privacy of the sinks in sensor networks. We also evaluate the delivery rate, data collection delay and protection strength of our scheme by both analysis and simulations. Both analytical and simulation results show that our scheme can protect location privacy of mobile sinks effectively, while providing satisfactory data collection services.
引用
收藏
页码:115 / 130
页数:15
相关论文
共 38 条
  • [1] Akyildiz I. F.(2002)Wireless sensor networks: A survey Computer Networks 38 393-422
  • [2] Su W.(2006)H-SPREAD: A hybrid multipath scheme for secure and reliable data collection in wireless sensor networks IEEE Transactions on Vechicular Technology 55 1320-1330
  • [3] Sandarasubramaniam T.(2007)Data dissemination with ring-based index for wireless sensor networks IEEE Transactions on Mobile Computing 6 832-847
  • [4] Lou W.(2004)Routing techniques in wireless sensor networks: A survey IEEE Wireless Communication 11 6-28
  • [5] Kwon Y.(2007)Energy efficient routing with delay guarantee for sensor networks ACM Wireless Networks 13 679-690
  • [6] Zhang W.(2006)Controllably mobile infrastructure for low energy embedded networks IEEE Transactions on Mobile Computing 5 958-973
  • [7] Cao G.(2010)An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications IEEE Transactions on Vehicular Technology 59 3589-3603
  • [8] La Porta T.(2002)k-anonymity: A model for protecting privacy International Journal of Uncertainty Fuzziness-Based System 10 557-570
  • [9] Al-Karaki J. N.(2010)Privacy-preserving data publishing: A survey of recent developments ACM Computing Surveys 42 1-53
  • [10] Kamal A. E.(2006)Data harvesting with mobile elements in wireless sensor networks Computer Networks 50 3449-3465