Analysis of location privacy solutions in wireless sensor networks
Analysis of location privacy solutions in wireless sensor networks
- Author(s): R. Rios and J. Lopez
- DOI: 10.1049/iet-com.2010.0825
For access to this article, please select a purchase option:
Buy article PDF
Buy Knowledge Pack
IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.
Thank you
Your recommendation has been sent to your librarian.
- Author(s): R. Rios 1 and J. Lopez 1
-
-
View affiliations
-
Affiliations:
1: Computer Science Department, University of Malaga, Malaga, Spain
-
Affiliations:
1: Computer Science Department, University of Malaga, Malaga, Spain
- Source:
Volume 5, Issue 17,
25 November 2011,
p.
2518 – 2532
DOI: 10.1049/iet-com.2010.0825 , Print ISSN 1751-8628, Online ISSN 1751-8636
Extensive work has been done on the protection of wireless sensor networks (WSNs) from the hardware to the application layer. However, only recently, the privacy preservation problem has drawn the attention of the research community because of its challenging nature. This problem is exacerbated in the domain of WSNs owing to the extreme resource limitation of sensor nodes. In this study the authors focus on the location privacy problem in WSNs, which allows an adversary to determine the location of nodes of interest to him. The authors provide a taxonomy of solutions based on the power of the adversary and the main techniques proposed by the various solutions. In addition, the authors describe and analyse the advantages and disadvantages of different approaches. Finally, they discuss some open challenges and future directions of research.
Inspec keywords: wireless sensor networks; data privacy
Other keywords:
Subjects: Wireless sensor networks
References
-
-
1)
- J. Walters , Z. Liang , W. Shi , V. Chaudhary , Y. Xiao . (2007) Wireless sensor network security: a survey, Security in distributed, grid, mobile, and pervasive computing.
-
2)
- Brands, S., Chaum, D.: `Distance-bounding protocols', EUROCRYPT '93: Workshop on the Theory and Application of Cryptographic Techniques on Advances in Cryptology, 1994, p. 344–359.
-
3)
- Zhang, Y., Liu, W., Lou, W.: `Anonymous communications in mobile ad hoc networks', INFOCOM 2005: Proc. IEEE 24th Annual Joint Conf. IEEE Computer and Communications Societies, 2005, 3, p. 1940–1951.
-
4)
- Y. Jian , S. Chen , Z. Zhang , L. Zhang . A novel scheme for protecting receiver's location privacy in wireless sensor networks. IEEE Trans. Wirel. Commun. , 10 , 3769 - 3779
-
5)
- Mehta, K., Liu, D., Wright, M.: `Location privacy in sensor networks against a global eavesdropper', ICNP 2007: IEEE Int. Conf. on Network Protocols, 2007, p. 314–323.
-
6)
- H. Wang , B. Sheng , Q. Li . Privacy-aware routing in sensor networks. Comput. Netw. , 9 , 1512 - 1529
-
7)
- Kamat, P., Zhang, Y., Trappe, W., Ozturk, C.: `Enhancing source-location privacy in sensor network routing', ICDCS 2005: 25th IEEE Int. Conf. on Distributed Computing Systems, 2005, p. 599–608.
-
8)
- Bassi, A., Horn, G.: `Internet of things in 2020 – a roadmap for the future', Technical Report, 2008.
-
9)
- M. Reiter , A. Rubin . Crowds: anonymity for web transactions. ACM Trans. Inf. Syst. Secur. , 1 , 66 - 92
-
10)
- S. Warren , L. Brandeis . The right to privacy. Harv. Law Rev. , 5
-
11)
- Zhang, W., Wang, C., Feng, T.: `GP', PerCom 2008: Sixth Annual IEEE Int. Conf. on Pervasive Computing and Communications 2008, 2008, p. 179–184.
-
12)
- Ouyang, Y., Le, Z., Xu, Y.: `Providing anonymity in wireless sensor networks', IEEE Int. Conf. on Pervasive Services, 2007, p. 145–148.
-
13)
- S. Biswas , S. Mukherjee , K. Mukhopadhyaya . (2008) A countermeasure against traffic-analysis based base station detection in WSN.
-
14)
- D. Banisar , S. Davies . Privacy and human rights – an international survey of privacy laws and practice.
-
15)
- Zhu, B., Wan, Z., Kankanhalli, M.S., Bao, F., Deng, R.H.: `Anonymous secure routing in mobile ad-hoc networks', LCN '04: Proc. 29th Annual IEEE Int. Conf. on Local Computer Networks, 2004, p. 102–108.
-
16)
- Li, Y., Ren, J.: `Preserving source-location privacy in wireless sensor networks', SECON’09: Proc. Sixth Annual IEEE Communications Society Conf. on Sensor, Mesh and Ad Hoc Communications and Networks, 2009, p. 493–501.
-
17)
- S. Misra , G. Xue . Efficient anonymity schemes for clustered wireless sensor networks. Int. J. Sens. Netw. , 1 , 50 - 63
-
18)
- D. Chaum . Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM , 2 , 84 - 88
-
19)
- Shao, M., Yang, Y., Zhu, S., Cao, G.: `Towards statistically strong source anonymity for sensor networks', The 27th Conference on Computer Communications, IEEE INFOCOM 2008, 2008, p. 466–474.
-
20)
- Li, Y., Ren, J.: `Providing source-location privacy in wireless sensor networks', WASA '09: Proc. Fourth Int. Conf. on Wireless Algorithms, Systems, and Applications, 2009, p. 338–347.
-
21)
- Shakshuki, E., Sheltami, T., Kang, N., Xing, X.: `Tracking anonymous sinks in wireless sensor networks', AINA’09: Int. Conf. on Advanced Information Networking and Applications 2009, 2009, p. 510–516.
-
22)
- R. Rajagopalan , P. Varshney . Data-aggregation techniques in sensor networks: a survey. IEEE Commun. Surv. Tutorials , 4 , 48 - 63
-
23)
- S. Spiekermann , L. Cranor . Engineering privacy. IEEE Trans. Softw. Eng. , 1 , 67 - 82
-
24)
- Kong, J., Hong, X.: `ANODR: ANonymous on Demand Routing with untraceable routes for mobile ad-hoc networks', MobiHoc '03: Proc. Fourth ACM Int. Symp. on Mobile Ad Hoc Networking & Computing, 2003, p. 291–302.
-
25)
- Ouyang, Y., Le, Z., Chen, G., Ford, J., Makedon, F.: `Entrapping adversaries for source protection in sensor networks', WOWMOM '06: Proc. 2006 Int. Symp. on World of Wireless, Mobile and Multimedia Networks, 2006, p. 23–34.
-
26)
- He, W., Liu, X., Nguyen, H., Nahrstedt, K., Abdelzaher, T.: `PDA: privacy-preserving data aggregation in wireless sensor networks', INFOCOM 2007: 26th IEEE Int. Conf. on Computer Communications, 2007, p. 2045–2053.
-
27)
- Deng, J., Han, R., Mishra, S.: `Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks', Int. Conf. on Dependable Systems and Networks, 2004, p. 637.
-
28)
- J. Deng , R. Han , S. Mishra . Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks. Pervasive Mob. Comput. , 2 , 159 - 186
-
29)
- M. Reed , P. Syverson , D. Goldschlag . Anonymous connections and onion routing. IEEE J. Sel. Areas Commun. , 4 , 482 - 494
-
30)
- Wei-ping, W., Liang, C., Jian-xin, W.: `A source-location privacy protocol in WSN based on locational angle', ICC ’08: IEEE Int. Conf. on Communications, 2008, p. 1630–1634.
-
31)
- Jian, Y., Chen, S., Zhang, Z., Zhang, L.: `Protecting receiver-location privacy in wireless sensor networks', INFOCOM 2007: 26th IEEE Int. Conf. on Computer Communications, 2007, p. 1955–1963.
-
32)
- Ozturk, C., Zhang, Y., Trappe, W.: `Source-location privacy in energy-constrained sensor network routing', SASN '04: Proc. Second ACM Workshop on Security of Ad Hoc and Sensor Networks, 2004, p. 88–93.
-
33)
- Seys, S., Preneel, B.: `ARM: anonymous routing protocol for mobile ad hoc networks', AINA 2006: 20th Int. Conf. on Advanced Information Networking and Applications 2006, 2006, 2, p. 133–137.
-
34)
- B.N. Levine , C. Shields . Hordes: a multicast based protocol for anonymity. J. Comput. Secur. , 3 , 213 - 240
-
35)
- Shaikh, R., Jameel, H., d'Auriol, B., Lee, S., Song, Y.J., Lee, H.: `Network level privacy for wireless sensor networks', ISIAS ’08: Fourth Int. Conf. on Information Assurance and Security, 2008, p. 261–266.
-
36)
- U. Acharya , M. Younis . Increasing base-station anonymity in wireless sensor networks. Ad Hoc Netw. , 8 , 791 - 809
-
37)
- V. Rijmen , N. Pramstaller , N. Sklavos , X. Zhang . (2007) Cryptographic algorithms in constrained environments, Wireless security & cryptography: specifications and implementations.
-
38)
- Dingledine, R., Mathewson, N., Syverson, P.: `Tor: the second-generation onion router', SSYM’04: Proc. 13th Conf. on USENIX Security Symp., 2004, p. 21–21.
-
39)
- Shakkottai, S.: `Asymptotics of query strategies over a sensor network', INFOCOM 2004: 23rd Annual Joint Conf. IEEE Computer and Communications Societies, 2004, 1.
-
40)
- Deng, J., Han, R., Mishra, S.: `Countermeasures against traffic analysis attacks in wireless sensor networks', SECURECOMM '05: Proc. First Int. Conf. on Security and Privacy for Emerging Areas in Communications Networks, 2005, p. 113–126.
-
41)
- Alomair, B., Clark, A., Cuellar, J., Poovendran, R.: `Statistical framework for source anonymity in sensor network', Technical Report 003, 2009.
-
42)
- Xi, Y., Schwiebert, L., Shi, W.: `Preserving source location privacy in monitoring-based wireless sensor networks', IPDPS 2006: 20th Int. Parallel and Distributed Processing Symp. 2006, 2006, p. 8.
-
43)
- Yang, Y., Shao, M., Zhu, S., Urgaonkar, B., Cao, G.: `Towards event source unobservability with minimum network traffic in sensor networks', WiSec '08: Proc. First ACM Conf. on Wireless Network Security, 2008, p. 77–88.
-
44)
- Shao, M., Hu, W., Zhu, S., Cao, G., Krishnamurthy, S., La Porta, T.: `Cross-layer enhanced source location privacy in sensor networks', SECON ’09: IEEE Conf. on Sensor, Mesh, and Ad Hoc Communications and Networks, 2009, p. 1–9.
-
45)
- Kamat, P., Xu, W., Trappe, W., Zhang, Y.: `Temporal privacy in wireless sensor networks', ICDCS '07: Proc. 27th Int. Conf. on Distributed Computing Systems, 2007, p. 23.
-
46)
- M. Shao , S. Zhu , W. Zhang , G. Cao , Y. Yang . pDCS: security and privacy support for data-centric sensor networks. IEEE Trans. Mob. Comput. , 8 , 1023 - 1038
-
47)
- S. Pai , S. Bermudez , S. Wicker . Transactional confidentiality in sensor networks. IEEE Secur. Priv. , 4 , 28 - 35
-
1)