Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Analysis of location privacy solutions in wireless sensor networks

Analysis of location privacy solutions in wireless sensor networks

For access to this article, please select a purchase option:

Buy article PDF
$19.95
(plus tax if applicable)
Buy Knowledge Pack
10 articles for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Communications — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Extensive work has been done on the protection of wireless sensor networks (WSNs) from the hardware to the application layer. However, only recently, the privacy preservation problem has drawn the attention of the research community because of its challenging nature. This problem is exacerbated in the domain of WSNs owing to the extreme resource limitation of sensor nodes. In this study the authors focus on the location privacy problem in WSNs, which allows an adversary to determine the location of nodes of interest to him. The authors provide a taxonomy of solutions based on the power of the adversary and the main techniques proposed by the various solutions. In addition, the authors describe and analyse the advantages and disadvantages of different approaches. Finally, they discuss some open challenges and future directions of research.

References

    1. 1)
      • J. Walters , Z. Liang , W. Shi , V. Chaudhary , Y. Xiao . (2007) Wireless sensor network security: a survey, Security in distributed, grid, mobile, and pervasive computing.
    2. 2)
      • Brands, S., Chaum, D.: `Distance-bounding protocols', EUROCRYPT '93: Workshop on the Theory and Application of Cryptographic Techniques on Advances in Cryptology, 1994, p. 344–359.
    3. 3)
      • Zhang, Y., Liu, W., Lou, W.: `Anonymous communications in mobile ad hoc networks', INFOCOM 2005: Proc. IEEE 24th Annual Joint Conf. IEEE Computer and Communications Societies, 2005, 3, p. 1940–1951.
    4. 4)
    5. 5)
      • Mehta, K., Liu, D., Wright, M.: `Location privacy in sensor networks against a global eavesdropper', ICNP 2007: IEEE Int. Conf. on Network Protocols, 2007, p. 314–323.
    6. 6)
    7. 7)
      • Kamat, P., Zhang, Y., Trappe, W., Ozturk, C.: `Enhancing source-location privacy in sensor network routing', ICDCS 2005: 25th IEEE Int. Conf. on Distributed Computing Systems, 2005, p. 599–608.
    8. 8)
      • Bassi, A., Horn, G.: `Internet of things in 2020 – a roadmap for the future', Technical Report, 2008.
    9. 9)
    10. 10)
    11. 11)
      • Zhang, W., Wang, C., Feng, T.: `GP', PerCom 2008: Sixth Annual IEEE Int. Conf. on Pervasive Computing and Communications 2008, 2008, p. 179–184.
    12. 12)
      • Ouyang, Y., Le, Z., Xu, Y.: `Providing anonymity in wireless sensor networks', IEEE Int. Conf. on Pervasive Services, 2007, p. 145–148.
    13. 13)
      • S. Biswas , S. Mukherjee , K. Mukhopadhyaya . (2008) A countermeasure against traffic-analysis based base station detection in WSN.
    14. 14)
      • D. Banisar , S. Davies . Privacy and human rights – an international survey of privacy laws and practice.
    15. 15)
      • Zhu, B., Wan, Z., Kankanhalli, M.S., Bao, F., Deng, R.H.: `Anonymous secure routing in mobile ad-hoc networks', LCN '04: Proc. 29th Annual IEEE Int. Conf. on Local Computer Networks, 2004, p. 102–108.
    16. 16)
      • Li, Y., Ren, J.: `Preserving source-location privacy in wireless sensor networks', SECON’09: Proc. Sixth Annual IEEE Communications Society Conf. on Sensor, Mesh and Ad Hoc Communications and Networks, 2009, p. 493–501.
    17. 17)
    18. 18)
    19. 19)
      • Shao, M., Yang, Y., Zhu, S., Cao, G.: `Towards statistically strong source anonymity for sensor networks', The 27th Conference on Computer Communications, IEEE INFOCOM 2008, 2008, p. 466–474.
    20. 20)
      • Li, Y., Ren, J.: `Providing source-location privacy in wireless sensor networks', WASA '09: Proc. Fourth Int. Conf. on Wireless Algorithms, Systems, and Applications, 2009, p. 338–347.
    21. 21)
      • Shakshuki, E., Sheltami, T., Kang, N., Xing, X.: `Tracking anonymous sinks in wireless sensor networks', AINA’09: Int. Conf. on Advanced Information Networking and Applications 2009, 2009, p. 510–516.
    22. 22)
    23. 23)
    24. 24)
      • Kong, J., Hong, X.: `ANODR: ANonymous on Demand Routing with untraceable routes for mobile ad-hoc networks', MobiHoc '03: Proc. Fourth ACM Int. Symp. on Mobile Ad Hoc Networking & Computing, 2003, p. 291–302.
    25. 25)
      • Ouyang, Y., Le, Z., Chen, G., Ford, J., Makedon, F.: `Entrapping adversaries for source protection in sensor networks', WOWMOM '06: Proc. 2006 Int. Symp. on World of Wireless, Mobile and Multimedia Networks, 2006, p. 23–34.
    26. 26)
      • He, W., Liu, X., Nguyen, H., Nahrstedt, K., Abdelzaher, T.: `PDA: privacy-preserving data aggregation in wireless sensor networks', INFOCOM 2007: 26th IEEE Int. Conf. on Computer Communications, 2007, p. 2045–2053.
    27. 27)
      • Deng, J., Han, R., Mishra, S.: `Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks', Int. Conf. on Dependable Systems and Networks, 2004, p. 637.
    28. 28)
    29. 29)
    30. 30)
      • Wei-ping, W., Liang, C., Jian-xin, W.: `A source-location privacy protocol in WSN based on locational angle', ICC ’08: IEEE Int. Conf. on Communications, 2008, p. 1630–1634.
    31. 31)
      • Jian, Y., Chen, S., Zhang, Z., Zhang, L.: `Protecting receiver-location privacy in wireless sensor networks', INFOCOM 2007: 26th IEEE Int. Conf. on Computer Communications, 2007, p. 1955–1963.
    32. 32)
      • Ozturk, C., Zhang, Y., Trappe, W.: `Source-location privacy in energy-constrained sensor network routing', SASN '04: Proc. Second ACM Workshop on Security of Ad Hoc and Sensor Networks, 2004, p. 88–93.
    33. 33)
      • Seys, S., Preneel, B.: `ARM: anonymous routing protocol for mobile ad hoc networks', AINA 2006: 20th Int. Conf. on Advanced Information Networking and Applications 2006, 2006, 2, p. 133–137.
    34. 34)
      • B.N. Levine , C. Shields . Hordes: a multicast based protocol for anonymity. J. Comput. Secur. , 3 , 213 - 240
    35. 35)
      • Shaikh, R., Jameel, H., d'Auriol, B., Lee, S., Song, Y.J., Lee, H.: `Network level privacy for wireless sensor networks', ISIAS ’08: Fourth Int. Conf. on Information Assurance and Security, 2008, p. 261–266.
    36. 36)
    37. 37)
      • V. Rijmen , N. Pramstaller , N. Sklavos , X. Zhang . (2007) Cryptographic algorithms in constrained environments, Wireless security & cryptography: specifications and implementations.
    38. 38)
      • Dingledine, R., Mathewson, N., Syverson, P.: `Tor: the second-generation onion router', SSYM’04: Proc. 13th Conf. on USENIX Security Symp., 2004, p. 21–21.
    39. 39)
      • Shakkottai, S.: `Asymptotics of query strategies over a sensor network', INFOCOM 2004: 23rd Annual Joint Conf. IEEE Computer and Communications Societies, 2004, 1.
    40. 40)
      • Deng, J., Han, R., Mishra, S.: `Countermeasures against traffic analysis attacks in wireless sensor networks', SECURECOMM '05: Proc. First Int. Conf. on Security and Privacy for Emerging Areas in Communications Networks, 2005, p. 113–126.
    41. 41)
      • Alomair, B., Clark, A., Cuellar, J., Poovendran, R.: `Statistical framework for source anonymity in sensor network', Technical Report 003, 2009.
    42. 42)
      • Xi, Y., Schwiebert, L., Shi, W.: `Preserving source location privacy in monitoring-based wireless sensor networks', IPDPS 2006: 20th Int. Parallel and Distributed Processing Symp. 2006, 2006, p. 8.
    43. 43)
      • Yang, Y., Shao, M., Zhu, S., Urgaonkar, B., Cao, G.: `Towards event source unobservability with minimum network traffic in sensor networks', WiSec '08: Proc. First ACM Conf. on Wireless Network Security, 2008, p. 77–88.
    44. 44)
      • Shao, M., Hu, W., Zhu, S., Cao, G., Krishnamurthy, S., La Porta, T.: `Cross-layer enhanced source location privacy in sensor networks', SECON ’09: IEEE Conf. on Sensor, Mesh, and Ad Hoc Communications and Networks, 2009, p. 1–9.
    45. 45)
      • Kamat, P., Xu, W., Trappe, W., Zhang, Y.: `Temporal privacy in wireless sensor networks', ICDCS '07: Proc. 27th Int. Conf. on Distributed Computing Systems, 2007, p. 23.
    46. 46)
    47. 47)
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-com.2010.0825
Loading

Related content

content/journals/10.1049/iet-com.2010.0825
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address