Location Privacy Preservation in Wireless Sensor Networks

This paper provides a state-of-the-art survey of location privacy-preserving techniques in WSNs. First, the network model, the attack model and the performance evaluation model are reviewed. Then, existing work is classified into four types, including path camouflage, entrapment attracting, network anonymity and communication control. Further, the key mechanisms of typical location privacy-preserving protocols are elaborated. Performance analysis and comparison show that all these four strategies affect communication and energy efficiency in some degree. In addition, the path camouflage strategy mainly aims at hop-by-hop trace attack, the network anonymity strategy aims at ID analysis attack, while the entrapment attraction and communication control strategies are capable of resisting multiple types of attacks. Finally, suggestions for future research are provided.

[1]  Srikanth V. Krishnamurthy,et al.  Cross-layer Enhanced Source Location Privacy in Sensor Networks , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[2]  Xi Fang,et al.  Truthful incentive mechanisms for k-anonymity location privacy , 2013, 2013 Proceedings IEEE INFOCOM.

[3]  Sencun Zhu,et al.  Towards Statistically Strong Source Anonymity for Sensor Networks , 2008, INFOCOM.

[4]  Fan Zhang,et al.  Data perturbation with state-dependent noise for participatory sensing , 2012, 2012 Proceedings IEEE INFOCOM.

[5]  Leonidas Kazatzopoulos,et al.  iHIDE: hiding sources of information in WSNs , 2006, Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU'06).

[6]  Arshad Jhumka,et al.  Evaluating the Impact of Broadcast Rates and Collisions on Fake Source Protocols for Source Location Privacy , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.

[7]  Jiming Chen,et al.  Preventing Traffic Explosion and Achieving Source Unobservability in Multi-Hop Wireless Networks Using Network Coding , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[8]  Wang Lu,et al.  Location Privacy Preservation in Big Data Era: A Survey , 2014 .

[9]  Xiaojiang Du,et al.  An efficient anonymous communication protocol for wireless sensor networks , 2012, Wirel. Commun. Mob. Comput..

[10]  Neeraj Mittal,et al.  Secure Location Verification with Randomly-Selected Base Stations , 2011, 2011 31st International Conference on Distributed Computing Systems Workshops.

[11]  Xuemin Shen,et al.  An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding , 2009, IEEE INFOCOM 2009.

[12]  Wade Trappe,et al.  Source-location privacy in energy-constrained sensor network routing , 2004, SASN '04.

[13]  Jian Ren,et al.  Source-Location Privacy through Dynamic Routing in Wireless Sensor Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[14]  Wang An An Energy-Saving Privacy-Preserving Data Aggregation Algorithm , 2011 .

[15]  Salil S. Kanhere,et al.  TrustMeter: A trust assessment scheme for collaborative privacy mechanisms in participatory sensing applications , 2014, 2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP).

[16]  Bo Sheng,et al.  Verifiable Privacy-Preserving Range Query in Two-Tiered Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[17]  Wenbo He,et al.  KIPDA: k-indistinguishable privacy-preserving data aggregation in wireless sensor networks , 2011, 2011 Proceedings IEEE INFOCOM.

[18]  Marco Gruteser,et al.  USENIX Association , 1992 .

[19]  Fillia Makedon,et al.  Entrapping adversaries for source protection in sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).

[20]  K. Nahrstedt,et al.  iPDA: An integrity-protecting private data aggregation scheme for wireless sensor networks , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[21]  Hong Chen,et al.  Data Privacy Preservation in Wireless Sensor Networks , 2012 .

[22]  Xue Liu,et al.  PDA: Privacy-Preserving Data Aggregation in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[23]  Wensheng Zhang,et al.  Confidentiality Protection for Distributed Sensor Data Aggregation , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[24]  Yun Liu,et al.  High energy‐efficient and privacy‐preserving secure data aggregation for wireless sensor networks , 2013, Int. J. Commun. Syst..

[25]  Wei Zhang,et al.  A Collaboratively Hidden Location Privacy Scheme for VANETs , 2014, Int. J. Distributed Sens. Networks.

[26]  Roberto Di Pietro,et al.  Location privacy and resilience in wireless sensor networks querying , 2011, Comput. Commun..

[27]  C. Castelluccia,et al.  Efficient aggregation of encrypted data in wireless sensor networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.

[28]  Miao Xu,et al.  Enhancing Sink-Location Privacy in Wireless Sensor Networks through k-Anonymity , 2012, Int. J. Distributed Sens. Networks.

[29]  Jie Gao,et al.  Is random walk truly memoryless — Traffic analysis and source location privacy under random walks , 2013, 2013 Proceedings IEEE INFOCOM.

[30]  Lei Kang,et al.  Protecting Location Privacy in Large-Scale Wireless Sensor Networks , 2009, 2009 IEEE International Conference on Communications.

[31]  Li Xiao,et al.  Maintaining source privacy under eavesdropping and node compromise attacks , 2011, 2011 Proceedings IEEE INFOCOM.

[32]  Wang Wei-ping,et al.  A Source-Location Privacy Protocol in WSN Based on Locational Angle , 2008, 2008 IEEE International Conference on Communications.

[33]  Wensheng Zhang,et al.  ElliPS: A Privacy Preserving Scheme for Sensor Data Storage and Query , 2009, IEEE INFOCOM 2009.

[34]  Petros Spachos,et al.  Improving source-location privacy through opportunistic routing in wireless sensor networks , 2011, 2011 IEEE Symposium on Computers and Communications (ISCC).

[35]  Honglong Chen,et al.  On protecting end-to-end location privacy against local eavesdropper in Wireless Sensor Networks , 2015, Pervasive Mob. Comput..

[36]  Jian Ren,et al.  Preserving Source-Location Privacy in Wireless Sensor Network Using STaR Routing , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[37]  Weisong Shi,et al.  Preserving source location privacy in monitoring-based wireless sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.

[38]  Nitin H. Vaidya,et al.  A new ‘Direction’ for source location privacy in wireless sensor networks' , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[39]  Silvija Kokalj-Filipovic,et al.  The quality of source location protection in globally attacked sensor networks , 2011, 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).

[40]  Guohong Cao,et al.  Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System , 2013, IEEE Transactions on Mobile Computing.

[41]  Xiaoyan Hong,et al.  Effective probabilistic approach protecting sensor traffic , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.

[42]  Lin Yao,et al.  Protecting the sink location privacy in wireless sensor networks , 2012, Personal and Ubiquitous Computing.

[43]  Alex X. Liu,et al.  SafeQ: Secure and Efficient Query Processing in Sensor Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[44]  Chen Juan A Source-Location Privacy Preservation Protocol in Wireless Sensor Networks Using Source-Based Restricted Flooding , 2010 .

[45]  Shuai Li,et al.  Location privacy preservation in collaborative spectrum sensing , 2012, 2012 Proceedings IEEE INFOCOM.

[46]  Rinku Dewri,et al.  Local Differential Perturbations: Location Privacy under Approximate Knowledge Attackers , 2013, IEEE Transactions on Mobile Computing.

[47]  Zohra Binte Sailan,et al.  Hop by Hop Message Authentication and Source Privacy in Wireless Sensor Networks , 2015 .

[48]  Nael B. Abu-Ghazaleh,et al.  TARP: Timing Analysis Resilient Protocol for Wireless Sensor Networks , 2009, 2009 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[49]  Jiannong Cao,et al.  Secure localization and location verification in wireless sensor networks: a survey , 2010, The Journal of Supercomputing.

[50]  Dimitrios Makrakis,et al.  Location privacy and anonymity preserving routing for wireless sensor networks , 2008, Comput. Networks.

[51]  Aggelos Kiayias,et al.  Secure and efficient in-network processing of exact SUM queries , 2011, 2011 IEEE 27th International Conference on Data Engineering.

[52]  Qiaoyan Wen,et al.  Passive RFID-supported source location privacy preservation against global eavesdroppers in WSN , 2013, 2013 5th IEEE International Conference on Broadband Network & Multimedia Technology.

[53]  Donggang Liu,et al.  Protecting Location Privacy in Sensor Networks against a Global Eavesdropper , 2012, IEEE Transactions on Mobile Computing.

[54]  Xiaohui Liang,et al.  STAP: A social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs , 2011, 2011 Proceedings IEEE INFOCOM.

[55]  Heejo Lee,et al.  Achieving Network Level Privacy in Wireless Sensor Networks† , 2010, Sensors.

[56]  Fan Yong Verifiable Privacy-Preserving Top-k Query Protocol in Two-tiered Sensor Networks , 2012 .

[57]  Edith C. H. Ngai,et al.  On providing location privacy for mobile sinks in wireless sensor networks , 2009, MSWiM '09.

[58]  Jun Luo,et al.  An Attack Tree Based Risk Assessment for Location Privacy in Wireless Sensor Networks , 2012, 2012 8th International Conference on Wireless Communications, Networking and Mobile Computing.

[59]  Jie Wu,et al.  Quantitative Measurement and Design of Source-Location Privacy Schemes for Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.

[60]  Xuemin Shen,et al.  A Physical-Layer Location Privacy-Preserving Scheme for Mobile Public Hotspots in NEMO-Based VANETs , 2013, IEEE Transactions on Intelligent Transportation Systems.

[61]  Xuemin Shen,et al.  Secure and efficient source location privacy-preserving scheme for wireless sensor networks , 2012, 2012 IEEE International Conference on Communications (ICC).

[62]  Rui Zhang,et al.  Secure Range Queries in Tiered Sensor Networks , 2009, IEEE INFOCOM 2009.

[63]  Qiaoyan Wen,et al.  Energy Efficient Source Location Privacy Protecting Scheme in Wireless Sensor Networks Using Ant Colony Optimization , 2014, Int. J. Distributed Sens. Networks.

[64]  Wade Trappe,et al.  Enhancing Source-Location Privacy in Sensor Network Routing , 2005, ICDCS.

[65]  Bo Sheng,et al.  Privacy-aware routing in sensor networks , 2009, Comput. Networks.

[66]  Sriram Chellappan,et al.  Defending Wireless Sensor Networks against Adversarial Localization , 2010, 2010 Eleventh International Conference on Mobile Data Management.

[67]  Rui Zhang,et al.  Secure multidimensional range queries in sensor networks , 2009, MobiHoc '09.

[68]  Jian Ren,et al.  Mixing Ring-Based Source-Location Privacy in Wireless Sensor Networks , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.

[69]  Javier López,et al.  Exploiting Context-Awareness to Enhance Source-Location Privacy in Wireless Sensor Networks , 2011, Comput. J..