REAL: A Reciprocal Protocol for Location Privacy in Wireless Sensor Networks

K-anonymity has been used to protect location privacy for location monitoring services in wireless sensor networks (WSNs), where sensor nodes work together to report k-anonymized aggregate locations to a server. Each k-anonymized aggregate location is a cloaked area that contains at least k persons. However, we identify an attack model to show that overlapping aggregate locations still pose privacy risks because an adversary can infer some overlapping areas with less than k persons that violates the k-anonymity privacy requirement. In this paper, we propose a reciprocal protocol for location privacy (REAL) in WSNs. In REAL, sensor nodes are required to autonomously organize their sensing areas into a set of non-overlapping and highly accurate k-anonymized aggregate locations. To confront the three key challenges in REAL, namely, self-organization, reciprocity property and high accuracy, we design a state transition process, a locking mechanism and a time delay mechanism, respectively. We compare the performance of REAL with current protocols through simulated experiments. The results show that REAL protects location privacy, provides more accurate query answers, and reduces communication and computational costs.

[1]  Chi-Yin Chow,et al.  A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks , 2011, IEEE Transactions on Mobile Computing.

[2]  Ling Liu,et al.  Privacy-Aware Mobile Services over Road Networks , 2009, Proc. VLDB Endow..

[3]  B. N. Jagdale,et al.  Hybrid Model for Location Privacy in Wireless Ad-Hoc Networks , 2012 .

[4]  Andy Hopper,et al.  The Anatomy of a Context-Aware Application , 1999, Wirel. Networks.

[5]  Murat Demirbas,et al.  FLOC : A Fast Local Clustering Service for Wireless Sensor Networks , 2004 .

[6]  Makoto Takizawa,et al.  A Survey on Clustering Algorithms for Wireless Sensor Networks , 2010, 2010 13th International Conference on Network-Based Information Systems.

[7]  Anthony Ephremides,et al.  The Architectural Organization of a Mobile Radio Network via a Distributed Algorithm , 1981, IEEE Trans. Commun..

[8]  Chi-Yin Chow,et al.  Differentially Private Location Recommendations in Geosocial Networks , 2014, 2014 IEEE 15th International Conference on Mobile Data Management.

[9]  Adrian Perrig,et al.  ACE: An Emergent Algorithm for Highly Uniform Cluster Formation , 2004, EWSN.

[10]  Einar Snekkenes,et al.  Concepts for personal location privacy policies , 2001, EC '01.

[11]  Mrs. K. Valarmathi,et al.  A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks , 2016 .

[12]  Rajeev Motwani,et al.  Anonymizing Tables , 2005, ICDT.

[13]  Panos Kalnis,et al.  PRIVE: anonymous location-based queries in distributed mobile systems , 2007, WWW '07.

[14]  Hari Balakrishnan,et al.  6th ACM/IEEE International Conference on on Mobile Computing and Networking (ACM MOBICOM ’00) The Cricket Location-Support System , 2022 .

[15]  Robert P. Minch,et al.  Legal and Ethical Implications of Employee Location Monitoring , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.

[16]  Chi-Yin Chow,et al.  Tinycasper: a privacy-preserving aggregate location monitoring system in wireless sensor networks , 2008, SIGMOD Conference.

[17]  Ling Liu,et al.  Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.

[18]  Panos Kalnis,et al.  MobiHide: A Mobilea Peer-to-Peer System for Anonymous Location-Based Queries , 2007, SSTD.

[19]  Panos Kalnis,et al.  Private queries in location based services: anonymizers are not necessary , 2008, SIGMOD Conference.

[20]  Bhiksha Raj,et al.  Large Margin Gaussian Mixture Models with Differential Privacy , 2012, IEEE Transactions on Dependable and Secure Computing.

[21]  Wei-Shinn Ku,et al.  PROS: a peer-to-peer system for location privacy protection on road networks , 2009, GIS.

[22]  Kyriakos Mouratidis,et al.  Preventing Location-Based Identity Inference in Anonymous Spatial Queries , 2007, IEEE Transactions on Knowledge and Data Engineering.

[23]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[24]  JoAnne Holliday,et al.  Distributed Energy-Efficient Hierarchical Clustering for Wireless Sensor Networks , 2005, DCOSS.

[25]  Lin Yao,et al.  Protecting the sink location privacy in wireless sensor networks , 2012, Personal and Ubiquitous Computing.

[26]  David Poole,et al.  Linear Algebra: A Modern Introduction , 2002 .

[27]  Grammati E. Pantziou,et al.  A k-anonymity privacy-preserving approach in wireless medical monitoring environments , 2012, Personal and Ubiquitous Computing.

[28]  Ossama Younis,et al.  HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks , 2004, IEEE Transactions on Mobile Computing.

[29]  Seung-chan Shin,et al.  Implementation of the Real-Time People Counting System using Wireless Sensor Networks , 2007 .

[30]  Radhika Nagpal,et al.  An Algorithm For Group Formation In An Amorphous Computer , 1998 .

[31]  Josep Domingo-Ferrer,et al.  Query Profile Obfuscation by Means of Optimal Query Exchange between Users , 2012, IEEE Transactions on Dependable and Secure Computing.

[32]  Liang Zhang,et al.  Organizational memory: reducing source-sink distance , 1997, Proceedings of the Thirtieth Hawaii International Conference on System Sciences.

[33]  Adam Meyerson,et al.  On the complexity of optimal K-anonymity , 2004, PODS.

[34]  David C. Parkes,et al.  Non-Cooperative Location Privacy , 2013, IEEE Transactions on Dependable and Secure Computing.

[35]  Pan Li,et al.  n-CD: A geometric approach to preserving location privacy in location-based services , 2013, 2013 Proceedings IEEE INFOCOM.

[36]  Tanzima Hashem,et al.  Safeguarding Location Privacy in Wireless Ad-Hoc Networks , 2007, UbiComp.

[37]  Ling Liu,et al.  Supporting anonymous location queries in mobile environments with privacygrid , 2008, WWW.

[38]  Jianliang Xu,et al.  Protecting Location Privacy against Location-Dependent Attacks in Mobile Services , 2012, IEEE Transactions on Knowledge and Data Engineering.

[39]  Anantha P. Chandrakasan,et al.  An application-specific protocol architecture for wireless microsensor networks , 2002, IEEE Trans. Wirel. Commun..

[40]  S. Sophia,et al.  A Survey of Adaptive Distributed Clustering Algorithms for Wireless Sensor Networks , 2011 .

[41]  Panos Kalnis,et al.  A reciprocal framework for spatial K-anonymity , 2010, Inf. Syst..

[42]  Elisa Bertino,et al.  A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks , 2015, IEEE Transactions on Dependable and Secure Computing.

[43]  Alexandre M. Bayen,et al.  Enhancing Privacy and Accuracy in Probe Vehicle-Based Traffic Monitoring via Virtual Trip Lines , 2012, IEEE Transactions on Mobile Computing.

[44]  Urs Hengartner,et al.  A distributed k-anonymity protocol for location privacy , 2009, 2009 IEEE International Conference on Pervasive Computing and Communications.

[45]  Jiahui Chen,et al.  Query-Aware Location Privacy Model Based on p-Sensitive and k-Anonymity for Road Networks , 2012 .

[46]  JAMAL N. AL-KARAKI,et al.  Routing techniques in wireless sensor networks: a survey , 2004, IEEE Wireless Communications.

[47]  Marco Gruteser,et al.  Privacy-Aware Location Sensor Networks , 2003, HotOS.

[48]  Edward J. Coyle,et al.  An energy efficient hierarchical clustering algorithm for wireless sensor networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).