Location Privacy and Energy Preservation in Sensor Allocation Systems

We propose sensor-to-task assignments algorithms that take into account location privacy issues. Our solutions enable the network to choose the “best” assignment of the available sensors to the tasks to maximize the utility of the network while preserving sensors’ location privacy. We focus on preserving the sensors’ locations during the assignment process in contrast to previous works, which considered location privacy while sensors are in operation. We also propose an energy-based algorithm that uses the remaining energy of a sensor as a factor to scale the distance between a sensor and a task such that sensors that have more energy appear to be closer than ones with less energy left. This does not only provide location privacy but will also consume the sensing resources more evenly, which leads to extending the lifetime of the network. From our simulations, we found that our algorithms can successfully hide sensors’ locations while providing performance close to the algorithms, which use the exact locations. In addition, our energy-based algorithm, while achieving results close to the exact location algorithm, was found to increase the network lifetime by as much as 40%.

[1]  Brad Karp,et al.  GPSR : Greedy Perimeter Stateless Routing for Wireless , 2000, MobiCom 2000.

[2]  Shivakant Mishra,et al.  Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[3]  Samuel S. Blackman,et al.  Design and Analysis of Modern Tracking Systems , 1999 .

[4]  Weisong Shi,et al.  Preserving source location privacy in monitoring-based wireless sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.

[5]  Thomas F. La Porta,et al.  Sensor relocation in mobile sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[6]  Wendi B. Heinzelman,et al.  Optimal sensor management under energy and reliability constraints , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..

[7]  Ivan Stojmenovic,et al.  Routing with Guaranteed Delivery in Ad Hoc Wireless Networks , 1999, DIALM '99.

[8]  Tatsuya Suda,et al.  Coverage-aware sensor engagement in dense sensor networks , 2009, J. Embed. Comput..

[9]  Alun D. Preece,et al.  Detection and Localization Sensor Assignment with Exact and Fuzzy Locations , 2009, DCOSS.

[10]  Shivakant Mishra,et al.  Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks , 2006, Pervasive Mob. Comput..

[11]  Liang Zhang,et al.  Protecting Receiver-Location Privacy in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[12]  Mario Di Francesco,et al.  Energy conservation in wireless sensor networks: A survey , 2009, Ad Hoc Networks.

[13]  Alun D. Preece,et al.  Sensor-Mission Assignment in Constrained Environments , 2010, IEEE Transactions on Parallel and Distributed Systems.

[14]  Scott Shenker,et al.  Geographic routing without location information , 2003, MobiCom '03.

[15]  Kuei-Ping Shih,et al.  A Distributed Active Sensor Selection Scheme for Wireless Sensor Networks , 2006, 11th IEEE Symposium on Computers and Communications (ISCC'06).

[16]  Thomas F. La Porta,et al.  Sensor-mission assignment in wireless sensor networks , 2010, TOSN.

[17]  Stephanie J. Tutton Optimizing the Allocation of Sensor Assets for the Unit of Action , 2003 .

[18]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[19]  Donggang Liu,et al.  Location Privacy in Sensor Networks Against a Global Eavesdropper , 2007, 2007 IEEE International Conference on Network Protocols.

[20]  Franz Aurenhammer,et al.  Voronoi diagrams—a survey of a fundamental geometric data structure , 1991, CSUR.

[21]  Sencun Zhu,et al.  Towards event source unobservability with minimum network traffic in sensor networks , 2008, WiSec '08.

[22]  Sencun Zhu,et al.  Towards Statistically Strong Source Anonymity for Sensor Networks , 2008, INFOCOM.

[23]  Dinesh Verma,et al.  A survey of sensor selection schemes in wireless sensor networks , 2007, SPIE Defense + Commercial Sensing.