Abstract
Privacy preservation is gaining popularity in Wireless Sensor Network (WSNs) due to its adoption in everyday scenarios. There are a number of research papers in this area many of which concentrate on the location privacy problem. In this paper we review and categorise these solutions based on the information available to the adversary and his capabilities. But first we analyse whether traditional anonymous communication systems conform to the original requirements of location privacy in sensor networks. Finally, we present and discuss a number of challenges and future trends that demand further attention from the research community.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Acharya, U., Younis, M.: Increasing base-station anonymity in wireless sensor networks. Ad Hoc Networks 8(8), 791–809 (2010)
Alomair, B., Clark, A., Cuellar, J., Poovendran, R.: Towards a Statistical Framework for Source Anonymity in Sensor Networks. IEEE Transactions on Mobile Computing 12(2), 248–260 (2012)
Biswas, S., Mukherjee, S., Mukhopadhyaya, K.: A Countermeasure against Traffic-Analysis based Base Station Detection in WSN (2008), http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.98.948
Chai, G., Xu, M., Xu, W., Lin, Z.: Enhancing sink-location privacy in wireless sensor networks through k-anonymity. International Journal of Distributed Sensor Networks 2012, 16 (2012)
Chang, S., Qi, Y., Zhu, H., Dong, M., Ota, K.: Maelstrom: Receiver-Location Preserving in Wireless Sensor Networks. In: Cheng, Y., Eun, D.Y., Qin, Z., Song, M., Xing, K. (eds.) WASA 2011. LNCS, vol. 6843, pp. 190–201. Springer, Heidelberg (2011)
Chaum, D.: Untraceable Electronic Mail, Return addresses, and Digital Pseudonyms. Commun. ACM 24(2), 84–88 (1981)
Chaum, D.: The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability. Journal of Cryptology 1, 65–75 (1988)
Chen, H., Lou, W.: From Nowhere to Somewhere: Protecting End-to-End Location Privacy in Wireless Sensor Networks. In: 29th International Performance Computing and Communications Conference, IPCCC 2010, pp. 1–8. IEEE (2010)
Chen, J., Du, X., Fang, B.: An Efficient Anonymous Communication Protocol for Wireless Sensor Networks. Wireless Communications and Mobile Computing 12(14), 1302–1312 (2012)
Conner, W., Abdelzaher, T., Nahrstedt, K.: Using Data Aggregation to Prevent Traffic Analysis in Wireless Sensor Networks. In: Gibbons, P.B., Abdelzaher, T., Aspnes, J., Rao, R. (eds.) DCOSS 2006. LNCS, vol. 4026, pp. 202–217. Springer, Heidelberg (2006)
Deng, J., Han, R., Mishra, S.: Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks. Pervasive and Mobile Computing 2(2), 159–186 (2006)
Deng, J., Han, R., Mishra, S.: Enhancing Base Station Security in Wireless Sensor Networks. Tech. Rep. CU-CS-951-03, University of Colorado (2003), http://www.cs.colorado.edu/~mishras/research/papers/tech03-1.pdf
Gómez, C., Paradells, J., Caballero, J.E.: Sensors Everywhere: Wireless Network Technologies and Solutions. Fundación Vodafone España (2010), http://fundacion.vodafone.es/static/fichero/pre_ucm_mgmt_002618.pdf , ISBN 978-84-934740-5-8
Jhumka, A., Leeke, M., Shrestha, S.: On the Use of Fake Sources for Source Location Privacy: Trade-Offs Between Energy and Privacy. The Computer Journal 54(6), 860–874 (2011)
Jian, Y., Chen, S., Zhang, Z., Zhang, L.: A novel scheme for protecting receiver’s location privacy in wireless sensor networks. IEEE Transactions on Wireless Communications 7(10), 3769–3779 (2008)
Jiang, J.R., Sheu, J.P., Tu, C., Wu, J.W.: An Anonymous Path Routing (APR) Protocol for Wireless Sensor Networks. Journal of Information Science and Engineering 27(2), 657–680 (2011)
Kamat, P., Zhang, Y., Trappe, W., Ozturk, C.: Enhancing Source-Location Privacy in Sensor Network Routing. In: 25th IEEE International Conference on Distributed Computing Systems, ICDCS 2005, pp. 599–608 (June 2005)
Kazatzopoulos, L., Delakouridis, K., Marias, G.F.: A privacy-aware overlay routing scheme in wsns. Security and Communication Networks 4(7), 729–743 (2011)
Li, Y., Lightfoot, L., Ren, J.: Routing-Based Source-Location Privacy Protection in Wireless Sensor Networks. In: IEEE International Conference on Electro/Information Technology, EIT 2009, pp. 29–34 (2009)
Li, Y., Ren, J.: Providing Source-Location Privacy in Wireless Sensor Networks. In: Liu, B., Bestavros, A., Du, D.-Z., Wang, J. (eds.) WASA 2009. LNCS, vol. 5682, pp. 338–347. Springer, Heidelberg (2009)
Li, Y., Ren, J., Wu, J.: Quantitative measurement and design of source-location privacy schemes for wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems 23, 1302–1311 (2012)
Lightfoot, L., Li, Y., Ren, J.: STaR: design and quantitative measurement of source-location privacy for wireless sensor networks. Security and Communication Networks (Online March 2012)
Mahmoud, M., Shen, X.: A Cloud-Based Scheme for Protecting Source-Location Privacy against Hotspot-Locating Attack in Wireless Sensor Networks. IEEE Transactions on Parallel and Distributed Systems 23(10), 1805–1818 (2012)
Mehta, K., Liu, D., Wright, M.: Location Privacy in Sensor Networks Against a Global Eavesdropper. In: IEEE International Conference on Network Protocols, ICNP 2007, October 16-19, pp. 314–323. IEEE, Beijing (2007)
Mehta, K., Liu, D., Wright, M.: Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper. IEEE Transactions on Mobile Computing 11(2), 320–336 (2012)
Misra, S., Xue, G.: Efficient anonymity schemes for clustered wireless sensor networks. International Journal of Sensor Networks 1(1), 50–63 (2006)
Nezhad, A.A., Makrakis, D., Miri, A.: Anonymous Topology Discovery for Multihop Wireless Sensor Networks. In: 3rd ACM Workshop on QoS and Security for Wireless and Mobile Networks, Q2SWinet 2007, pp. 78–85. ACM, New York (2007)
Nezhad, A.A., Miri, A., Makrakis, D.: Location privacy and anonymity preserving routing for wireless sensor networks. Computer Networks 52(18), 3433–3452 (2008)
Ortolani, S., Conti, M., Crispo, B., Di Pietro, R.: Events privacy in WSNs: A new model and its applications. In: IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1–9 (June 2011)
Ouyang, Y., Le, Z., Chen, G., Ford, J., Makedon, F.: Entrapping Adversaries for Source Protection in Sensor Networks. In: 2006 International Symposium on World of Wireless, Mobile and Multimedia Networks, WOWMOM 2006, pp. 23–34. IEEE Computer Society, Washington, DC (2006)
Ouyang, Y., Le, Z., Xu, Y., Triandopoulos, N., Zhang, S., Ford, J., Makedon, F.: Providing Anonymity in Wireless Sensor Networks. In: IEEE International Conference on Pervasive Services, pp. 145–148 (July 2007)
Ozturk, C., Zhang, Y., Trappe, W.: Source-Location Privacy in Energy-Constrained Sensor Network Routing. In: 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN, pp. 88–93. ACM, New York (2004)
Pai, S., Bermudez, S., Wicker, S., Meingast, M., Roosta, T., Sastry, S., Mulligan, D.: Transactional Confidentiality in Sensor Networks. IEEE Security & Privacy 6(4), 28–35 (2008)
Pfitzmann, A., Hansen, M.: A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management, v0.34 (August 2010), http://dud.inf.tu-dresden.de/literatur/Anon_Terminology_v0.34.pdf
Pongaliur, K., Xiao, L.: Sensor Node Source Privacy and Packet Recovery Under Eavesdropping and Node Compromise Attacks. ACM Transactions on Sensor Networks 9(4), 50:1–50:26 (2013)
Proano, A., Lazos, L.: Hiding contextual information in wsns. In: IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM, pp. 1–6 (June 2012)
Proano, A., Lazos, L.: Perfect Contextual Information Privacy in WSNs under Colluding Eavesdroppers. In: 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec, April 17-19. ACM, Budapest (2013)
Reiter, M., Rubin, A.: Crowds: Anonymity for Web Transactions. ACM Transactions on Information and System Security 1(1), 66–92 (1998)
Rios, R., Cuellar, J., Lopez, J.: Robust Probabilistic Fake Packet Injection for Receiver-Location Privacy in WSN. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 163–180. Springer, Heidelberg (2012)
Rios, R., Lopez, J.: Exploiting context-awareness to enhance source-location privacy in wireless sensor networks. The Computer Journal 54(10), 1603–1615 (2011), impact Factor: 0.79
Shaikh, R., Jameel, H., d’Auriol, B., Lee, S., Song, Y.J., Lee, H.: Network Level Privacy for Wireless Sensor Networks. In: 4th International Conference on Information Assurance and Security, ISIAS 2008, pp. 261–266 (September 2008)
Shao, M., Hu, W., Zhu, S., Cao, G., Krishnamurthy, S., La Porta, T.: Cross-layer Enhanced Source Location Privacy in Sensor Networks. In: IEEE Conference on Sensor, Mesh, and Ad Hoc Communications and Networks, SECON 2009, pp. 1–9. IEEE Communications Society (June 2009)
Shao, M., Yang, Y., Zhu, S., Cao, G.: Towards Statistically Strong Source Anonymity for Sensor Networks. In: 27th IEEE Conference on Computer Communications, INFOCOM 2008, pp. 466–474 (April 2008)
Shao, M., Zhu, S., Zhang, W., Cao, G., Yang, Y.: pdcs: Security and privacy support for data-centric sensor networks. IEEE Transactions on Mobile Computing 8(8), 1023–1038 (2009)
Walters, J., Liang, Z., Shi, W., Chaudhary, V.: Wireless Sensor Network Security: A Survey. In: Security in Distributed, Grid, and Pervasive Computing, pp. 367–409. Auerbach Pub. (2007)
Wang, H., Sheng, B., Li, Q.: Privacy-aware routing in sensor networks. Computer Networks 53(9), 1512–1529 (2009)
Wang, H.J., Hsiang, T.R.: Defending Traffic Analysis with Communication Cycles in Wireless Sensor Networks. In: 10th International Symposium on Pervasive Systems, Algorithms, and Networks, ISPAN, pp. 166–171 (2009)
Wei-Ping, W., Liang, C., Jian-Xin, W.: A source-location privacy protocol in WSN based on locational angle. In: IEEE International Conference on Communications, ICC 2008, May 19-23, pp. 1630–1634. IEEE Communications Society, Beijing (2008)
Xi, Y., Schwiebert, L., Shi, W.: Preserving Source Location Privacy in Monitoring-Based Wireless Sensor Networks. In: 20th International Parallel and Distributed Processing Symposium, IPDPS 2006, p. 8 (April 2006)
Yang, Y., Shao, M., Zhu, S., Urgaonkar, B., Cao, G.: Towards Event Source Unobservability with Minimum Network Traffic in Sensor Networks. In: 1st ACM Conference on Wireless Network Security, WiSec 2008, pp. 77–88. ACM, New York (2008)
Yang, Y., Zhu, S., Cao, G., LaPorta, T.: An Active Global Attack Model for Sensor Source Location Privacy: Analysis and Countermeasures. In: Chen, Y., Dimitriou, T.D., Zhou, J. (eds.) SecureComm 2009. LNICST, vol. 19, pp. 373–393. Springer, Heidelberg (2009)
Yao, J.: Source-location privacy based on directed greedy walk in wireless sensor networks. In: 2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM), pp. 1–4 (September 2010)
Yao, J., Wen, G.: Preserving source-location privacy in energy-constrained wireless sensor networks. In: Proceedings of the 28th International Conference on Distributed Computing Systems Workshops, ICDCSW 2008, pp. 412–416. IEEE Computer Society, Washington, DC (2008)
Yao, L., Kang, L., Deng, F., Deng, J., Wu, G.: Protecting source-location privacy based on multirings in wireless sensor networks. Concurrency and Computation: Practice and Experience (Online June 2013)
Yao, L., Kang, L., Shang, P., Wu, G.: Protecting the sink location privacy in wireless sensor networks. Personal and Ubiquitous Computing, 1–11 (2012), 10.1007/s00779-012-0539-9
Ying, B., Gallardo, J.R., Makrakis, D., Mouftah, H.T.: Concealing of the Sink Location in WSNs by Artificially Homogenizing Traffic Intensity. In: The First International Workshop on Security in Computers, Networking and Communications (INFOCOM Workshops), pp. 988–993 (April 2011)
Ying, B., Makrakis, D., Mouftah, H.T.: A Protocol for Sink Location Privacy Protection in Wireless Sensor Networks. In: IEEE Global Telecommunications Conference (GLOBECOM), December 5-9, pp. 1–5. IEEE Communications Society, Houston (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Rios, R., Lopez, J., Cuellar, J. (2014). Location Privacy in WSNs: Solutions, Challenges, and Future Trends. In: Aldini, A., Lopez, J., Martinelli, F. (eds) Foundations of Security Analysis and Design VII. FOSAD FOSAD 2013 2012. Lecture Notes in Computer Science, vol 8604. Springer, Cham. https://doi.org/10.1007/978-3-319-10082-1_9
Download citation
DOI: https://doi.org/10.1007/978-3-319-10082-1_9
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-10081-4
Online ISBN: 978-3-319-10082-1
eBook Packages: Computer ScienceComputer Science (R0)