Skip to main content

Location Privacy in Wireless Sensor Networks

  • Chapter
  • First Online:
Mission-Oriented Sensor Networks and Systems: Art and Science

Part of the book series: Studies in Systems, Decision and Control ((SSDC,volume 163))

Abstract

In recent years, wireless sensor networks (WSNs) have been attracting increased attention from the research and engineering communities, motivated by applications like security surveillance, border protection, combat field reconnaissance, environment and habitat monitoring, and target tracking. In these applications, a WSN typically consists of a large population of spatially distributed sensor nodes that cooperatively monitor conditions in their surroundings and report their findings to an in situ base station (BS). The BS not only collects and analyzes the incoming data, but also interfaces WSN to a higher authority. Hence, the unique role of the BS attracts adversary’s attention since it can be a single point of failure for WSN. In addition, in some applications such as target tracking, the node that detects and reports on an event could be of utmost importance for an intruder. An adversary that seeks to diminish the network utility can apply traffic analysis techniques to locate the sink of all packets (i.e., the BS) and/or the data sources in order to apply a denial of service attack, e.g., radio jamming. Countering such a threat necessitates enhanced BS and data source anonymity to conceal their identity, role, and location from external observers. This chapter analyzes the threat, highlights anonymity metrics, categorizes contemporary traffic analysis countermeasures, and discusses some of the emerging techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. 21 ideas for the 21st century. Business Week, pp. 78–167 (1999)

    Google Scholar 

  2. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Comput. Netw. 38(4), 393–422 (2002)

    Article  Google Scholar 

  3. Chong, C.Y., Kumar, S.P.: Sensor networks: evolution, opportunities, and challenges. Proc. IEEE 91(8), 1247–1256 (2003)

    Article  Google Scholar 

  4. Deng, J., Han, R., Mishra, S.: Countermeasures against traffic analysis attacks in wireless sensor networks. In: First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM’05), pp. 113–126, Sept 2005. IEEE

    Google Scholar 

  5. Kong, J., Xiaoyan, H., Gerla, M.: An identity-free and on-demand routing scheme against anonymity threats in mobile ad hoc networks. IEEE Trans. Mob. Comput. 6(8), 888–902 (2007)

    Article  Google Scholar 

  6. Venkitasubramaniam, P., He, T., Tong, L., Wicker, S.B.: Toward an analytical approach to anonymous wireless networking. IEEE Commun. Mag. 46(2), 140–146 (2008)

    Article  Google Scholar 

  7. Qin, Y., Huang, D., Li, B.: STARS: a statistical traffic pattern discovery system for MANETs. IEEE Trans. Dependable Secure Comput. 11(2), 181–192 (2014)

    Article  Google Scholar 

  8. Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: security protocols for sensor networks. Wirel. Netw. 8(5), 521–534 (2002)

    Article  Google Scholar 

  9. Conner, W., Abdelzaher, T., Nahrstedt, K.: Using data aggregation to prevent traffic analysis in wireless sensor networks. In: International Conference on Distributed Computing in Sensor Systems, pp. 202–217, June 2006. Springer Berlin Heidelberg

    Chapter  Google Scholar 

  10. Ebrahimi, Y., Younis, M.: Averting in-situ adversaries in wireless sensor network using deceptive traffic. In: Global Telecommunications Conference (GLOBECOM 2011), pp. 1–5, Dec 2011. IEEE

    Google Scholar 

  11. Li, X., Wang, X., Zheng, N., Wan, Z., Gu, M.: Enhanced location privacy protection of base station in wireless sensor networks. In: 5th International Conference on Mobile Ad-hoc and Sensor Networks (MSN’09), pp. 457–464, Dec 2009. IEEE

    Google Scholar 

  12. Li, N., Zhang, N., Das, S.K., Thuraisingham, B.: Privacy preservation in wireless sensor networks: a state-of-the-art survey. Ad Hoc Netw. 7(8), 1501–1514 (2009)

    Article  Google Scholar 

  13. Acharya, U., Younis, M.: Increasing base-station anonymity in wireless sensor networks. Ad Hoc Netw. 8(8), 791–809 (2010)

    Article  Google Scholar 

  14. Bicakci, K., Bagci, I.E., Tavli, B.: Lifetime bounds of wireless sensor networks preserving perfect sink unobservability. IEEE Commun. Lett. 15(2), 205–207 (2011)

    Article  Google Scholar 

  15. Ebrahimi, Y., Younis, M.: Increasing transmission power for higher base-station anonymity in wireless sensor network. In: 2011 IEEE International Conference on Communications (ICC), pp. 1–5, June 2011. IEEE

    Google Scholar 

  16. Ebrahimi, Y., Younis, M.: Using deceptive packets to increase base-station anonymity in wireless sensor network. In: 2011 7th International Wireless Communications and Mobile Computing Conference, pp. 842–847, July 2011. IEEE

    Google Scholar 

  17. Ying, B., Gallardo, J.R., Makrakis, D., Mouftah, H.T.: Concealing of the sink location in WSNs by artificially homogenizing traffic intensity. In: 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 988–993, Apr 2011. IEEE

    Google Scholar 

  18. Mehta, K., Liu, D., Wright, M.: Location privacy in sensor networks against a global eavesdropper. In: 2007 IEEE International Conference on Network Protocols, pp. 314–323, Oct 2007. IEEE

    Google Scholar 

  19. El-Badry, R., Younis, M.: Providing location anonymity in a multi-base station wireless sensor network. In: ICC, pp. 157–161, June 2012

    Google Scholar 

  20. Ward, J.R., Younis, M.: On the use of distributed relays to increase base station anonymity in wireless sensor networks. In: MILCOM 2012-2012 IEEE Military Communications Conference, pp. 1–6. IEEE

    Google Scholar 

  21. Ward, J.R., Younis, M.: On the use of distributed beamforming to increase base station anonymity in wireless sensor networks. In: 2013 22nd International Conference on Computer Communication and Networks (ICCCN), pp. 1–7, July 2013. IEEE

    Google Scholar 

  22. Di Ying, B., Makrakis, D., Mouftah, H.T.: Anti-traffic analysis attack for location privacy in WSNs. EURASIP J. Wirel. Commun. Netw. 2014(1), 1 (2014)

    Article  Google Scholar 

  23. Baroutis, N., Younis, M.: Using fake sinks and deceptive relays to boost base-station anonymity in wireless sensor network. In: 2015 IEEE 40th Conference on Local Computer Networks (LCN), pp. 109–116, Oct 2015. IEEE

    Google Scholar 

  24. Baroutis, N., Younis, M.: Boosting base-station anonymity in wireless sensor networks through illusive multiple-sink traffic. In: 2016 IEEE Global Communications Conference (GLOBECOM 2016), Dec 2016. IEEE

    Google Scholar 

  25. Baroutis, N., Younis, M.: A Novel Traffic Analysis Attack Model and Base-station Anonymity Metrics for Wireless Sensor Networks. Security and Communication Networks (to appear)

    Google Scholar 

  26. Alsemairi, S., Younis, M.: Forming a cluster-mesh topology to boost base-station anonymity in wireless sensor networks. In: Wireless Communications and Networking Conference (WCNC), pp. 1–6, Apr 2016. IEEE

    Google Scholar 

  27. Alsemairi, S., Younis, M.: Clustering-based mitigation of anonymity attacks in wireless sensor networks. In: 2015 IEEE Global Communications Conference (GLOBECOM), pp. 1–7, Dec 2015. IEEE

    Google Scholar 

  28. Alsemairi, S., Younis, M.: Adaptive packet-combining to counter traffic analysis in wireless sensor networks. In: 2015 International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 337–342, Aug 2015. IEEE

    Google Scholar 

  29. Gottumukkala, V.P.V., Pandit, V., Li, H., Agrawal, D.P.: Base-station location anonymity and security technique (BLAST) for wireless sensor networks. In: 2012 IEEE International Conference on Communications (ICC), pp. 6705–6709, June 2012. IEEE

    Google Scholar 

  30. Bangash, Y., Zeng, L., Feng, D.: MimiBS: mimicking base-station to provide location privacy protection in wireless sensor networks. In: 2015 IEEE International Conference on Networking, Architecture and Storage (NAS), pp. 158–166, Aug 2015. IEEE

    Google Scholar 

  31. Ozturk, C., Zhang, Y., Trappe, W.: Source-location privacy in energy-constrained sensor network routing. In: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 88–93, Oct 2004. ACM

    Google Scholar 

  32. Kamat, P., Zhang, Y., Trappe, W., Ozturk, C.: Enhancing source-location privacy in sensor network routing. In: 25th IEEE International Conference on Distributed Computing Systems (ICDCS’05), pp. 599–608, June 2005. IEEE

    Google Scholar 

  33. Xi, Y., Schwiebert, L., Shi, W.: Preserving source location privacy in monitoring-based wireless sensor networks. In: Proceedings 20th IEEE International Parallel & Distributed Processing Symposium, pp. 8, Apr 2006. IEEE

    Google Scholar 

  34. Mehta, K., Liu, D., Wright, M.: Protecting location privacy in sensor networks against a global eavesdropper. IEEE Trans. Mob. Comput. 11(2), 320–336 (2012)

    Article  Google Scholar 

  35. Li, Y., Ren, J.: Preserving source-location privacy in wireless sensor networks. In: 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp. 1–9, June 2009. IEEE

    Google Scholar 

  36. Chen, H., Lou, W.: From nowhere to somewhere: protecting end-to-end location privacy in wireless sensor networks. In: International Performance Computing and Communications Conference, pp. 1–8, Dec 2010. IEEE

    Google Scholar 

  37. Spachos, P., Song, L., Bui, F.M., Hatzinakos, D.: Improving source-location privacy through opportunistic routing in wireless sensor networks. In: 2011 IEEE Symposium on Computers and Communications (ISCC), pp. 815–820, June 2011. IEEE

    Google Scholar 

  38. Lightfoot, L., Li, Y., Ren, J.: Preserving source-location privacy in wireless sensor network using STaR routing. In: Global Telecommunications Conference (GLOBECOM 2010), pp. 1–5, Dec 2010. IEEE

    Google Scholar 

  39. Gurjar, A., Patil, A.B.: Cluster based anonymization for source location privacy in wireless sensor network. In: 2013 International Conference on Communication Systems and Network Technologies (CSNT), pp. 248–251, Apr 2013. IEEE

    Google Scholar 

  40. Li, Y., Lightfoot, L., Ren, J.: Routing-based source-location privacy protection in wireless sensor networks. In: 2009 IEEE International Conference on Electro/Information Technology, pp. 29–34, June 2009. IEEE

    Google Scholar 

  41. Wang, H., Sheng, B., Li, Q.: Privacy-aware routing in sensor networks. Comput. Netw. 53(9), 1512–1529 (2009)

    Article  Google Scholar 

  42. Ouyang, Y., Le, Z., Chen, G., Ford, J., Makedon, F.: Entrapping adversaries for source protection in sensor networks. In: Proceedings of the 2006 International Symposium on World of Wireless, Mobile and Multimedia Networks, pp. 23–34, June 2006. IEEE Computer Society

    Google Scholar 

  43. Kazatzopoulos, L., Delakouridis, C., Marias, G.F., Georgiadis, P.: ihide: Hiding sources of information in wsns. In: Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU’06), pp. 8, June 2006. IEEE

    Google Scholar 

  44. Yang, Y., Shao, M., Zhu, S., Urgaonkar, B., Cao, G.: Towards event source unobservability with minimum network traffic in sensor networks. In: Proceedings of the First ACM Conference on Wireless Network Security, pp. 77–88, Mar 2008. ACM

    Google Scholar 

  45. Alomair, B., Clark, A., Cuellar, J., Poovendran, R.: Toward a statistical framework for source anonymity in sensor networks. IEEE Trans. Mob. Comput. 12(2), 248–260 (2013)

    Article  Google Scholar 

  46. Mahmoud, M.M., Shen, X.: A cloud-based scheme for protecting source-location privacy against hotspot-locating attack in wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 23(10), 1805–1818 (2012)

    Article  Google Scholar 

  47. Bicakci, K., Gultekin, H., Tavli, B., Bagci, I.E.: Maximizing lifetime of event-unobservable wireless sensor networks. Comput. Stand. Interfaces 33(4), 401–410 (2011)

    Article  Google Scholar 

  48. Yang, W., Zhu, W.T.: Protecting source location privacy in wireless sensor networks with data aggregation. In: International Conference on Ubiquitous Intelligence and Computing, pp. 252–266, Oct 2010. Springer Berlin Heidelberg

    Chapter  Google Scholar 

  49. Misra, S., Xue, G.: Efficient anonymity schemes for clustered wireless sensor networks. Int. J. Sensor Netw. 1(1–2), 50–63 (2006)

    Article  Google Scholar 

  50. Zhang, L., Zhang, H., Conti, M., Di Pietro, R., Jajodia, S., Mancini, L.V.: Preserving privacy against external and internal threats in WSN data aggregation. Telecommun. Syst. 52(4), 2163–2176 (2013)

    Article  Google Scholar 

  51. Rahman, F., Hoque, E., Ahamed, S.I.: Preserving privacy in wireless sensor networks using reliable data aggregation. ACM SIGAPP Appl. Comput. Rev. 11(3), 52–62 (2011)

    Article  Google Scholar 

  52. Ngai, E.C.H., Rodhe, I.: On providing location privacy for mobile sinks in wireless sensor networks. Wirel. Netw. 19(1), 115–130 (2013)

    Article  Google Scholar 

  53. Oh, S., Gruteser, M.: Multi-node coordinated jamming for location privacy protection. In: 2011-MILCOM 2011 Military Communications Conference, pp. 1243–1249, Nov 2011. IEEE

    Google Scholar 

  54. Tavli, B., Ozciloglu, M.M., Bicakci, K.: Mitigation of compromising privacy by transmission range control in wireless sensor networks. IEEE Commun. Lett. 14(12), 1104–1106 (2010)

    Article  Google Scholar 

  55. Shao, M., Hu, W., Zhu, S., Cao, G., Krishnamurth, S., La Porta, T.: Cross-layer enhanced source location privacy in sensor networks. In: 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp. 1–9, June 2009. IEEE

    Google Scholar 

  56. Shao, M., Yang, Y., Zhu, S., Cao, G.: Towards statistically strong source anonymity for sensor networks. In: INFOCOM 2008. The 27th Conference on Computer Communications. IEEE

    Google Scholar 

  57. Pfitzmann, A., Hansen, M.: Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management-A Consolidated Proposal for Terminology (2005)

    Google Scholar 

  58. Seys, S., Preneel, B.: ARM: anonymous routing protocol for mobile ad hoc networks. Int. J. Wirel. Mob. Comput. 3(3), 145–155 (2009)

    Article  Google Scholar 

  59. Zhang, Y., Liu, W., Lou, W.: Anonymous communications in mobile ad hoc networks. In: Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 3, pp. 1940–1951, Mar 2005. IEEE

    Google Scholar 

  60. Boukerche, A., El-Khatib, K., Xu, L., Korba, L.: A novel solution for achieving anonymity in wireless ad hoc networks. In: Proceedings of the 1st ACM International Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks, pp. 30–38, Oct 2004. ACM

    Google Scholar 

  61. Conti, M., Willemsen, J., Crispo, B.: Providing source location privacy in wireless sensor networks: a survey. IEEE Commun. Surv. Tutor. 15(3), 1238–1280 (2013)

    Article  Google Scholar 

  62. Park, H., Song, S., Choi, B.Y., Huang, C.T.: Passages: preserving anonymity of sources and sinks against global eavesdroppers. In: INFOCOM, 2013 Proceedings IEEE, pp. 210–214, Apr 2013. IEEE

    Google Scholar 

  63. Li, X., Shi, H., Shang, Y.: A sorted RSSI quantization based algorithm for sensor network localization. In: 11th International Conference on Parallel and Distributed Systems (ICPADS’05), vol. 1, pp. 557–563, July 2005. IEEE

    Google Scholar 

  64. Yang, Y., Lee, J., Jung, J., Song, S., Yoon, H., Yoon, Y.: Target source detection using an improved sensing model in wireless sensor networks (ISMWSNs). In: 2007 29th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, pp. 5899–5902, Aug 2007. IEEE

    Google Scholar 

  65. Savvides, A., Han, C.C., Strivastava, M.B.: Dynamic fine-grained localization in ad-hoc networks of sensors. In: Proceedings of the 7th Annual International Conference on Mobile Computing and Networking, pp. 166–179, July 2001. ACM

    Google Scholar 

  66. Elnahrawy, E., Li, X., Martin, R.P.: The limits of localization using signal strength: a comparative study. In: 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, IEEE SECON 2004, pp. 406–414. IEEE

    Google Scholar 

  67. Bensky, A.: Wireless Positioning Technologies and Applications. Artech House (2016)

    Google Scholar 

  68. Chandrasekaran, G., Ergin, M.A., Yang, J., Liu, S., Chen, Y., Gruteser, M., Martin, R.P.: Empirical evaluation of the limits on localization using signal strength. In: 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp. 1–9, June 2009. IEEE

    Google Scholar 

  69. Selman, B., Levesque, H.J., Mitchell, D.G.: A new method for solving hard satisfiability problems. In: AAAI, vol. 92, pp. 440–446, July 1992

    Google Scholar 

  70. Shannon, C.E.: A mathematical theory of communication. Bell Syst. Tech. J. 27, 379–423, 623–656 (1948)

    Article  MathSciNet  Google Scholar 

  71. Diaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: International Workshop on Privacy Enhancing Technologies, pp. 54–68, Apr 2002. Springer Berlin Heidelberg

    Chapter  Google Scholar 

  72. Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: International Workshop on Privacy Enhancing Technologies, pp. 41–53, Apr 2002. Springer Berlin Heidelberg

    Chapter  Google Scholar 

  73. Huang, D.: On measuring anonymity for wireless mobile ad-hoc networks. In: Proceedings 2006 31st IEEE Conference on Local Computer Networks, pp. 779–786, Nov 2006. IEEE

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohamed Younis .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Baroutis, N., Younis, M. (2019). Location Privacy in Wireless Sensor Networks. In: Ammari, H. (eds) Mission-Oriented Sensor Networks and Systems: Art and Science. Studies in Systems, Decision and Control, vol 163. Springer, Cham. https://doi.org/10.1007/978-3-319-91146-5_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-91146-5_18

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-91145-8

  • Online ISBN: 978-3-319-91146-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics