Review
A survey on location privacy protection in Wireless Sensor Networks

https://doi.org/10.1016/j.jnca.2018.10.008Get rights and content

Highlights

  • In this paper, we present a detail survey of existing Location Privacy Protection (LPP) techniques in WSNs.

  • The adversary model, categories of LPP, and methods used in these techniques are carefully presented.

  • Finally, we analyze and compare the performance of each technique.

Abstract

Location of sensor nodes is one of the most important and fundamental information for Wireless Sensor Networks (WSNs), because it provides basic support for many location-based applications (e.g., navigation and object tracking) and location-aware protocols (e.g., geographic location-based routing protocols). However, by extracting and analyzing the location information in packets, attackers can easily obtain the real position of source nodes or base station using hop-by-hop backtracking strategy, which is extremely harmful for the normal operation of sensor networks. So, we need to provide location anonymity for sensor networks. In this paper, we present a detail survey of existing Location Privacy Protection (LPP) techniques in WSNs. First, the network model, the attack model and the performance evaluation model are reviewed. Then, this survey provides a review of the literature about location privacy protection, which is classified into the following three categories: 1) source nodes' location privacy preserving, 2) sink nodes' location privacy preserving, and 3) location privacy preserving for both source and sink nodes. The details of location privacy preserving protocols are carefully analyzed, and the key mechanisms in each protocol are elaborated. In addition, the performance, including the network safety period, the packet transmission latency and the energy consumption, is analyzed and compared. Finally, the exiting problems and the future research issues are presented.

Introduction

Over the past few decades, WSNs have drawn considerable attention for many applications, environmental monitoring, disaster warning, traffic management, health care, emergency rescue, object tracking, etc., (Akyildiz et al., 2002; Qiu et al., 2017, 2018a, 2018b). In the applications, many tiny sensor nodes with small size and limited resources are randomly distributed in the monitoring environment to sense, collect information, then transmit collected data to the destination (a base station or a sink node) via multi-hop communication (Doohan et al., 2012). The sink nodes then aggregate and process the packets, and further transmit them to the users for different requirements (Tunca et al., 2014). However, WSNs are always deployed in unattended harsh environments and the wireless channel is open, thus the kind of multi-hop communication is vulnerable to a variety of malicious attacks, e.g., the location privacy disclosure. During the applications, the location is one of the most important and fundamental information. For example, in the multi-hop communication pattern, the location information is always used to build the optimal or shortest routing path (Cadger et al., 2013; Subramanian et al., 2007). Also, the location information can be used to provide many kinds of Location Based Service (LBS), e.g., navigation and object tracking. It should be noticed that while the LBS brings the users tremendous convenience, it also introduces the disclosure of location privacy, which seriously affects the application development of WSNs. For example, in the field of animal surveillance, by monitoring and backtracking the network traffic flow, or by compromising a common sensor node and analyzing the sensitive information in data packets, an attacker can easily find out the real position of source nodes, thus ultimately detect and catch rare animals, as shown in Fig. 1. Therefore, research on location privacy preserving technology is of great significance for large-scale applications of WSNs.

In the research of location privacy preserving, a network model and an attack model are first designed. Based on the network model and the attack model, different location privacy preserving technologies have been thoroughly studied to effectively avoid the leakage of network sensitive position information, e.g., the position of source nodes or base stations. In addition, the network energy consumption, the communication delay, the data query precision and reliability, are also needed to be considered in the location privacy protection technologies. Thus, an evaluation model is required to evaluate the performances of different privacy preserving technologies.

In Ozturk et al. (2004), the Panda-Hunter Game is first proposed for location privacy preserving, which makes the scenario of location privacy much more clear. As shown in Fig. 1, in the Panda-Hunter Game model, many small sensor nodes are randomly distributed in the habitat to monitor pandas. Once a panda appears, the surrounding sensor nodes (which are named source nodes) will quickly monitor it and send information (e.g., the position of the panda) to the sink via multi-hop communication or routing paths. Also, there is a hunter in the Panda-Hunter Game, which is able to move freely in the network and monitor the local wireless communication. By monitoring the network traffic and tracing back the routing paths, the hunter can find out the exact position of source nodes and finally find the panda. In this research, the position privacy preserving technologies are needed to prevent the hunter to find the position of real sources while ensuring the normal transmission of panda monitoring data.

Privacy is a critical issue in field of WSNs. Many algorithms and techniques have been studied to protect location privacy in WSNs, e.g., encryption algorithm (Agrawal et al., 2003) and anonymous mechanism (Sweeney, 2002), which are efficient for protecting the information security. However, they cannot well protect the location privacy, especially under internal attacks. For example, if an adversary compromises a sensor node and retrieves private keys, it can easily decrypt the information, track back the network traffic and find source nodes' position. Therefore, we need to study new protocols for sensor nodes' location privacy preserving. However, in WSNs, the characteristics of limited resources, self-organization, multi-hop communication and so on, which bring great challenges for the study of location privacy preserving:

  • Sensor nodes are powered by batteries, thus the energy resource is very limited. Excessive energy consumption has a significant impact on the network's performance or even shortens the network lifetime. Therefore, the method of location privacy protection with high throughput or high energy consumption is not suitable for WSNs.

  • Due to the small size and the low cost requirements, the storage space and the computing power of sensor nodes are limited. Thus, they are unable to carry out a large amount of data storage or complex operations. Therefore, the method of location privacy protection with high storage requirement or high computational complexity is not suitable for WSNs.

  • The limited transmission distance of sensor nodes needs multi-hop communication to transmit packets from source to destination nodes which can lead to unbalanced network traffic. That is, a sensor node closer to the destination has higher traffic load, since it needs to not only transmit its own generated packets but also route packets from the nodes multi-hop away from the sink node. The unbalanced network traffic makes an adversary easily identify the source nodes or the base stations.

  • WSNs are often deployed in unattended environments and face different kinds of malicious attacks, in which an attack can launch physical attacks to capture legal sensor nodes, and further obtain the private cryptographic keys used for secure communication. Using the private keys, the attack can decrypt any communication in the network and easily get the location privacy. In addition, different kinds of attacks need different kinds of protection mechanisms and different applications have different protection requirements, which make it more difficult for location privacy preserving in WSNs.

The location privacy preserving for WSNs is first studied in Ozturk et al. (2004), and has received widespread concern in recent years. In George and Nathaniel (2012), the location privacy protection techniques in WSNs against a local eavesdropper are summarized. However, the techniques against global attacks are not discussed in this survey paper. In Liang et al. (2013), the key problems of location privacy protection are analyzed, including the model of privacy protection, the anonymous model and the system architecture. However, few location privacy protection techniques is analyzed in the paper. In Conti et al. (2013), a detail survey of source location privacy is provided, while the problem of sink node location privacy is not included. In Zurbarn et al. (2014), the privacy in location-based services is researched. However, the discussed techniques such as the cryptography-based protocols are not suitable for WSNs. In Dhivya and Siddique (2014), a survey on location privacy protection of both source and sink nodes is presented, while only an apart of location privacy protection techniques are discussed. In Zhang et al. (2015) and Grissa et al. (2017), the privacy preservation problem in cognitive radio networks is studied. In Gupta and Prince (2017), the source location privacy protection techniques based on random walk are surveyed. Compared with the above mentioned existing survey paper, our paper provides a comprehensive overview of location privacy protection, including the basic conception, the network model, the attack models including local and global eavesdroppers, and the different techniques for both source and sink nodes.

This paper provides a systematic summary of existing position privacy protection research for WSNs. In accordance with the protection target, the existing research works are classified into the following three categories: 1) source location privacy preserving, 2) sink node location privacy preserving, and 3) location privacy preserving for both source and sink nodes. The core technologies in each protocol are described in detail and the specific attacks that each protocol can resist are compared. The advantages and disadvantages of each protocol are analyzed, and future research directions are listed and discussed.

The rest of this article is organized as follows: Section 2 describes the network model, the attack model and the performance evaluation model. Section 3 Source location privacy preserving, 4 Sink node location privacy preserving, 5 Location privacy preserving for both source and sink nodes review the three categories of existing location privacy preserving research. Section 6 presents the detail comparison of each kinds of protocol, analyzes existing problems and future research issues about location privacy preserving. Finally, conclusions are given in Section 7.

Section snippets

Background

The issue of privacy has been widely studied in the past few years for many kinds of networks, e.g., Ad-hoc networks (Li and Song, 2016; Boualouache et al., 2018; Gong et al., 2018), social networks (Du et al., 2018; He et al., 2018), Industrial Wireless Sensor Networks (Wang et al., 2018a). In WSNs, the study of privacy is divided into two main categories: data-oriented privacy and context-oriented privacy (Li et al., 2014a; Proano et al., 2017; Bradbury and Jhumka, 2017). In the research of

Source location privacy preserving

In this section, we discuss the source location privacy protection techniques, which are classified into the following categories: (1) the phantom routing, (2) the fake packet injection, (3) the random walk, (4) the ring routing, (5) the mechanism based on the ring routing and the fake packet injection, (6) the mechanism based on the phantom routing and the fake packet injection, (7) the multiple routing path, (8) the data mule mechanism, (9) the cryptography and authentication mechanism, (10)

Sink node location privacy preserving

Sink nodes are significant nodes of WSNs since they are responsible for data aggregation, network management and connection with other networks. Attacks on the sink are the most destructive ones. The position exposure of the sink allows adversaries to obtain the sensitive information of the entire network, or further launch other malicious attacks. Obviously, preserving position privacy of sink nodes is very essential, especially for self-organization unattended WSNs in harsh or hostile

Location privacy preserving for both source and sink nodes

In this section, we discuss the location privacy preserving for both source and sink nodes, which are classified into the following categories: (1) the fake packet injection and (2) the anonymous communication mechanism.

Existing problems and future research issues

A large number of novel ideas and techniques have been proposed to design efficient location protection protocols. In this section, all the summarized protocols are analyzed and compared in Table 4 in terms of the main used techniques, the protected target, the resist attacks, the safety period, the transmission latency and the energy consumption. From the Table 4, we can summarize the existing problems and the possible future research issues of location privacy protect as follows:

  • The main used

Conclusion

In the past few years, location privacy research has received wide attention in WSNs. In this paper, we presented a state-of-the-art survey on location privacy preserving techniques in WSNs. We first classified the discussed techniques into three categories: 1) source location privacy preserving, 2) sink node location privacy preserving, and 3) location privacy preserving for both source and sink nodes, and gave a comprehensive survey for their strengths and weaknesses. Also, the performance of

Acknowledgement

The work is supported by “the National Natural Science Foundation of China under Grant No. 61572172 No. 61602152 and No. 61872124” and the National Natural Science Foundation of China-Guangdong Joint Fund under Grant No. U180120020” and supported by “the Fundamental Research Funds for the Central Universities, No. 2016B03114 and No. DUT17RC(3)094” and “program for Liaoning Excellent Talents in University, No. LR2017009”.

Jinfang Jiang is currently an associate professor with the Department of Information and Communication System, Hohai University, Changzhou, China. She received the Ph.D. degree from Hohai University, China, in 2015. She received her B.S. degree in Information & Communication Engineering from Hohai University, China, in 2009. Her current research interests are security and localization for Sensor Networks.

References (90)

  • R. Agrawal et al.

    Information sharing across private databases

  • I.F. Akyildiz et al.

    A survey on sensor networks

    IEEE Commun. Mag.

    (2002)
  • B. Alomair et al.

    Toward a statistical framework for source anonymity in sensor networks

    IEEE Trans. Mobile Comput.

    (2013)
  • A. Boualouache et al.

    A survey on pseudonym changing strategies for Vehicular Ad-Hoc Networks

    IEEE Commun. Surv. Tutor.

    (2018)
  • M. Bradbury et al.

    A Near-optimal Source Location Privacy Scheme for Wireless Sensor Networks

    (2017)
  • A. Bushnag et al.

    Source anonymity in WSNs against global adversary utilizing low transmission rates with delay constraints

    Sensors

    (2016)
  • F. Cadger et al.

    A survey of geographical routing in wireless ad-hoc networks

    Commun. Surv. Tutor.

    (2013)
  • G. Chai et al.

    Enhancing sink-location privacy in wireless sensor networks through k-anonymity

    Int. J. Distributed Sens. Netw.

    (2013)
  • X. Chen et al.

    Sensor network security: a survey

    IEEE Commun. Surv. Tutor.

    (2009)
  • J. Chen et al.

    An efficient anonymous communication protocol for wireless sensor networks

    Wireless Commun. Mobile Comput.

    (2012)
  • J. Chen et al.

    Designing robust routing protocols to protect base stations in wireless sensor networks

    Wireless Commun. Mobile Comput.

    (2014)
  • J. Chen et al.

    Hiding the source based on limited flooding for sensor networks

    Sensors

    (2015)
  • W. Chen et al.

    Constrained random routing mechanism for source privacy protection in WSNs

    IEEE Access

    (2017)
  • J. Chen J et al.

    A source location privacy preservation protocol in wireless sensor networks using source based restricted flooding

    Chin. J. Comput.

    (2010)
  • M. Conti et al.

    Providing source location privacy in wireless sensor networks: a survey

    IEEE Commun. Surv. Tutor.

    (2013)
  • A. Das et al.

    Bypassing using directional transceivers: a design for anti-tracking source location privacy protection in WSNs

  • J. Dhivya et al.

    A survey on location privacy protection of source and sink nodes in WSN

    Int. J. Eng. Trends Technol.

    (2014)
  • M. Dong et al.

    Preserving source-location privacy through redundant fog loop for wireless sensor networks

  • N.V. Doohan et al.

    Mobility of sink using hexagon architecture in highly data centric wireless sensor networks

    Int. J. Sci. Eng. Res.

    (2012)
  • J. Du et al.

    Community-structured evolutionary game for privacy protection in social networks

    IEEE Trans. Inf. Forensics Secur.

    (2018)
  • N. Dutta et al.

    Defending wireless sensor networks against adversarial localization

  • Y. Fan et al.

    An efficient privacy-preserving scheme against traffic analysis attacks in network coding

  • Y. Fan et al.

    An efficient privacy-preserving scheme against traffic analysis attacks in network coding

  • Y. Fan et al.

    Preventing traffic explosion and achieving source unobservability in multi-hop wireless networks using network coding

  • J. Freudiger et al.

    Non-cooperative location privacy

    IEEE Trans. Dependable Secure Comput.

    (2013)
  • J.M. Fuentes et al.

    Privacy models in wireless sensor networks: a survey

    J. Sens.

    (2016)
  • C. George et al.

    Protecting location privacy in wireless sensor networks against a local eavesdropper - a survey

    Int. J. Comput. Appl.

    (2012)
  • Y. Gong et al.

    Protecting location privacy for task allocation in ad hoc mobile cloud computing

    IEEE Trans. Emerg. Top. Comput.

    (2018)
  • M. Grissa et al.

    Location privacy in cognitive radio networks: a survey

    IEEE Commun. Surv. Tutor.

    (2017)
  • S. Gupta et al.

    Preserving privacy of source location using random walk: a survey

  • X. He et al.

    Leveraging spatial diversity for privacy-aware location based services in mobile networks

    IEEE Trans. Inf. Forensics Secur.

    (2018)
  • C. Huang et al.

    Preserving source location privacy for energy harvesting WSNs

    Sensors

    (2017)
  • P. Kamat et al.

    Enhancing source-location privacy in sensor network routing

  • L. Kang

    Protecting location privacy in large-scale wireless sensor networks

  • L. Kazatzopoulos et al.

    iHIDE: hiding sources of information in WSNs

  • Cited by (69)

    • Area coverage-based worker recruitment under geo-indistinguishability

      2022, Computer Networks
      Citation Excerpt :

      In particular, we devise an optimized geographical exponential mechanism OptGEM to generate accurate obfuscated locations and design a coverage-aware worker selection method CWS to select a proper set of participants to ensure large coverage for the target region. Since Geo-I [13] is proposed, many excellent surveys [57,58] have been done. Bordenabe et al. [59] explore the possibility to present a method that minimize the service quality loss.

    • Efficient solutions for target localization in asynchronous MIMO networks

      2022, Journal of Network and Computer Applications
      Citation Excerpt :

      Recently, multiple-input multiple-output (MIMO) technique shows the enhanced performance in term of target localization for its spatial diversity. Hence, target localization using MIMO technique has been proposed to be applied in various fields, such as distributed radar, multistatic sonar, and wireless sensor networks (Zhao and Hua, 2018; Jiang et al., 2019; Noroozi et al., 2019; Santi et al., 2019). Several transmitters and receivers deployed in a space-separated manner jointly determine the target position in a cooperative manner.

    View all citing articles on Scopus

    Jinfang Jiang is currently an associate professor with the Department of Information and Communication System, Hohai University, Changzhou, China. She received the Ph.D. degree from Hohai University, China, in 2015. She received her B.S. degree in Information & Communication Engineering from Hohai University, China, in 2009. Her current research interests are security and localization for Sensor Networks.

    Guangjie Han [S03, M05, SM18] is currently a Professor with the Department of Information and Communication System, Hohai University, Changzhou, China and a Distinguished Professor of Dalian University of Technology, Dalian, China. He received the Ph.D. degree from Northeastern University, Shenyang, China, in 2004. From 2004 to 2005, he was a Product Manager for the ZTE Company. From 2005 to 2006, he was a Key Account Manager for the Huawei Company. In February 2008, he finished his work as a Postdoctoral Researcher with the Department of Computer Science, Chonnam National University, Gwangju, Korea. From October 2010 to October 2011, he was a Visiting Research Scholar with Osaka University, Suita, Japan. From January 2017 to February 2017, he was a Visiting Professor with City University of Hong Kong, China. He is the author of over 298 papers published in related international conference proceedings and journals, including the IEEE COMST, IEEE TII, IEEE TMC, IEEE TVT, IEEE TIE, IEEE TPDS, IEEE TETC, IEEE IoT Journal, IEEE TETCI, IEEE TCC, IEEE Systems, IEEE Sensors, IEEE Wireless Communications, IEEE Communications, IEEE Network, etc, and is the holder of 120 patents. Currently, his H-index is 29 and i10-index is 71 in Google Citation (Google Scholar). Total citation of his papers by other people is more than 3603 times. His current research interests include Internet of Things, Industrial Internet, Mobile Computing, Artificial Intelligence, and security. Dr. Han has served as a Co-chair for more than 50 international conferences/workshops and as a Technical Program Committee member of more than 150 conferences. He has served on the Editorial Boards of up to 16 international journals, including the IEEE Network, IEEE Systems, IEEE ACCESS, IEEE/CCA JAS, Telecommunication Systems, etc. He has guest edited a number of special issues in IEEE Journals and Magazines, including the IEEE Communications, IEEE Wireless Communications, IEEE Transactions on Industrial Informatics, Computer Networks, etc. He has served as a Reviewer of more than 60 journals. He had been awarded the ComManTel 2014, ComComAP 2014, Chinacom 2014 and Qshine 2016 Best Paper Awards. He is a member of IEEE and ACM.

    Hao Wang is currently pursuing his Ph.D. degree from the Department of Computer Science and Technology at Hohai University. He received his B.S. degree in Electronic Information Science and Technology from Nanjing Agricultural University, China, in 2015. His current research interests include location privacy protection of wireless sensor networks.

    Mohsen Guizani (S85–M89–SM99–F09) received the B.S. (with distinction) and M.S. degrees in electrical engineering, the M.S. and Ph.D. degrees in computer engineering from Syracuse University, Syracuse, NY, USA, in 1984, 1986, 1987, and 1990, respectively. He is currently a Professor and the ECE Department Chair at the University of Idaho, USA. Previously, he served as the Associate Vice President of Graduate Studies, Qatar University, Chair of the Computer Science Department, Western Michigan University, and Chair of the Computer Science Department, University of West Florida. He also served in academic positions at the University of Missouri-Kansas City, University of Colorado-Boulder, Syracuse University, and Kuwait University. His research interests include wireless communications and mobile computing, computer networks, mobile cloud computing, security, and smart grid. He currently serves on the editorial boards of several international technical journals and the Founder and the Editor-in-Chief of Wireless Communications and Mobile Computing journal (Wiley). He is the author of nine books and more than 400 publications in refereed journals and conferences. He guests edited a number of special issues in IEEE journals and magazines. He also served as a member, Chair, and General Chair of a number of international conferences. He was selected as the best Teaching Assistant for two consecutive years at Syracuse University. He received the best Research Award from three institutions. He was the Chair of the IEEE Communications Society Wireless Technical Committee and the Chair of the TAOS Technical Committee. He served as the IEEE Computer Society Distinguished Speaker from 2003 to 2005.

    View full text