skip to main content
10.1145/1641804.1641825acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
research-article

On providing location privacy for mobile sinks in wireless sensor networks

Published: 26 October 2009 Publication History

Abstract

Wireless sensor networks have attracted increasing attentions considering their potentials for being widely adopted in both emerging civil and military applications. A common practice of sensor networks is to collect data from the sensors and report the data to the sinks or to some pre-defined data rendezvous points via multi-hop communications. Attackers may locate a sink easily by reading the destination field in the packet header or predicting the arrival of a sink at the rendezvous points, which opens up vulnerabilities to location privacy of the sinks. In this work, we propose a random data collection scheme to protect the location privacy of mobile sinks in sensor networks. Data are forwarded along some random paths and stored at random nodes in the network. The sinks move around along some random paths to collect data from the local nodes occasionally, which prevents the attackers from predicting their locations and movements. We analyze different attacks threatening the location privacy of the sinks in sensor networks. We also evaluate the delivery rate, data collection delay and protection strength of our scheme by both analysis and simulations. The results show that our scheme can provide location privacy of mobile sinks effectively, while providing satisfactory data collection services.

References

[1]
I. F. Akyildiz, W. Su, and T. Sandarasubramaniam. Wireless sensor networks: a survey. Computer Networks, 38(5):393--422, 2002.
[2]
J. N. Al-Karaki and A. E. Kamal. Routing techniques in wireless sensor networks: a survey. Elsevier Ad Hoc Networks Journal, pages 325--349, 2005.
[3]
J. Deng, R. Han, and S. Mishra. Countermeasures against traffic analysis attacks in wireless sensor networks. In Proc. of IEEE/CreateNet International Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm), 2005.
[4]
S. C. Ergen and P. Varaiya. Energy efficient routing with delay guarantee for sensor networks. ACM Wireless Networks, 13(5):679--690, Oct 2007.
[5]
L. Eschenaur and V. Gligor. A key-management scheme for distributed sensor networks. In Proc. of the 9th ACM Conference on Computer and Communication Security, 2002.
[6]
M. Gruteser, G. Schelle, A. Jain, R. Han, and D. Grunwald. Privacy-aware location sensor netwroks. In Proc. of USENIX Workshop on Hot Topics in Operation Systems (HotOS IX), 2003.
[7]
Y. Gu, D. Bozdag, R. W. Brewer, and E. Ekici. Data harvesting with mobile elements in wireless sensor networks. Comput. Netw., 50(17):3449--3465, 2006.
[8]
T. He, J. Stankovic, C. Lu, and T. Abdelzaher. SPEED: a real-time routing protocol for sensor networks. In Proc. of IEEE ICDCS, pages 46--55, Providence, RI, U.S., May 2003.
[9]
B. Hoh and M. Gruteser. Protecting location privacy through path confusion. In Proc. of IEEE/CreateNet International Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm), 2005.
[10]
D. Jea, A. Somasundara, and M. Srivastava. Multiple controlled mobile elements (data mules) for data collection in sensor networks. In In DCOSS, pages 244--257, 2005.
[11]
Y. Jian, S. Chen, Z. Zhang, and L. Zhang. Protecting receiver-location privacy in wireless sensor networks. In Proc. of IEEE Infocom, pages 1955--1963, 2007.
[12]
P. Kamat, Y. Zhang, W. Trappe, and C. Ozturk. Enhancing source-location privacy in sensor network routing. In Proc. of IEEE ICDCS, Columbus, Ohio, USA, Jun 2005.
[13]
B. Karp and H. Kung. GPSR: Greedy perimeter stateless routing for wireless networks. In Proc. of ACM Mobicom, Boston, Massachusetts, U.S., 2000.
[14]
W. Lou and Y. Kwon. H-SPREAD: a hybrid multipath scheme for secure and reliable data collection in wireless sensor networks. IEEE Trans. on Vechicular Technology, 55(4):1320--1330, Jul 2006.
[15]
A. Mainwaring, D. Culler, J. Polastre, R. Szewczyk, and J. Anderson. Wireless sensor networks for habitat monitoring. In WSNA '02: Proc. of the 1st ACM international workshop on Wireless sensor networks and applications, pages 88--97, New York, NY, USA, 2002. ACM.
[16]
A. Perrig, R. Szewczyk, D. Tygar, V. Wen, and D. Cullar. Spins: security protocols for sensor networks. Wireless Communications, 8(5):521--534, 2002.
[17]
R. Shah, S. Roy, S. Jain, and W. Brunette. Data mules: modeling a three-tier architecture for sparse sensor networks. In Sensor Network Protocols and Applications, 2003. Proceedings of the First IEEE. 2003 IEEE International Workshop on, pages 30--41, May 2003.
[18]
M. Shao, Y. Yang, S. Zhu, and G. Cao. Towards statistically strong source anonymity for sensor networks. In Proc. of IEEE Infocom, 2008.
[19]
A. A. Somasundara. Controllably mobile infrastructure for low energy embedded networks. IEEE Transactions on Mobile Computing, 5(8):958--973, 2006. Student Member-Kansal, Aman and Student Member-Jea, David D. and Fellow-Estrin, Deborah and Senior Member-Srivastava, Mani B.
[20]
A. A. Somasundara. Mobile element scheduling with dynamic deadlines. IEEE Transactions on Mobile Computing, 6(4):395--410, 2007. Member-Ramamoorthy, Aditya and Senior Member-Srivastava, Mani B.
[21]
W. Wang, V. Srinivasan, and K.-C. Chua. Using mobile relays to prolong the lifetime of wireless sensor networks. In MobiCom '05: Proceedings of the 11th annual international conference on Mobile computing and networking, pages 270--283, New York, NY, USA, 2005. ACM.
[22]
G. Xing, T. Wang, Z. Xie, and W. Jia. Rendezvous planning in mobility-assisted wireless sensor networks. In RTSS '07: Proceedings of the 28th IEEE International Real-Time Systems Symposium, pages 311--320, Washington, DC, USA, 2007. IEEE Computer Society.
[23]
Y. Yang, M. Shao, S. Zhu, B. Urgaonkar, and G. Cao. Towards event source unobservability with minimum network traffic in sensor networks. In Proc. of ACM WiSec, Alexandria, Virginia, USA, Apr 2008.
[24]
W. Zhang, G. Cao, and T. L. Porta. Data dissemination with ring-based index for wireless sensor networks. IEEE Transactions on Mobile Computing, 6(7):832--847, 2007.

Cited By

View all
  • (2019)Sink Location Privacy Protection Algorithm Based on Tangential Path in WSNAdvances in Natural Computation, Fuzzy Systems and Knowledge Discovery10.1007/978-3-030-32456-8_19(181-188)Online publication date: 7-Nov-2019
  • (2015)In-Network Trajectory Privacy PreservationACM Computing Surveys10.1145/281818348:2(1-29)Online publication date: 12-Oct-2015
  • (2015)On protecting end-to-end location privacy against local eavesdropper in Wireless Sensor NetworksPervasive and Mobile Computing10.1016/j.pmcj.2014.01.00616:PA(36-50)Online publication date: 1-Jan-2015
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
MSWiM '09: Proceedings of the 12th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems
October 2009
438 pages
ISBN:9781605586168
DOI:10.1145/1641804
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 October 2009

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. data collection
  2. privacy
  3. wireless sensor networks

Qualifiers

  • Research-article

Conference

MSWiM '09
Sponsor:

Acceptance Rates

Overall Acceptance Rate 398 of 1,577 submissions, 25%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2019)Sink Location Privacy Protection Algorithm Based on Tangential Path in WSNAdvances in Natural Computation, Fuzzy Systems and Knowledge Discovery10.1007/978-3-030-32456-8_19(181-188)Online publication date: 7-Nov-2019
  • (2015)In-Network Trajectory Privacy PreservationACM Computing Surveys10.1145/281818348:2(1-29)Online publication date: 12-Oct-2015
  • (2015)On protecting end-to-end location privacy against local eavesdropper in Wireless Sensor NetworksPervasive and Mobile Computing10.1016/j.pmcj.2014.01.00616:PA(36-50)Online publication date: 1-Jan-2015
  • (2014)Bidirectional Random Walk Based Mobile-Sink-LocationPrivacyin WSNApplied Mechanics and Materials10.4028/www.scientific.net/AMM.529.730529(730-734)Online publication date: Jun-2014
  • (2013)Mobile-Base-Station Location Privacy Based on Greedy Random Walk in WSNApplied Mechanics and Materials10.4028/www.scientific.net/AMM.427-429.2502427-429(2502-2507)Online publication date: Sep-2013
  • (2013)Bidirection Greedy Walk Based Mobile-Base-Station-Location Privacy in Wireless Sensor NetworksApplied Mechanics and Materials10.4028/www.scientific.net/AMM.427-429.2497427-429(2497-2501)Online publication date: Sep-2013
  • (2013)Toward a Statistical Framework for Source Anonymity in Sensor NetworksIEEE Transactions on Mobile Computing10.1109/TMC.2011.26712:2(248-260)Online publication date: 1-Feb-2013
  • (2013)Maintaining trajectory privacy in mobile wireless sensor networks2013 IEEE Conference on Communications and Network Security (CNS)10.1109/CNS.2013.6682748(401-402)Online publication date: Oct-2013
  • (2013)Protecting the sink location privacy in wireless sensor networksPersonal and Ubiquitous Computing10.1007/s00779-012-0539-917:5(883-893)Online publication date: 1-Jun-2013
  • (2013)Privacy Enhancing Technologies for Wireless Sensor NetworksThe Art of Wireless Sensor Networks10.1007/978-3-642-40009-4_18(609-641)Online publication date: 14-Dec-2013
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media