Weitere Artikel dieser Ausgabe durch Wischen aufrufen
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
In wireless sensor networks, the privacy of an event is critical to its safety. The location privacy of the sensor node that reports the event is imperative to the privacy of the event. Thus, privacy protection of both the event and the node that observes and reports the event is critical. In this work, we present a differentially private framework for ensuring the location privacy of a node and through it the event. The framework is based on the premise that an event occurrence is observed by multiple nodes. The transmissions triggered by an event reported by multiple nodes have low sensitivity to transmission by a single source node. If an event is reported by small number of nodes, additional dummy traffic needs to be generated for privacy of the event. Moreover, fake events are required to evade sustained observation. The privacy of an event also requires that an adversary must not be able to distinguish between real and dummy traffic. Reduced sensitivity to a single node transmission is achieved by cumulative, real and dummy traffic reporting the same event and by rendering real and fake events indistinguishable. Results indicate that dummy traffic for real and fake event ensure the differential privacy of the location of the occurrence of a node and the related event can be achieved.
Bitte loggen Sie sich ein, um Zugang zu diesem Inhalt zu erhalten
Sie möchten Zugang zu diesem Inhalt erhalten? Dann informieren Sie sich jetzt über unsere Produkte:
Alomair, B., Clark, A., Cuellar, J., & Poovendran, R. (2010). Statistical framework for source anonymity in sensor networks. In Global telecommunications conference (GLOBECOM 2010). https://doi.org/10.1109/GLOCOM.2010.5684248.
Bordenabe, N. E., Chatzikokolakis, K., & Palamidessi, C. (2014). Optimal geo-indistinguishable mechanisms for location privacy. In Proceedings of the 2014 ACM SIGSAC conference on computer and communications security, CCS ’14 (pp. 251–262). New York, NY: ACM. https://doi.org/10.1145/2660267.2660345.
Debnath, A., Singaravelu, P., & Verma, S. (2014). Privacy in wireless sensor networks using ring signature. Journal of King Saud University-Computer and Information Sciences, 26(2), 228–236. https://doi.org/10.1016/j.jksuci.2013.12.006. CrossRef
Deng, J., Deng, J., Han, R., Han, R., & Mishra, S. (2003). Enhancing base station security in wireless sensor networks. Technical report. University of Colorado, Department of Computer Science.
Deng, J., Han, R., & Mishra, S. (2006). Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks. Pervasive and Mobile Computing, 2(2), 159–186. https://doi.org/10.1016/j.pmcj.2005.12.003. CrossRef
Fan, Y., Jiang, Y., Zhu, H., & Shen, X. (2009). An efficient privacy-preserving scheme against traffic analysis attacks in network coding. In INFOCOM 2009 (pp. 2213–2221). IEEE. https://doi.org/10.1109/INFCOM.2009.5062146.
Herrmann, M., Rial, A., Diaz, C., & Preneel, B. (2014). Practical privacy-preserving location-sharing based services with aggregate statistics. In Proceedings of the 2014 ACM conference on security and privacy in wireless & mobile networks, WiSec ’14 (pp. 87–98). New York, NY: ACM. https://doi.org/10.1145/2627393.2627414.
Huang, J., Sun, M., Zhu, S., Sun, Y., Xing, C. C., & Duan, Q. (2015). A source-location privacy protection strategy via pseudo normal distribution-based phantom routing in WSNS. In Proceedings of the 30th annual ACM symposium on applied computing, SAC ’15 (pp. 688–694). New York, NY: ACM. https://doi.org/10.1145/2695664.2695843.
Jian, Y., Chen, S., Zhang, Z., & Zhang, L. (2007). Protecting receiver-location privacy in wireless sensor networks. In IEEE INFOCOM 2007—26th IEEE international conference on computer communications (pp. 1955–1963). https://doi.org/10.1109/INFCOM.2007.227.
Kamat, P., Zhang, Y., Trappe, W., & Ozturk, C. (2005). Enhancing source-location privacy in sensor network routing. In 25th IEEE international conference on distributed computing systems (ICDCS’05) (pp. 599–608). https://doi.org/10.1109/ICDCS.2005.31.
Nissim, K., Vadhan, S., & Xiao, D. (2014). Redrawing the boundaries on purchasing data from privacy-sensitive individuals. In Proceedings of the 5th conference on innovations in theoretical computer science, ITCS ’14 (pp. 411–422). New York, NY: ACM. https://doi.org/10.1145/2554797.2554835.
Ouyang, Y., Le, X., Chen, G., Ford, J., & Makedon, F. (2006). Entrapping adversaries for source protection in sensor networks. In 2006 International symposium on a world of wireless, mobile and multimedia networks (WoWMoM’06) (pp. 10–34). https://doi.org/10.1109/WOWMOM.2006.40.
Paruchuri, V., Durresi, A., Durresi, M., & Barolli, L. (2005). Routing through backbone structures in sensor networks. In 11th International conference on parallel and distributed systems (ICPADS’05) (Vol. 2, pp. 397–401). https://doi.org/10.1109/ICPADS.2005.255.
Rios, R., Cuellar, J., & Lopez, J. (2015). Probabilistic receiver-location privacy protection in wireless sensor networks. Information Sciences, 321(C), 205–223. https://doi.org/10.1016/j.ins.2015.01.016. CrossRef
Roy, P. K., Singh, J. P., Kumar, P., & Singh, M. (2015). Source location privacy using fake source and phantom routing (FSAPR) technique in wireless sensor networks. In Procedia computer science, 3rd international conference on recent trends in computing 2015 (ICRTC-2015) (Vol. 57, pp. 936–941). https://doi.org/10.1016/j.procs.2015.07.486.
Shao, M., Yang, Y., Zhu, S., & Cao, G. (2008). Towards statistically strong source anonymity for sensor networks. In INFOCOM 2008, the 27th conference on computer communications. IEEE. https://doi.org/10.1109/INFOCOM.2008.19.
Theodorakopoulos, G. (2015). The same-origin attack against location privacy. In Proceedings of the 14th ACM workshop on privacy in the electronic society, WPES ’15, (pp. 49–53). New York, NY: ACM. https://doi.org/10.1145/2808138.2808150.
Xiao, Y., & Xiong, L. (2015). Protecting locations with differential privacy under temporal correlations. In Proceedings of the 22Nd ACM SIGSAC conference on computer and communications security, CCS ’15 (pp. 1298–1309). New York, NY: ACM. https://doi.org/10.1145/2810103.2813640.
Yang, Y., Shao, M., Zhu, S., Urgaonkar, B., & Cao, G. (2008). Towards event source unobservability with minimum network traffic in sensor networks. In Proceedings of the first ACM conference on wireless network security, WiSec ’08 (pp. 77–88). New York, NY: ACM. https://doi.org/10.1145/1352533.1352547.
- Differentially Private Location Privacy Preservation in Wireless Sensor Networks
Krishna Pratap Singh
- Springer US
Neuer Inhalt/© Filograph | Getty Images | iStock