Skip to main content
Top
Published in: Wireless Personal Communications 1/2019

08-10-2018

Differentially Private Location Privacy Preservation in Wireless Sensor Networks

Authors: Bodhi Chakraborty, Shekhar Verma, Krishna Pratap Singh

Published in: Wireless Personal Communications | Issue 1/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In wireless sensor networks, the privacy of an event is critical to its safety. The location privacy of the sensor node that reports the event is imperative to the privacy of the event. Thus, privacy protection of both the event and the node that observes and reports the event is critical. In this work, we present a differentially private framework for ensuring the location privacy of a node and through it the event. The framework is based on the premise that an event occurrence is observed by multiple nodes. The transmissions triggered by an event reported by multiple nodes have low sensitivity to transmission by a single source node. If an event is reported by small number of nodes, additional dummy traffic needs to be generated for privacy of the event. Moreover, fake events are required to evade sustained observation. The privacy of an event also requires that an adversary must not be able to distinguish between real and dummy traffic. Reduced sensitivity to a single node transmission is achieved by cumulative, real and dummy traffic reporting the same event and by rendering real and fake events indistinguishable. Results indicate that dummy traffic for real and fake event ensure the differential privacy of the location of the occurrence of a node and the related event can be achieved.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
We can see that whether a node takes part in the transmission of the packets doesnt change the estimation of region of uncertainty reasonably. This ensures Differential Privacy.
 
Literature
4.
go back to reference Bordenabe, N. E., Chatzikokolakis, K., & Palamidessi, C. (2014). Optimal geo-indistinguishable mechanisms for location privacy. In Proceedings of the 2014 ACM SIGSAC conference on computer and communications security, CCS ’14 (pp. 251–262). New York, NY: ACM. https://doi.org/10.1145/2660267.2660345. Bordenabe, N. E., Chatzikokolakis, K., & Palamidessi, C. (2014). Optimal geo-indistinguishable mechanisms for location privacy. In Proceedings of the 2014 ACM SIGSAC conference on computer and communications security, CCS ’14 (pp. 251–262). New York, NY: ACM. https://​doi.​org/​10.​1145/​2660267.​2660345.
8.
go back to reference Deng, J., Deng, J., Han, R., Han, R., & Mishra, S. (2003). Enhancing base station security in wireless sensor networks. Technical report. University of Colorado, Department of Computer Science. Deng, J., Deng, J., Han, R., Han, R., & Mishra, S. (2003). Enhancing base station security in wireless sensor networks. Technical report. University of Colorado, Department of Computer Science.
14.
go back to reference Herrmann, M., Rial, A., Diaz, C., & Preneel, B. (2014). Practical privacy-preserving location-sharing based services with aggregate statistics. In Proceedings of the 2014 ACM conference on security and privacy in wireless & mobile networks, WiSec ’14 (pp. 87–98). New York, NY: ACM. https://doi.org/10.1145/2627393.2627414. Herrmann, M., Rial, A., Diaz, C., & Preneel, B. (2014). Practical privacy-preserving location-sharing based services with aggregate statistics. In Proceedings of the 2014 ACM conference on security and privacy in wireless & mobile networks, WiSec ’14 (pp. 87–98). New York, NY: ACM. https://​doi.​org/​10.​1145/​2627393.​2627414.
15.
go back to reference Huang, J., Sun, M., Zhu, S., Sun, Y., Xing, C. C., & Duan, Q. (2015). A source-location privacy protection strategy via pseudo normal distribution-based phantom routing in WSNS. In Proceedings of the 30th annual ACM symposium on applied computing, SAC ’15 (pp. 688–694). New York, NY: ACM. https://doi.org/10.1145/2695664.2695843. Huang, J., Sun, M., Zhu, S., Sun, Y., Xing, C. C., & Duan, Q. (2015). A source-location privacy protection strategy via pseudo normal distribution-based phantom routing in WSNS. In Proceedings of the 30th annual ACM symposium on applied computing, SAC ’15 (pp. 688–694). New York, NY: ACM. https://​doi.​org/​10.​1145/​2695664.​2695843.
22.
go back to reference Nissim, K., Vadhan, S., & Xiao, D. (2014). Redrawing the boundaries on purchasing data from privacy-sensitive individuals. In Proceedings of the 5th conference on innovations in theoretical computer science, ITCS ’14 (pp. 411–422). New York, NY: ACM. https://doi.org/10.1145/2554797.2554835. Nissim, K., Vadhan, S., & Xiao, D. (2014). Redrawing the boundaries on purchasing data from privacy-sensitive individuals. In Proceedings of the 5th conference on innovations in theoretical computer science, ITCS ’14 (pp. 411–422). New York, NY: ACM. https://​doi.​org/​10.​1145/​2554797.​2554835.
23.
go back to reference Ouyang, Y., Le, X., Chen, G., Ford, J., & Makedon, F. (2006). Entrapping adversaries for source protection in sensor networks. In 2006 International symposium on a world of wireless, mobile and multimedia networks (WoWMoM’06) (pp. 10–34). https://doi.org/10.1109/WOWMOM.2006.40. Ouyang, Y., Le, X., Chen, G., Ford, J., & Makedon, F. (2006). Entrapping adversaries for source protection in sensor networks. In 2006 International symposium on a world of wireless, mobile and multimedia networks (WoWMoM’06) (pp. 10–34). https://​doi.​org/​10.​1109/​WOWMOM.​2006.​40.
24.
26.
go back to reference Roy, P. K., Singh, J. P., Kumar, P., & Singh, M. (2015). Source location privacy using fake source and phantom routing (FSAPR) technique in wireless sensor networks. In Procedia computer science, 3rd international conference on recent trends in computing 2015 (ICRTC-2015) (Vol. 57, pp. 936–941). https://doi.org/10.1016/j.procs.2015.07.486. Roy, P. K., Singh, J. P., Kumar, P., & Singh, M. (2015). Source location privacy using fake source and phantom routing (FSAPR) technique in wireless sensor networks. In Procedia computer science, 3rd international conference on recent trends in computing 2015 (ICRTC-2015) (Vol. 57, pp. 936–941). https://​doi.​org/​10.​1016/​j.​procs.​2015.​07.​486.
30.
go back to reference Xiao, Y., & Xiong, L. (2015). Protecting locations with differential privacy under temporal correlations. In Proceedings of the 22Nd ACM SIGSAC conference on computer and communications security, CCS ’15 (pp. 1298–1309). New York, NY: ACM. https://doi.org/10.1145/2810103.2813640. Xiao, Y., & Xiong, L. (2015). Protecting locations with differential privacy under temporal correlations. In Proceedings of the 22Nd ACM SIGSAC conference on computer and communications security, CCS ’15 (pp. 1298–1309). New York, NY: ACM. https://​doi.​org/​10.​1145/​2810103.​2813640.
31.
go back to reference Yang, Y., Shao, M., Zhu, S., Urgaonkar, B., & Cao, G. (2008). Towards event source unobservability with minimum network traffic in sensor networks. In Proceedings of the first ACM conference on wireless network security, WiSec ’08 (pp. 77–88). New York, NY: ACM. https://doi.org/10.1145/1352533.1352547. Yang, Y., Shao, M., Zhu, S., Urgaonkar, B., & Cao, G. (2008). Towards event source unobservability with minimum network traffic in sensor networks. In Proceedings of the first ACM conference on wireless network security, WiSec ’08 (pp. 77–88). New York, NY: ACM. https://​doi.​org/​10.​1145/​1352533.​1352547.
Metadata
Title
Differentially Private Location Privacy Preservation in Wireless Sensor Networks
Authors
Bodhi Chakraborty
Shekhar Verma
Krishna Pratap Singh
Publication date
08-10-2018
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 1/2019
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-018-6026-5

Other articles of this Issue 1/2019

Wireless Personal Communications 1/2019 Go to the issue