DocumentCode :
21720
Title :
REAL: A Reciprocal Protocol for Location Privacy in Wireless Sensor Networks
Author :
Jia-Dong Zhang ; Chi-Yin Chow
Author_Institution :
Dept. of Comput. Sci., City Univ. of Hong Kong, Hong Kong, China
Volume :
12
Issue :
4
fYear :
2015
fDate :
July-Aug. 1 2015
Firstpage :
458
Lastpage :
471
Abstract :
K-anonymity has been used to protect location privacy for location monitoring services in wireless sensor networks (WSNs), where sensor nodes work together to report k-anonymized aggregate locations to a server. Each k-anonymized aggregate location is a cloaked area that contains at least k persons. However, we identify an attack model to show that overlapping aggregate locations still pose privacy risks because an adversary can infer some overlapping areas with less than k persons that violates the k-anonymity privacy requirement. In this paper, we propose a reciprocal protocol for location privacy (REAL) in WSNs. In REAL, sensor nodes are required to autonomously organize their sensing areas into a set of non-overlapping and highly accurate k-anonymized aggregate locations. To confront the three key challenges in REAL, namely, self-organization, reciprocity property and high accuracy, we design a state transition process, a locking mechanism and a time delay mechanism, respectively. We compare the performance of REAL with current protocols through simulated experiments. The results show that REAL protects location privacy, provides more accurate query answers, and reduces communication and computational costs.
Keywords :
data privacy; protocols; sensor placement; wireless sensor networks; K-anonymity; K-anonymized aggregate locations; REAL; attack model; location privacy; locking mechanism; overlapping aggregate locations; reciprocal protocol; state transition process; time delay mechanism; wireless sensor networks; Aggregates; Monitoring; Peer-to-peer computing; Privacy; Sensors; Servers; Wireless sensor networks; Location privacy; aggregate locations; k-anonymity; location monitoring systems; wireless sensor networks;
fLanguage :
English
Journal_Title :
Dependable and Secure Computing, IEEE Transactions on
Publisher :
ieee
ISSN :
1545-5971
Type :
jour
DOI :
10.1109/TDSC.2014.2366467
Filename :
6942208
Link To Document :
بازگشت