Differentially Private Location Privacy Preservation in Wireless Sensor Networks
- 64 Downloads
In wireless sensor networks, the privacy of an event is critical to its safety. The location privacy of the sensor node that reports the event is imperative to the privacy of the event. Thus, privacy protection of both the event and the node that observes and reports the event is critical. In this work, we present a differentially private framework for ensuring the location privacy of a node and through it the event. The framework is based on the premise that an event occurrence is observed by multiple nodes. The transmissions triggered by an event reported by multiple nodes have low sensitivity to transmission by a single source node. If an event is reported by small number of nodes, additional dummy traffic needs to be generated for privacy of the event. Moreover, fake events are required to evade sustained observation. The privacy of an event also requires that an adversary must not be able to distinguish between real and dummy traffic. Reduced sensitivity to a single node transmission is achieved by cumulative, real and dummy traffic reporting the same event and by rendering real and fake events indistinguishable. Results indicate that dummy traffic for real and fake event ensure the differential privacy of the location of the occurrence of a node and the related event can be achieved.
KeywordsDifferential privacy Location privacy Wireless sensor networks
- 2.Alomair, B., Clark, A., Cuellar, J., & Poovendran, R. (2010). Statistical framework for source anonymity in sensor networks. In Global telecommunications conference (GLOBECOM 2010). https://doi.org/10.1109/GLOCOM.2010.5684248.
- 4.Bordenabe, N. E., Chatzikokolakis, K., & Palamidessi, C. (2014). Optimal geo-indistinguishable mechanisms for location privacy. In Proceedings of the 2014 ACM SIGSAC conference on computer and communications security, CCS ’14 (pp. 251–262). New York, NY: ACM. https://doi.org/10.1145/2660267.2660345.
- 8.Deng, J., Deng, J., Han, R., Han, R., & Mishra, S. (2003). Enhancing base station security in wireless sensor networks. Technical report. University of Colorado, Department of Computer Science.Google Scholar
- 11.Fan, Y., Jiang, Y., Zhu, H., & Shen, X. (2009). An efficient privacy-preserving scheme against traffic analysis attacks in network coding. In INFOCOM 2009 (pp. 2213–2221). IEEE. https://doi.org/10.1109/INFCOM.2009.5062146.
- 14.Herrmann, M., Rial, A., Diaz, C., & Preneel, B. (2014). Practical privacy-preserving location-sharing based services with aggregate statistics. In Proceedings of the 2014 ACM conference on security and privacy in wireless & mobile networks, WiSec ’14 (pp. 87–98). New York, NY: ACM. https://doi.org/10.1145/2627393.2627414.
- 15.Huang, J., Sun, M., Zhu, S., Sun, Y., Xing, C. C., & Duan, Q. (2015). A source-location privacy protection strategy via pseudo normal distribution-based phantom routing in WSNS. In Proceedings of the 30th annual ACM symposium on applied computing, SAC ’15 (pp. 688–694). New York, NY: ACM. https://doi.org/10.1145/2695664.2695843.
- 16.Jian, Y., Chen, S., Zhang, Z., & Zhang, L. (2007). Protecting receiver-location privacy in wireless sensor networks. In IEEE INFOCOM 2007—26th IEEE international conference on computer communications (pp. 1955–1963). https://doi.org/10.1109/INFCOM.2007.227.
- 18.Kamat, P., Zhang, Y., Trappe, W., & Ozturk, C. (2005). Enhancing source-location privacy in sensor network routing. In 25th IEEE international conference on distributed computing systems (ICDCS’05) (pp. 599–608). https://doi.org/10.1109/ICDCS.2005.31.
- 22.Nissim, K., Vadhan, S., & Xiao, D. (2014). Redrawing the boundaries on purchasing data from privacy-sensitive individuals. In Proceedings of the 5th conference on innovations in theoretical computer science, ITCS ’14 (pp. 411–422). New York, NY: ACM. https://doi.org/10.1145/2554797.2554835.
- 23.Ouyang, Y., Le, X., Chen, G., Ford, J., & Makedon, F. (2006). Entrapping adversaries for source protection in sensor networks. In 2006 International symposium on a world of wireless, mobile and multimedia networks (WoWMoM’06) (pp. 10–34). https://doi.org/10.1109/WOWMOM.2006.40.
- 24.Paruchuri, V., Durresi, A., Durresi, M., & Barolli, L. (2005). Routing through backbone structures in sensor networks. In 11th International conference on parallel and distributed systems (ICPADS’05) (Vol. 2, pp. 397–401). https://doi.org/10.1109/ICPADS.2005.255.
- 26.Roy, P. K., Singh, J. P., Kumar, P., & Singh, M. (2015). Source location privacy using fake source and phantom routing (FSAPR) technique in wireless sensor networks. In Procedia computer science, 3rd international conference on recent trends in computing 2015 (ICRTC-2015) (Vol. 57, pp. 936–941). https://doi.org/10.1016/j.procs.2015.07.486.
- 27.Shao, M., Yang, Y., Zhu, S., & Cao, G. (2008). Towards statistically strong source anonymity for sensor networks. In INFOCOM 2008, the 27th conference on computer communications. IEEE. https://doi.org/10.1109/INFOCOM.2008.19.
- 28.Theodorakopoulos, G. (2015). The same-origin attack against location privacy. In Proceedings of the 14th ACM workshop on privacy in the electronic society, WPES ’15, (pp. 49–53). New York, NY: ACM. https://doi.org/10.1145/2808138.2808150.
- 30.Xiao, Y., & Xiong, L. (2015). Protecting locations with differential privacy under temporal correlations. In Proceedings of the 22Nd ACM SIGSAC conference on computer and communications security, CCS ’15 (pp. 1298–1309). New York, NY: ACM. https://doi.org/10.1145/2810103.2813640.
- 31.Yang, Y., Shao, M., Zhu, S., Urgaonkar, B., & Cao, G. (2008). Towards event source unobservability with minimum network traffic in sensor networks. In Proceedings of the first ACM conference on wireless network security, WiSec ’08 (pp. 77–88). New York, NY: ACM. https://doi.org/10.1145/1352533.1352547.