Skip to main content

Location Privacy in WSNs: Solutions, Challenges, and Future Trends

  • Chapter
Foundations of Security Analysis and Design VII (FOSAD 2013, FOSAD 2012)

Abstract

Privacy preservation is gaining popularity in Wireless Sensor Network (WSNs) due to its adoption in everyday scenarios. There are a number of research papers in this area many of which concentrate on the location privacy problem. In this paper we review and categorise these solutions based on the information available to the adversary and his capabilities. But first we analyse whether traditional anonymous communication systems conform to the original requirements of location privacy in sensor networks. Finally, we present and discuss a number of challenges and future trends that demand further attention from the research community.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Acharya, U., Younis, M.: Increasing base-station anonymity in wireless sensor networks. Ad Hoc Networks 8(8), 791–809 (2010)

    Article  Google Scholar 

  2. Alomair, B., Clark, A., Cuellar, J., Poovendran, R.: Towards a Statistical Framework for Source Anonymity in Sensor Networks. IEEE Transactions on Mobile Computing 12(2), 248–260 (2012)

    Article  Google Scholar 

  3. Biswas, S., Mukherjee, S., Mukhopadhyaya, K.: A Countermeasure against Traffic-Analysis based Base Station Detection in WSN (2008), http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.98.948

  4. Chai, G., Xu, M., Xu, W., Lin, Z.: Enhancing sink-location privacy in wireless sensor networks through k-anonymity. International Journal of Distributed Sensor Networks 2012, 16 (2012)

    Google Scholar 

  5. Chang, S., Qi, Y., Zhu, H., Dong, M., Ota, K.: Maelstrom: Receiver-Location Preserving in Wireless Sensor Networks. In: Cheng, Y., Eun, D.Y., Qin, Z., Song, M., Xing, K. (eds.) WASA 2011. LNCS, vol. 6843, pp. 190–201. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  6. Chaum, D.: Untraceable Electronic Mail, Return addresses, and Digital Pseudonyms. Commun. ACM 24(2), 84–88 (1981)

    Article  Google Scholar 

  7. Chaum, D.: The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability. Journal of Cryptology 1, 65–75 (1988)

    Article  MathSciNet  MATH  Google Scholar 

  8. Chen, H., Lou, W.: From Nowhere to Somewhere: Protecting End-to-End Location Privacy in Wireless Sensor Networks. In: 29th International Performance Computing and Communications Conference, IPCCC 2010, pp. 1–8. IEEE (2010)

    Google Scholar 

  9. Chen, J., Du, X., Fang, B.: An Efficient Anonymous Communication Protocol for Wireless Sensor Networks. Wireless Communications and Mobile Computing 12(14), 1302–1312 (2012)

    Article  Google Scholar 

  10. Conner, W., Abdelzaher, T., Nahrstedt, K.: Using Data Aggregation to Prevent Traffic Analysis in Wireless Sensor Networks. In: Gibbons, P.B., Abdelzaher, T., Aspnes, J., Rao, R. (eds.) DCOSS 2006. LNCS, vol. 4026, pp. 202–217. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  11. Deng, J., Han, R., Mishra, S.: Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks. Pervasive and Mobile Computing 2(2), 159–186 (2006)

    Article  Google Scholar 

  12. Deng, J., Han, R., Mishra, S.: Enhancing Base Station Security in Wireless Sensor Networks. Tech. Rep. CU-CS-951-03, University of Colorado (2003), http://www.cs.colorado.edu/~mishras/research/papers/tech03-1.pdf

  13. Gómez, C., Paradells, J., Caballero, J.E.: Sensors Everywhere: Wireless Network Technologies and Solutions. Fundación Vodafone España (2010), http://fundacion.vodafone.es/static/fichero/pre_ucm_mgmt_002618.pdf , ISBN 978-84-934740-5-8

  14. Jhumka, A., Leeke, M., Shrestha, S.: On the Use of Fake Sources for Source Location Privacy: Trade-Offs Between Energy and Privacy. The Computer Journal 54(6), 860–874 (2011)

    Article  Google Scholar 

  15. Jian, Y., Chen, S., Zhang, Z., Zhang, L.: A novel scheme for protecting receiver’s location privacy in wireless sensor networks. IEEE Transactions on Wireless Communications 7(10), 3769–3779 (2008)

    Article  Google Scholar 

  16. Jiang, J.R., Sheu, J.P., Tu, C., Wu, J.W.: An Anonymous Path Routing (APR) Protocol for Wireless Sensor Networks. Journal of Information Science and Engineering 27(2), 657–680 (2011)

    MathSciNet  Google Scholar 

  17. Kamat, P., Zhang, Y., Trappe, W., Ozturk, C.: Enhancing Source-Location Privacy in Sensor Network Routing. In: 25th IEEE International Conference on Distributed Computing Systems, ICDCS 2005, pp. 599–608 (June 2005)

    Google Scholar 

  18. Kazatzopoulos, L., Delakouridis, K., Marias, G.F.: A privacy-aware overlay routing scheme in wsns. Security and Communication Networks 4(7), 729–743 (2011)

    Article  Google Scholar 

  19. Li, Y., Lightfoot, L., Ren, J.: Routing-Based Source-Location Privacy Protection in Wireless Sensor Networks. In: IEEE International Conference on Electro/Information Technology, EIT 2009, pp. 29–34 (2009)

    Google Scholar 

  20. Li, Y., Ren, J.: Providing Source-Location Privacy in Wireless Sensor Networks. In: Liu, B., Bestavros, A., Du, D.-Z., Wang, J. (eds.) WASA 2009. LNCS, vol. 5682, pp. 338–347. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  21. Li, Y., Ren, J., Wu, J.: Quantitative measurement and design of source-location privacy schemes for wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems 23, 1302–1311 (2012)

    Article  Google Scholar 

  22. Lightfoot, L., Li, Y., Ren, J.: STaR: design and quantitative measurement of source-location privacy for wireless sensor networks. Security and Communication Networks (Online March 2012)

    Google Scholar 

  23. Mahmoud, M., Shen, X.: A Cloud-Based Scheme for Protecting Source-Location Privacy against Hotspot-Locating Attack in Wireless Sensor Networks. IEEE Transactions on Parallel and Distributed Systems 23(10), 1805–1818 (2012)

    Article  Google Scholar 

  24. Mehta, K., Liu, D., Wright, M.: Location Privacy in Sensor Networks Against a Global Eavesdropper. In: IEEE International Conference on Network Protocols, ICNP 2007, October 16-19, pp. 314–323. IEEE, Beijing (2007)

    Chapter  Google Scholar 

  25. Mehta, K., Liu, D., Wright, M.: Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper. IEEE Transactions on Mobile Computing 11(2), 320–336 (2012)

    Article  Google Scholar 

  26. Misra, S., Xue, G.: Efficient anonymity schemes for clustered wireless sensor networks. International Journal of Sensor Networks 1(1), 50–63 (2006)

    Article  Google Scholar 

  27. Nezhad, A.A., Makrakis, D., Miri, A.: Anonymous Topology Discovery for Multihop Wireless Sensor Networks. In: 3rd ACM Workshop on QoS and Security for Wireless and Mobile Networks, Q2SWinet 2007, pp. 78–85. ACM, New York (2007)

    Google Scholar 

  28. Nezhad, A.A., Miri, A., Makrakis, D.: Location privacy and anonymity preserving routing for wireless sensor networks. Computer Networks 52(18), 3433–3452 (2008)

    Article  MATH  Google Scholar 

  29. Ortolani, S., Conti, M., Crispo, B., Di Pietro, R.: Events privacy in WSNs: A new model and its applications. In: IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1–9 (June 2011)

    Google Scholar 

  30. Ouyang, Y., Le, Z., Chen, G., Ford, J., Makedon, F.: Entrapping Adversaries for Source Protection in Sensor Networks. In: 2006 International Symposium on World of Wireless, Mobile and Multimedia Networks, WOWMOM 2006, pp. 23–34. IEEE Computer Society, Washington, DC (2006)

    Chapter  Google Scholar 

  31. Ouyang, Y., Le, Z., Xu, Y., Triandopoulos, N., Zhang, S., Ford, J., Makedon, F.: Providing Anonymity in Wireless Sensor Networks. In: IEEE International Conference on Pervasive Services, pp. 145–148 (July 2007)

    Google Scholar 

  32. Ozturk, C., Zhang, Y., Trappe, W.: Source-Location Privacy in Energy-Constrained Sensor Network Routing. In: 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN, pp. 88–93. ACM, New York (2004)

    Chapter  Google Scholar 

  33. Pai, S., Bermudez, S., Wicker, S., Meingast, M., Roosta, T., Sastry, S., Mulligan, D.: Transactional Confidentiality in Sensor Networks. IEEE Security & Privacy 6(4), 28–35 (2008)

    Article  Google Scholar 

  34. Pfitzmann, A., Hansen, M.: A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management, v0.34 (August 2010), http://dud.inf.tu-dresden.de/literatur/Anon_Terminology_v0.34.pdf

  35. Pongaliur, K., Xiao, L.: Sensor Node Source Privacy and Packet Recovery Under Eavesdropping and Node Compromise Attacks. ACM Transactions on Sensor Networks 9(4), 50:1–50:26 (2013)

    Google Scholar 

  36. Proano, A., Lazos, L.: Hiding contextual information in wsns. In: IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM, pp. 1–6 (June 2012)

    Google Scholar 

  37. Proano, A., Lazos, L.: Perfect Contextual Information Privacy in WSNs under Colluding Eavesdroppers. In: 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec, April 17-19. ACM, Budapest (2013)

    Google Scholar 

  38. Reiter, M., Rubin, A.: Crowds: Anonymity for Web Transactions. ACM Transactions on Information and System Security 1(1), 66–92 (1998)

    Article  Google Scholar 

  39. Rios, R., Cuellar, J., Lopez, J.: Robust Probabilistic Fake Packet Injection for Receiver-Location Privacy in WSN. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 163–180. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  40. Rios, R., Lopez, J.: Exploiting context-awareness to enhance source-location privacy in wireless sensor networks. The Computer Journal 54(10), 1603–1615 (2011), impact Factor: 0.79

    Google Scholar 

  41. Shaikh, R., Jameel, H., d’Auriol, B., Lee, S., Song, Y.J., Lee, H.: Network Level Privacy for Wireless Sensor Networks. In: 4th International Conference on Information Assurance and Security, ISIAS 2008, pp. 261–266 (September 2008)

    Google Scholar 

  42. Shao, M., Hu, W., Zhu, S., Cao, G., Krishnamurthy, S., La Porta, T.: Cross-layer Enhanced Source Location Privacy in Sensor Networks. In: IEEE Conference on Sensor, Mesh, and Ad Hoc Communications and Networks, SECON 2009, pp. 1–9. IEEE Communications Society (June 2009)

    Google Scholar 

  43. Shao, M., Yang, Y., Zhu, S., Cao, G.: Towards Statistically Strong Source Anonymity for Sensor Networks. In: 27th IEEE Conference on Computer Communications, INFOCOM 2008, pp. 466–474 (April 2008)

    Google Scholar 

  44. Shao, M., Zhu, S., Zhang, W., Cao, G., Yang, Y.: pdcs: Security and privacy support for data-centric sensor networks. IEEE Transactions on Mobile Computing 8(8), 1023–1038 (2009)

    Article  Google Scholar 

  45. Walters, J., Liang, Z., Shi, W., Chaudhary, V.: Wireless Sensor Network Security: A Survey. In: Security in Distributed, Grid, and Pervasive Computing, pp. 367–409. Auerbach Pub. (2007)

    Google Scholar 

  46. Wang, H., Sheng, B., Li, Q.: Privacy-aware routing in sensor networks. Computer Networks 53(9), 1512–1529 (2009)

    Article  MATH  Google Scholar 

  47. Wang, H.J., Hsiang, T.R.: Defending Traffic Analysis with Communication Cycles in Wireless Sensor Networks. In: 10th International Symposium on Pervasive Systems, Algorithms, and Networks, ISPAN, pp. 166–171 (2009)

    Google Scholar 

  48. Wei-Ping, W., Liang, C., Jian-Xin, W.: A source-location privacy protocol in WSN based on locational angle. In: IEEE International Conference on Communications, ICC 2008, May 19-23, pp. 1630–1634. IEEE Communications Society, Beijing (2008)

    Google Scholar 

  49. Xi, Y., Schwiebert, L., Shi, W.: Preserving Source Location Privacy in Monitoring-Based Wireless Sensor Networks. In: 20th International Parallel and Distributed Processing Symposium, IPDPS 2006, p. 8 (April 2006)

    Google Scholar 

  50. Yang, Y., Shao, M., Zhu, S., Urgaonkar, B., Cao, G.: Towards Event Source Unobservability with Minimum Network Traffic in Sensor Networks. In: 1st ACM Conference on Wireless Network Security, WiSec 2008, pp. 77–88. ACM, New York (2008)

    Google Scholar 

  51. Yang, Y., Zhu, S., Cao, G., LaPorta, T.: An Active Global Attack Model for Sensor Source Location Privacy: Analysis and Countermeasures. In: Chen, Y., Dimitriou, T.D., Zhou, J. (eds.) SecureComm 2009. LNICST, vol. 19, pp. 373–393. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  52. Yao, J.: Source-location privacy based on directed greedy walk in wireless sensor networks. In: 2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM), pp. 1–4 (September 2010)

    Google Scholar 

  53. Yao, J., Wen, G.: Preserving source-location privacy in energy-constrained wireless sensor networks. In: Proceedings of the 28th International Conference on Distributed Computing Systems Workshops, ICDCSW 2008, pp. 412–416. IEEE Computer Society, Washington, DC (2008)

    Chapter  Google Scholar 

  54. Yao, L., Kang, L., Deng, F., Deng, J., Wu, G.: Protecting source-location privacy based on multirings in wireless sensor networks. Concurrency and Computation: Practice and Experience (Online June 2013)

    Google Scholar 

  55. Yao, L., Kang, L., Shang, P., Wu, G.: Protecting the sink location privacy in wireless sensor networks. Personal and Ubiquitous Computing, 1–11 (2012), 10.1007/s00779-012-0539-9

    Google Scholar 

  56. Ying, B., Gallardo, J.R., Makrakis, D., Mouftah, H.T.: Concealing of the Sink Location in WSNs by Artificially Homogenizing Traffic Intensity. In: The First International Workshop on Security in Computers, Networking and Communications (INFOCOM Workshops), pp. 988–993 (April 2011)

    Google Scholar 

  57. Ying, B., Makrakis, D., Mouftah, H.T.: A Protocol for Sink Location Privacy Protection in Wireless Sensor Networks. In: IEEE Global Telecommunications Conference (GLOBECOM), December 5-9, pp. 1–5. IEEE Communications Society, Houston (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Rios, R., Lopez, J., Cuellar, J. (2014). Location Privacy in WSNs: Solutions, Challenges, and Future Trends. In: Aldini, A., Lopez, J., Martinelli, F. (eds) Foundations of Security Analysis and Design VII. FOSAD FOSAD 2013 2012. Lecture Notes in Computer Science, vol 8604. Springer, Cham. https://doi.org/10.1007/978-3-319-10082-1_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-10082-1_9

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-10081-4

  • Online ISBN: 978-3-319-10082-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics