Skip to main content

Multiple Target Localisation in Sensor Networks with Location Privacy

  • Conference paper
Security and Privacy in Ad-hoc and Sensor Networks (ESAS 2007)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 4572))

Included in the following conference series:

Abstract

It is now well known that data-fusion from multiple sensors can improve detection and localisation of targets. Traditional data fusion requires the sharing of detailed data from multiple sources. In some cases, the various sources may not be willing to share such detailed information. For instance, current military allies may be willing to share some level of information, but only if they can do so without revealing their secrets. This situation appears relevant for modern sensor networks, which may be comprised of networks from multiple participants. It has previously been shown that localisation of a single target can be performed while preserving location privacy of the sensor nodes. Here we extend this to the case of multiple targets. The novel aspect of the problem is related to the ambiguity in target labels, and how we resolve this ambiguity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Atallah, M., Bykova, M., Li, J., Frikken, K., Topkara, M.: Private collaborative forecasting and benchmarking. In: Proc. of the ACM Workshop on Privacy in the Electronic Society (WPES 2004), Washington, DC (October 2004)

    Google Scholar 

  2. Benaloh, J.: Secret sharing homomorphisms: Keeping shares of a secret secret. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 251–260. Springer, Heidelberg (1987)

    Google Scholar 

  3. Brickell, J., Shmatikov, V.: Privacy-preserving graph algorithms in the semi-honest model. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 236–252. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  4. Clifton, C., Kantarcioglu, M., Vaidya, J., Lin, X., Zhu, M.: Tools for privacy preserving distributed data mining. In: SIGKDD Explorations, vol. 4(2) (December 2002)

    Google Scholar 

  5. Patwari, N., Hero, A.O., Costa, J.A.: Learning Sensor Location from Signal Strength and Connectivity. Springer, Heidelberg, 2006 (to appear)

    Google Scholar 

  6. Roughan, M., Arnold, J.: Data fusion without data fusion: localization and tracking without sharing sensitive information. In: Information, Decision and Control (IDC), Adelaide, Australia (February 2007)

    Google Scholar 

  7. Roughan, M., Zhang, Y.: Secure distributed data-mining and its application to large-scale network measurements. SIGCOMM Comput. Commun. Rev. 36(1), 7–14 (2006)

    Article  Google Scholar 

  8. Shang, Y., Ruml, W., Zhang, Y., Fromherz, M.: Localization from mere connectivity. In: MobiHoc 2003, Annapolis, Maryland (2003)

    Google Scholar 

  9. Verykios, V.S., Bertino, E., Fovino, I.N., Provenza, L.P., Saygin, Y., Theodoridis, Y.: State-of-the-art in privacy preserving data mining. SIGMOD Record 33(1), 50–57 (2004)

    Article  Google Scholar 

  10. Yao, A.: Protocols for secure computations. In: Proc. of the 23th IEEE Symposium on Foundations of Computer Science (FOCS), pp. 160–164 (1982)

    Google Scholar 

  11. Yao, A.: How to generate and exchange secrets. In: Proc. of the 27th IEEE Symposium on Foundations of Computer Science (FOCS), pp. 162–167 (1986)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Frank Stajano Catherine Meadows Srdjan Capkun Tyler Moore

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Roughan, M., Arnold, J. (2007). Multiple Target Localisation in Sensor Networks with Location Privacy. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds) Security and Privacy in Ad-hoc and Sensor Networks. ESAS 2007. Lecture Notes in Computer Science, vol 4572. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73275-4_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-73275-4_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-73274-7

  • Online ISBN: 978-3-540-73275-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics