Providing Source Location Privacy in Wireless Sensor Networks: A Survey

被引:124
|
作者
Conti, Mauro [1 ]
Willemsen, Jeroen [2 ]
Crispo, Bruno [3 ]
机构
[1] Univ Padua, I-35100 Padua, Italy
[2] Vrije Univ Amsterdam, Amsterdam, Netherlands
[3] Univ Trento, Dept Comp Sci & Informat Engn, Trento, Italy
来源
关键词
WSN Privacy; Location privacy; Source location privacy; Context privacy; CONCEALED DATA AGGREGATION; RANDOM FORWARDING GERAF; AD HOC; SECURITY; ENERGY; PRESERVATION; ANONYMITY; PROTOCOL; CONFIDENTIALITY; COMMUNICATION;
D O I
10.1109/SURV.2013.011413.00118
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks (WSNs) consist of numerous small nodes that can sense, collect, and disseminate information for many different types of applications. One of these applications is subject tracking and monitoring, in which the monitored subjects often need protection. For instance, a WSN can be deployed to monitor the movement of a panda in a national park. The panda needs protection from different adversaries, such as hunters and poachers. An adversary might trace the messages in the WSN to find the source node that sensed the panda, with the final aim of killing the panda. Hence the question is: how do we hide the location of the source node from the adversary? This question is relevant in several of the scenarios related to this application, such as patient monitoring and battlefield surveillance. In other words, the problem is to provide privacy to the source node: source location privacy. In this paper, we provide a survey of the state of the art in source location privacy. We first discuss the key concepts in source location privacy, such as anonymity, unobservability, safety period, and capture likelihood. Then, we present an overview of the solutions that provide source location privacy within a WSN, in relation to the assumptions about the adversary's capabilities. In particular, we summarize the concepts and solutions, which are categorized based on the core techniques used to provide source location privacy. We mention the limitations of the algorithms as found in the literature, classify the solutions based on their approach, and provide an overview of the assumptions on the adversarial capabilities related to each solution.
引用
收藏
页码:1238 / 1280
页数:43
相关论文
共 50 条
  • [31] Dynamic routing approach for enhancing source location privacy in wireless sensor networks
    Gulshan Kumar
    Rajkumar Singh Rathore
    Kutub Thakur
    Ahmad Almadhor
    Sardar Asad Ali Biabani
    Subhash Chander
    Wireless Networks, 2023, 29 : 2591 - 2607
  • [32] Protecting source-location privacy based on multirings in wireless sensor networks
    Yao, Lin
    Kang, Lin
    Deng, Fangyu
    Deng, Jing
    Wu, Guowei
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (15): : 3863 - 3876
  • [33] PTSLP: Position Tracking Based Source Location Privacy for Wireless Sensor Networks
    Wang, Hao
    Han, Guangjie
    Zhu, Chunsheng
    Chan, Sammy
    RADIO FREQUENCY IDENTIFICATION AND IOT SECURITY, 2017, 10155 : 17 - 29
  • [34] A Novel Routing Strategy to Provide Source Location Privacy in Wireless Sensor Networks
    LI Shuming
    XIAO Yan
    LIN Qiaomin
    QI Zhuzhu
    WuhanUniversityJournalofNaturalSciences, 2016, 21 (04) : 298 - 306
  • [35] Routing-Based Source-Location Privacy in Wireless Sensor Networks
    Ren, Jian
    Li, Yun
    Li, Tongtong
    2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, 2009, : 620 - 624
  • [36] Dynamic routing approach for enhancing source location privacy in wireless sensor networks
    Kumar, Gulshan
    Rathore, Rajkumar Singh
    Thakur, Kutub
    Almadhor, Ahmad
    Biabani, Sardar Asad Ali
    Chander, Subhash
    WIRELESS NETWORKS, 2023, 29 (06) : 2591 - 2607
  • [37] Credit Routing for Source-location Privacy Protection in Wireless Sensor Networks
    Lu, Zongqing
    Wen, Yonggang
    9TH IEEE INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS (MASS 2012), 2012, : 164 - 172
  • [38] Location Privacy Issues in Wireless Sensor Networks
    Kur, Jiri
    Stetsko, Andriy
    FUTURE OF IDENTITY IN THE INFORMATION SOCIETY, 2009, : 160 - 169
  • [39] Combining Source-Location Privacy and Routing Efficiency in Wireless Sensor Networks
    Ren, Jian
    Tang, Di
    2011 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE (GLOBECOM 2011), 2011,
  • [40] Enhancing Source Location Privacy in Energy-Constrained Wireless Sensor Networks
    Tan, Guangbao
    Li, Wei
    Song, Jie
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSAIT 2013), 2014, 255 : 279 - 289