REAL : A Reciprocal Protocol for Location Privacy in Wireless Sensor Networks
Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › peer-review
Author(s)
Related Research Unit(s)
Detail(s)
Original language | English |
---|---|
Article number | 6942208 |
Pages (from-to) | 458-471 |
Journal / Publication | IEEE Transactions on Dependable and Secure Computing |
Volume | 12 |
Issue number | 4 |
Online published | 30 Oct 2014 |
Publication status | Published - Jul 2015 |
Link(s)
Abstract
K-anonymity has been used to protect location privacy for location monitoring services in wireless sensor networks (WSNs), where sensor nodes work together to report k -anonymized aggregate locations to a server. Each k -anonymized aggregate location is a cloaked area that contains at least k persons. However, we identify an attack model to show that overlapping aggregate locations still pose privacy risks because an adversary can infer some overlapping areas with less than k persons that violates the k -anonymity privacy requirement. In this paper, we propose a reciprocal protocol for location privacy (REAL) in WSNs. In REAL, sensor nodes are required to autonomously organize their sensing areas into a set of non-overlapping and highly accurate k -anonymized aggregate locations. To confront the three key challenges in REAL, namely, self-organization, reciprocity property and high accuracy, we design a state transition process, a locking mechanism and a time delay mechanism, respectively. We compare the performance of REAL with current protocols through simulated experiments. The results show that REAL protects location privacy, provides more accurate query answers, and reduces communication and computational costs.
Research Area(s)
- aggregate locations, k-anonymity, location monitoring systems, Location privacy, wireless sensor networks
Citation Format(s)
REAL : A Reciprocal Protocol for Location Privacy in Wireless Sensor Networks. / Zhang, Jia-Dong; Chow, Chi-Yin.
In: IEEE Transactions on Dependable and Secure Computing, Vol. 12, No. 4, 6942208, 07.2015, p. 458-471.Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › peer-review