• DocumentCode
    21720
  • Title

    REAL: A Reciprocal Protocol for Location Privacy in Wireless Sensor Networks

  • Author

    Jia-Dong Zhang ; Chi-Yin Chow

  • Author_Institution
    Dept. of Comput. Sci., City Univ. of Hong Kong, Hong Kong, China
  • Volume
    12
  • Issue
    4
  • fYear
    2015
  • fDate
    July-Aug. 1 2015
  • Firstpage
    458
  • Lastpage
    471
  • Abstract
    K-anonymity has been used to protect location privacy for location monitoring services in wireless sensor networks (WSNs), where sensor nodes work together to report k-anonymized aggregate locations to a server. Each k-anonymized aggregate location is a cloaked area that contains at least k persons. However, we identify an attack model to show that overlapping aggregate locations still pose privacy risks because an adversary can infer some overlapping areas with less than k persons that violates the k-anonymity privacy requirement. In this paper, we propose a reciprocal protocol for location privacy (REAL) in WSNs. In REAL, sensor nodes are required to autonomously organize their sensing areas into a set of non-overlapping and highly accurate k-anonymized aggregate locations. To confront the three key challenges in REAL, namely, self-organization, reciprocity property and high accuracy, we design a state transition process, a locking mechanism and a time delay mechanism, respectively. We compare the performance of REAL with current protocols through simulated experiments. The results show that REAL protects location privacy, provides more accurate query answers, and reduces communication and computational costs.
  • Keywords
    data privacy; protocols; sensor placement; wireless sensor networks; K-anonymity; K-anonymized aggregate locations; REAL; attack model; location privacy; locking mechanism; overlapping aggregate locations; reciprocal protocol; state transition process; time delay mechanism; wireless sensor networks; Aggregates; Monitoring; Peer-to-peer computing; Privacy; Sensors; Servers; Wireless sensor networks; Location privacy; aggregate locations; k-anonymity; location monitoring systems; wireless sensor networks;
  • fLanguage
    English
  • Journal_Title
    Dependable and Secure Computing, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1545-5971
  • Type

    jour

  • DOI
    10.1109/TDSC.2014.2366467
  • Filename
    6942208