Privacy Preservation Using Logical Coordinates

Chapter
Part of the SpringerBriefs in Computer Science book series (BRIEFSCOMPUTER)

Abstract

When mobile devices are used as mobile sinks for collecting information from a deployed sensor network, the location privacy of both mobile sinks and data sources becomes very important for some applications. We present the SinkTrail and its improved version, SinkTrail-S protocol, two low-complexity, proactive data reporting protocols for privacy preserving and energy-efficient data gathering. SinkTrail uses logical coordinates for location privacy protection and to establish data reporting routes. In addition, SinkTrail is capable of accommodating multiple mobile sinks simultaneously through multiple logical coordinate spaces. It possesses desired features of geographical routing without requiring GPS devices or extra landmarks installed. SinkTrail is capable of adapting to various sensor field shapes and different moving patterns of mobile sinks. We systematically analyze energy consumptions of SinkTrail and other representative approaches and validate our analysis through extensive simulations. The results demonstrate that SinkTrail preserves location privacy as well as effectively reduces overall energy consumption. The impact of various design parameters used in SinkTrail and SinkTrail-S are investigated to provide guidance for implementation.

Keywords

Manifold 

References

  1. 1.
    Bamba, B., Liu, L., Pesti, P., Wang, T.: Supporting anonymous location queries in mobile environments with privacygrid. In: Proceedings of the 17th international conference on World Wide Web (WWW), pp. 237–246. ACM (2008)Google Scholar
  2. 2.
    Chou, C.H., Ssu, K.F., Jiau, H.C., Wang, W.T., Wang, C.: A dead-end free topology maintenance protocol for geographic forwarding in wireless sensor networks. IEEE Trans. Comput. 60, 1610–1621 (2010)Google Scholar
  3. 3.
    Coffin, D., Van Hook, D., McGarry, S., Kolek, S.: Declarative ad-hoc sensor networking. In: Proceedings of SPIE, vol. 4126, p. 109 (2000)Google Scholar
  4. 4.
    Demirbas, M., Soysal, O., Tosun, A.: Data salmon: A greedy mobile basestation protocol for efficient data collection in wireless sensor networks. Distributed Computing in Sensor Systems, pp. 267–280 (2007)Google Scholar
  5. 5.
    Deng, J., Han, R., Mishra, S.: Enhancing base station security in wireless sensor networks. Department of Computer Science, University of Colorado, Technical Report CU-CS-951-03 (2003)Google Scholar
  6. 6.
    Deng, J., Han, R., Mishra, S.: Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks. Pervasive Mobile Comput. 2(2), 159–186 (2006)CrossRefGoogle Scholar
  7. 7.
    Fodor, K., Vidács, A.: Efficient routing to mobile sinks in wireless sensor networks. In: Proceedings of the International Conference on Wireless Internet (WICON), pp. 1–7 (2007)Google Scholar
  8. 8.
    Fonseca, R., Ratnasamy, S., Zhao, J., Ee, C.T., Culler, D., Shenker, S., Stoica, I.: Beacon vector routing: Scalable point-to-point routing in wireless sensornets. In: Proceedings of NSDI, pp. 329–342 (2005)Google Scholar
  9. 9.
    Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., Tan, K.L.: Private queries in location based services: anonymizers are not necessary. In: Proceedings of the 2008 ACM SIGMOD international conference on Management of data, pp. 121–132. ACM (2008)Google Scholar
  10. 10.
    Huang, Q., Lu, C., Roman, G.: Spatiotemporal multicast in sensor networks. In: Proceedings of the ACM International Conference on Embedded Networked Sensor Systems (SenSys), p. 217. ACM (2003)Google Scholar
  11. 11.
    Intanagonwiwat, C., Govindan, R., Estrin, D.: Directed diffusion: A scalable and robust communication paradigm for sensor networks. In: Proceedings of the International Conference on Mobile Computing and Networking (MobiCom), pp. 56–67. ACM (2000)Google Scholar
  12. 12.
    Jian, Y., Chen, S., Zhang, Z., Zhang, L.: Protecting receiver-location privacy in wireless sensor networks. In: Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), pp. 1955–1963. IEEE (2007)Google Scholar
  13. 13.
    Kamat, P., Zhang, Y., Trappe, W., Ozturk, C.: Enhancing source-location privacy in sensor network routing. In: Proceedings of 25th IEEE International Conference on Distributed Computing Systems (ICDCS), pp. 599–608. IEEE (2005)Google Scholar
  14. 14.
    Karlof, C., Sastry, N., Wagner, D.: Tinysec: a link layer security architecture for wireless sensor networks. In: Proceedings of the 2nd international conference on Embedded networked sensor systems, pp. 162–175. ACM (2004)Google Scholar
  15. 15.
    Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Ad hoc Netw. 1(2), 293–315 (2003)CrossRefGoogle Scholar
  16. 16.
    Keally, M., Zhou, G., Xing, G.: Sidewinder: A predictive data forwarding protocol for mobile wireless sensor networks. In: Proceedings of the Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), pp. 1–9 (2009). doi: 10.1109/SAHCN.2009.5168972Google Scholar
  17. 17.
    Levis, P., Lee, N., Welsh, M., Culler, D.: Tossim: accurate and scalable simulation of entire tinyos applications. In: Proceedings of the 1th ACM Conference on Embedded Networked Sensor Systems (SenSys), pp. 126–137 (2003)Google Scholar
  18. 18.
    Li, Z., Wang, N., Franzen, A., Taher, P., Godsey, C., Zhang, H., Li, X.: Practical deployment of an in-field soil property wireless sensor network. Comput. Stand. Interfaces (2011)Google Scholar
  19. 19.
    Liu, B., Ke, W., Tsai, C., Tsai, M.: Constructing a message-pruning tree with minimum cost for tracking moving objects in wireless sensor networks is np-complete and an enhanced data aggregation structure. IEEE Trans. Comput. 849–863 (2008)Google Scholar
  20. 20.
    Luo, J., Hubaux, J.P.: Joint mobility and routing for lifetime elongation in wireless sensor networks. In: Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), vol. 3 (2005)Google Scholar
  21. 21.
    Ma, M., Yang, Y.: Data gathering in wireless sensor networks with mobile collectors. In: Proceedings of the IEEE International Symposium on Parallel and Distributed Processing (IPDPS), pp. 1–9 (2008). doi: 10.1109/IPDPS.2008.4536269Google Scholar
  22. 22.
    Mainwaring, A., Culler, D., Polastre, J., Szewczyk, R., Anderson, J.: Wireless sensor networks for habitat monitoring. In: Proceedings of the ACM International Workshop on Wireless Sensor Networks and Applications (WSNA), pp. 88–97. ACM, New York, NY, USA (2002)Google Scholar
  23. 23.
    Mehta, K., Liu, D., Wright, M.: Location privacy in sensor networks against a global eavesdropper. In: IEEE International Conference on Network Protocols, 2007. ICNP 2007, pp. 314–323. IEEE (2007)Google Scholar
  24. 24.
    Mehta, K., Liu, D., Wright, M.: Protecting location privacy in sensor networks against a global eavesdropper. IEEE Trans. Mobile Comput. 11(2), 320–336 (2012)CrossRefGoogle Scholar
  25. 25.
    Moscibroda, T., O’Dell, R., Wattenhofer, M., Wattenhofer, R.: Virtual coordinates for ad hoc and sensor networks. In: Proceedings of the Joint Workshop on Foundations of Mobile Computing (DIALM-POMC), pp. 8–16. ACM, New York, NY, USA (2004)Google Scholar
  26. 26.
    Ouyang, Y., Le, Z., Chen, G., Ford, J., Makedon, F.: Entrapping adversaries for source protection in sensor networks. In: Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks, pp. 23–34. IEEE Computer Society (2006)Google Scholar
  27. 27.
    Ozturk, C., Zhang, Y., Trappe, W.: Source-location privacy in energy-constrained sensor network routing. In: Workshop on Security of ad hoc and Sensor Networks: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor, networks, 25, pp. 88–93 (2004)Google Scholar
  28. 28.
    Park, T., Kim, D., Jang, S., Yoo, S., Lee, Y.: Energy efficient and seamless data collection with mobile sinks in massive sensor networks. In: Proceedings of the IEEE International Symposium on Parallel and Distributed Processing (IPDPS), pp. 1–8 (2009)Google Scholar
  29. 29.
    Rao, A., Ratnasamy, S., Papadimitriou, C., Shenker, S., Stoica, I.: Geographic routing without location information. In: Proceedings of the Annual International Conference on Mobile Computing and Networking (MobiCom), pp. 96–108. ACM New York, NY, USA (2003)Google Scholar
  30. 30.
    Saponas, T.S., Lester, J., Hartung, C., Agarwal, S., Kohno, T., et al.: Devices that tell on you: privacy trends in consumer ubiquitous computing. In: Usenix. Security vol. 3, p. 3 (2007)Google Scholar
  31. 31.
    Shah, D., Shakkottai, S.: Oblivious routing with mobile fusion centers over a sensor network. In: Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), pp. 1541–1549 (2007)Google Scholar
  32. 32.
    Somasundara, A.A., Ramamoorthy, A., Srivastava, M.B.: Mobile element scheduling for efficient data collection in wireless sensor networks with dynamic deadlines. In: Proceedings of the 25th IEEE International Real-Time Systems Symposium (RTSS), pp. 296–305. IEEE Computer Society, Washington, DC, USA (2004)Google Scholar
  33. 33.
    Soysal, O., Demirbas, M.: Data Spider: A Resilient Mobile Basestation Protocol for Efficient Data Collection in Wireless Sensor Networks. In: Proceedings of the International Conference on Distributed Computing in Sensor Systems (DCOSS). Santa Barbara, California, USA (2010)Google Scholar
  34. 34.
    Srinivasan, V., Stankovic, J., Whitehouse, K.: Protecting your daily in-home activity information from a wireless snooping attack. In: Proceedings of the 10th international conference on Ubiquitous computing, pp. 202–211. ACM (2008)Google Scholar
  35. 35.
    Yang, Y., Shao, M., Zhu, S., Urgaonkar, B., Cao, G.: Towards event source unobservability with minimum network traffic in sensor networks. In: Proceedings of the ACM Conference on Wireless Network Security (WiSec). Citeseer (2008)Google Scholar
  36. 36.
    Ye, F., Luo, H., Cheng, J., Lu, S., Zhang, L.: A two-tier data dissemination model for large-scale wireless sensor networks. In: Proceedings of the Annual International Conference on Mobile Computing and Networking (MobiCom), pp. 148–159. ACM, New York, NY, USA (2002)Google Scholar
  37. 37.
    Ye, F., Zhong, G., Lu, S., Zhang, L.: Gradient broadcast: a robust data delivery protocol for large scale sensor networks. Wireless Netw. 11(3), 285–298 (2005)CrossRefGoogle Scholar
  38. 38.
    Yu, L., Wang, N., Meng, X.: Real-time forest fire detection with wireless sensor networks. In: Proceedings of the International Conference on Wireless Communications, Networking and Mobile Computing (IWCMC), vol. 2, pp. 1214–1217. IEEE (2005)Google Scholar
  39. 39.
    Zhao, M., Ma, M., Yang, Y.: Efficient data gathering with mobile collectors and space-division multiple access technique in wireless sensor networks. IEEE Trans. Comput. (2010)Google Scholar
  40. 40.
    Zhao, M., Ma, M., Yang, Y.: Mobile data gathering with space-division multiple access in wireless sensor networks. In: Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), pp. 1283–1291 (2008)Google Scholar
  41. 41.
    Zhao, M., Yang, Y.: Bounded relay hop mobile data gathering in wireless sensor networks. IEEE Trans. Comput. (2010)Google Scholar

Copyright information

© The Author(s) 2013

Authors and Affiliations

  1. 1.University of FloridaGainesvilleUSA

Personalised recommendations