Abstract
Playing a vital role in the period of big data and intelligent life, wireless sensor networks (WSN) transmits a bulk of data. Location information as the vital data in transmission is widely used in detecting and routing for the network. With the big data mining and analysis, the security of location and data privacy in WSN faces great challenges. To the problem of active attacking like node capture in wireless sensor network node location privacy, existing location privacy preserving protocols are analyzed and Differential Location Privacy protocol based on Clustering Anonymization is proposed. By sensor nodes clustering using genetic clustering algorithm, the individual location is hidden in the statistical location information of the group. The Laplace Mechanism is also added to the protocol to realize differential location privacy. Node location privacy in WSN is preserved as well as privacy preserving budget is saved. The result of theoretical analysis and contrastive simulation experience shows that the protocol can be useful.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Li-min, S., Yuang, Z., Qing-chao, L., et al.: Fundamentals of wireless sensor networks, Tsinghua University, Beijing, pp. 3–13 (2014)
Feng, H., Hong-wei, C., Zong-ke, J., Ti-jiang, S., et al.: Review of recent progress on wireless sensor network applications. J. Comput. Res. Dev. 47(S2), 81–87 (2010)
Ynag, X., Ma, K.: Evolution of wireless sensor network security. In: World Automation Congress, pp. 1–5 (2016)
Peng, H., Chen, H., Zhang, X.-Y., et al.: Location privacy preservation in wireless sensor networks. J. Softw. 26(3), 617–639 (2015)
Cheng, L., Wang, Y., Wu, H., et al.: Non-parametric location estimation in rough wireless environments for wireless sensor network. Sens. Actuators, A 224, 57–64 (2015)
Groat, M., He, W., Forrest, S.: KIPDA: k-indistinguishable privacy-preserving data aggregation in wireless sensor networks. In: Proceedings of the INFOCOM, pp. 2024–2032. IEEE (2011)
Babar, S.A., Prasad, N., et al.: Proposed embedded security framework for Internet of Things (IoT). In: The Wireless Communication, Vehicular Technology, pp. 1–5 (2011)
Ozturk, C., Zhang, Y., Trappe, W.: Source-location privacy in energy-constrained sensor network routing. In: The 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 88–93 (2004)
Juan, C., Bin-xing, F., Li-hua, Y., et al.: A source-location privacy preservation protocol in wireless sensor networks using source- based restricted flooding. Chin. J. Comput. 33(9), 1736–1747 (2010)
Fu-zhi, X.: Research and Implementation of Location Privacy Protection Solution in Wireless Sensor Network. University of Electronic Science and Technology of China, Chengdu (2014)
Jiangnan, Z., Chun-liang, C.: A Scheme to protect the source location privacy in wireless sensor networks. Chin. J. Sens. Actuators 29(9), 1405–1409 (2016)
Shao, M., Yang, Y., Zhu, S., et al.: Towards statistically strong source anonymity for sensor networks. In: The 27th Conference on Computer Communications, pp. 51–55 (2008)
Xiao-yan, H.: Research on the source-location privacy in wireless sensor networks against a global eavesdropper. Central South University, Changsha (2014)
Xiaoguang, N., Chuan-bo, W., Ya-lan, Y.: Energy-consumption-balanced efficient source-location privacy preserving protocol in WSN. J. Commun. 37(4), 23–33 (2016)
Ji-xiang, S.: Modern Pattern Recognition, pp. 16–40. Higher Education Press, Beijing (2016)
Kumar, K.A, Rangan, C.P.: Privacy preserving DBSCAN algorithm for clustering. In: Proceedings of Advanced Data Mining and Applications, Third International Conference, ADMA 2007, Harbin, China, 6–8 August 2007, DBLP, pp. 57-68 (2007)
Xiao-qian, L., Qian-mu, L.: Differentially private data release based on clustering anonymization. J. Commun. 37(5), 125–129 (2016)
Min-rui, C., Hui-hui, F.: Efficient (K,L)-anonymous privacy protection based on clustering. Comput. Eng. 41(01), 139–142 + 163 (2015)
Zhao-yan, M.: Research on anonymous privacy protection algorithm based on clustering, Xi’an University of Technology (2017)
Dwork, C.: Differential privacy. In: Proceedings of the 33rd International Colloquium on Automata, Languages and Programming, Venice, Italy, pp. 1–12 (2006)
Dwork, C.: A firm foundation for private data analysis. Commun. ACM 54(1), 86–95 (2011)
Ping, X., Tian-qing, Z., Xiao-feng, W.: A survey on differential privacy and applications. Chin. J. Comput. 37(1), 101–122 (2014)
Dwork, C., McSherry, F., Nissim, K., et al.: Calibrating noise to sensitivity in private data analysis. In: Proceedings of the 3rd Conference on Theory of Cryptography, New York, USA, pp. 265–284 (2006)
Hardt, M., Rothblum, G.N.: A multiplicative weights mechanism for privacy-preserving data analysis. In: IEEE, Symposium on Foundations of Computer Science, pp. 61–70. IEEE Computer Society (2010)
Xue-jun, Z., Xiao-lin, G., Jing-hua, J.: A user-centric location privacy-preserving method with differential perturbation for location-based services. J. Xi’an Jiao-tong Univ. 50(12), 79–86 (2016)
Wei-jun, Z., Qing-huang, Y., Wei-dong, Y., et al.: Trajectory privacy preserving based on statistical differential privacy. J. Comput. Res. Develop. 54(12), 2825–2832 (2017)
Huo-wen, J., Guo-sun, Z., Ke-kun, H.: A graph-clustering anonymity method implemented by genetic algorithm for privacy-preserving. J. Comput. Res. Develop. 53(10), 2354–2364 (2016)
Mcsherry, F.D.: Privacy integrated queries: an extensible platform for privacy-preserving data analysis. In: The 2009 ACM SIGMOD International Conference on Management of Data. Providence, pp. 19–30. ACM, Rhode Island (2009)
Yu-hong, W.: General overview on clustering algorithms. Comput. Sci. 42(S1), 491–499 + 524 (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Huang, Rj., Ye, Q., Li, MC. (2019). Clustering-Anonymization-Based Differential Location Privacy Preserving Protocol in WSN. In: Jin, H., Lin, X., Cheng, X., Shi, X., Xiao, N., Huang, Y. (eds) Big Data. BigData 2019. Communications in Computer and Information Science, vol 1120. Springer, Singapore. https://doi.org/10.1007/978-981-15-1899-7_13
Download citation
DOI: https://doi.org/10.1007/978-981-15-1899-7_13
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-1898-0
Online ISBN: 978-981-15-1899-7
eBook Packages: Computer ScienceComputer Science (R0)