About this Journal Submit a Manuscript Table of Contents
International Journal of Distributed Sensor Networks
Volume 2012 (2012), Article ID 648058, 16 pages
http://dx.doi.org/10.1155/2012/648058
Research Article

Enhancing Sink-Location Privacy in Wireless Sensor Networks through k-Anonymity

1College of Electrical Engineering, Zhejiang University, Hangzhou 310027, China
2Department of Computer Science and Engineering, University of South Carolina, Columbia, SC 29208, USA

Received 23 May 2011; Revised 5 January 2012; Accepted 7 January 2012

Academic Editor: Yuhang Yang

Copyright © 2012 Guofei Chai et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. Y. Yang, M. Shao, S. Zhu, B. Urgaonkar, and G. Cao, “Towards event source unobservability with minimum network traffic in sensor networks,” in Proceedings of the 1st ACM Conference on Wireless Network Security (WiSec ’08), pp. 77–88, ACM, 2008.
  2. P. Kamat, Y. Zhang, W. Trappe, and C. Ozturk, “Enhancing sourcelocation privacy in sensor network routing,” in Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS ’05), pp. 599–608, IEEE Computer Society, 2005.
  3. Y. Jian, S. Chen, Z. Zhang, and L. Zhang, “Protecting receiver-location privacy in wireless sensor networks,” in Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM’07), pp. 1955–1963, 2007.
  4. K. Mehta, D. Liu, and M. Wright, “Icnp’07: location privacy in sensor networks against a global eavesdropper,” in Proceedings of the IEEE International Conference on Network Protocols, pp. 314–323, 2007.
  5. J. Deng, R. Han, and S. Mishra, “Countermeasures against traffic analysis attacks in wireless sensor networks,” in Proceedings of the 1st International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM ’05), pp. 113–126, IEEE Computer Society, 2005.
  6. Q. Gu, X. Chen, Z. Jiang, and J. Wu, “Sink-anonymity mobility control in wireless sensor network,” in Proceedings of the IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, pp. 36–41, 2009.
  7. Z. Liu and W. Xu, “Zeroing-in on network metric minima for sink location determination,” in Proceedings of the 3rd ACM conference on Wireless network security (WiSec ’10), pp. 99–104, ACM, 2010.
  8. E. C.-H. Ngai, “On providing sink anonymity for sensor networks,” in Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, pp. 269–273, ACM, 2009.
  9. J. Deng, R. Han, and S. Mishra, “Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks,” in Proceedings of the International Conference on Dependable Systems and Networks (DSN ’04), p. 637, IEEE Computer Society, 2004.
  10. A. A. Nezhad, A. Miri, and D. Makrakis, “Location privacy and anonymity preserving routing for wireless sensor networks,” Computer Networks, vol. 52, no. 18, pp. 3433–3452, 2008. View at Publisher · View at Google Scholar · View at Scopus
  11. Samarati P. and Sweeney L., “Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression,” Tech. Rep., 1998.
  12. S. B. Eisenman, E. Miluzzo, N. D. Lane, R. A. Peterson, G.-S. Ahn, and A. T. Campbell, “The bikenet mobile sensing system for cyclist experience mapping,” in Proceedings of the 5th international conference on Embedded networked Sensor Systems (SenSys ’07), pp. 87–101, ACM, New York, NY, USA, 2007.
  13. L. Krishnamurthy, R. Adler, P. Buonadonna et al., “Design and deployment of industrial sensor networks: experiences from a semiconductor plant and the north sea,” in Proceedings of the 3rd International Conference on Embedded Networked Sensor Systems (SenSys ’05), pp. 64–75, ACM, New York, NY, USA, 2005.
  14. L. Selavo, A. Wood, Q. Cao et al., “Luster: wireless sensor network for environmental research,” in Proceedings of the 5th International Conference on Embedded Networked Sensor Systems (SenSys ’07), pp. 103–116, ACM, New York, NY, USA, 2007.
  15. V. Singhvi, A. Krause, C. Guestrin, J. Garrett, and S. Matthews, “Intelligent light control using sensor networks,” in Proceedings of the 3rd International Conference on Embedded Networked Sensor Systems (SenSys ’05), pp. ACM–218, New York, NY, USA, 2005.
  16. N. Xu, S. Rangwala, K. K. Chintalapudi et al., “A wireless sensor network for structural monitoring,” in Proceedings of the Second International Conference on Embedded Networked Sensor Systems (SenSys'04), pp. 13–24, New York, NY, USA, November 2004. View at Scopus
  17. H. Chan, A. Perrig, and D. Song, “Random key predistribution schemes for sensor networks,” in EEE Symposium on Security And Privacy (SP ’03), pp. 197–213, IEEE Computer Society, May 2003. View at Scopus
  18. W. Trappe and L. Washington, Introduction to Cryptography with Coding Theory, Prentice Hall, 2002.
  19. C. L. Hwang, J. L. Williams, and L. T. Fan, Introduction to the Generalized Reduced Gradient Method, Institute for Systems Design and Optimization, 1972.
  20. O. Khatib, “Real-time obstacle avoidance for manipulators and mobile robots,” International Journal of Robotics Research, vol. 5, no. 1, pp. 90–98, 1986. View at Scopus
  21. W. Ding, G. Yan, and Z. Lin, “Self-deployment and coverage of mobile sensors within a bounded region,” in Proceedings of the Chinese Control and Decision Conference, pp. 3683–3688, 2009.
  22. Rouche N., Habets P., and Laloy M., Stability Theory by Lyapunov’s Direct Methods, Springer, 1977.
  23. D. Dimarogonas and K. Kyriakopoulos, “An inverse agreement control strategy with application to swarm dispersion,” in Proceedings of the 46th IEEE Conference on Decision and Control, pp. 6148–6153, 2007.
  24. Mixmaster Remailer, http://mixmaster.sourceforge.net/.
  25. M. Gruteser and D. Grunwald, “Anonymous usage of location-based services through spatial and temporal cloaking,” in Proceedings of the 1st International Conference on Mobile Systems, Applications and Services (MobiSys ’03), pp. 31–42, ACM, 2003.
  26. B. Hoh and M. Gruteser, “Protecting location privacy through path confusion,” in Proceedings of the 1st International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM ’05), pp. 194–205, IEEE Computer Society, 2005.
  27. Ouyang Y., Le Z., Liu D., Ford J., and Makedon F., “Source location privacy against laptop-class attacks in sensor networks,” in Proceedings of the 4th international conference on Security and Privacy in Communication Netowrks (SecureComm ’08), pp. 1–10, ACM, 2008.
  28. M. Shao, Y. Yang, S. Zhu, and G. Cao, “Towards statistically strong source anonymity for sensor networks,” in Proceedings of the 27th IEEE International Conference on Computer Communications (INFOCOM’08), pp. 51–55, 2008.
  29. W. Conner, T. Abdelzaher, and K. Nahrstedt, “Using data aggregation to prevent traffic analysis in wireless sensor networks,” in Proceedings of the International Conference on Distributed Computing in Sensor Networks (DCOSS ’06), pp. 202–217, 2006.
  30. A. Howard, M. Mataric, and G. Sukhatme, “Mobile sensor network deployment using potential fields: A distributed scalable solution to the area coverage problem,” Distributed Autonomous Robotic Systems, vol. 5, pp. 299–308, 2002.
  31. T. Balch and M. Hybinette, “Behavior-based coordination for large-scale robot formations,” in Proceedings of the 4th International Conference on Multiagent Systems, pp. 363–364, 2000.