Efficient spatial privacy preserving scheme for sensor network

@article{Debnath2012EfficientSP,
  title={Efficient spatial privacy preserving scheme for sensor network},
  author={A. Debnath and P. Singaravelu and S. Verma},
  journal={Central European Journal of Engineering},
  year={2012},
  volume={3},
  pages={1-10}
}
The privacy of sensitive events observed by a wireless sensor networks (WSN) needs to be protected. Adversaries with the knowledge of sensor deployment and network protocols can infer the location of a sensed event by monitoring the communication from the sensors even when the messages are encrypted. Encryption provides confidentiality; however, the context of the event can used to breach the privacy of sensed objects. An adversary can track the trajectory of a moving object or determine the… Expand

Figures and Tables from this paper

Privacy Models in Wireless Sensor Networks: A Survey
TLDR
This paper proposes a set of guidelines to build comprehensive privacy models so as to foster their comparability and suitability analysis for different scenarios. Expand
Use of Information Technology for Falls Detection and Prevention in the Elderly
TLDR
The research found that there is potential ground for a wider use of the forms of IT used in falls prevention in the elderly in various settings and outlined the factors involved in this usage. Expand
Environmental and Economic Sustainability of Algal Lipid Extractions: An Essential Approach for the Commercialization of Algal Biofuels
The concept of algal fuels is almost half a century old. Although the idea of this seemingly ‘carbon neutral’ green fuel from a renewable resource was received with considerable interest, theExpand
Blockchain Voting : A Systematic Literature Review
The aim of the thesis is to study blockchain-based voting and its methods. In doing so, it is determined how blockchain-based voting works, which types of voting blockchain technology can be usedExpand

References

SHOWING 1-10 OF 35 REFERENCES
Temporal Privacy in Wireless Sensor Networks
TLDR
This paper proposes adaptive buffering at intermediate nodes on the source-sink routing path to obfuscate temporal information from an adversary and presents the effect of buffering on temporal privacy using an information-theoretic formulation and examines the effect that delaying packets has on buffer occupancy. Expand
Preserving Source-Location Privacy in Wireless Sensor Networks
  • Yun Li, Jian Ren
  • Computer Science
  • 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks
  • 2009
TLDR
A scheme to provide both content confidentiality and source-location privacy through routing to a randomly selected intermediate node (RRIN) and a network mixing ring (NMR), where the RRIN provides local source- Location privacy and NMR yields network-level (global) source- location privacy is proposed. Expand
Location Privacy in Sensor Networks Against a Global Eavesdropper
TLDR
This work argues that a strong adversary model, the global eavesdropper, is often realistic in practice and can defeat existing techniques and proposes two techniques that prevent the leakage of location information: periodic collection and source simulation. Expand
Preserving source location privacy in monitoring-based wireless sensor networks
While a wireless sensor network is deployed to monitor certain events and pinpoint their locations, the location information is intended only for legitimate users. However, an eavesdropper canExpand
Enhancing Source-Location Privacy in Sensor Network Routing
TLDR
This paper provides a formal model for the source-location privacy problem in sensor networks and examines the privacy characteristics of different sensor routing protocols, and devised new techniques to enhance source- location privacy that augment these routing protocols. Expand
EDPPS: An Energy-efficient Data Privacy Protection Scheme for wireless sensor networks
TLDR
Analysis and simulation results show that EDPPS has a better performance through four abstract parameters: anonymity of the sensor nodes, confidentiality, authenticity and integrity of the actual sensed data, which provides a good level for energy consumption as well as maximizing the network lifetime. Expand
Privacy preservation in wireless sensor networks: A state-of-the-art survey
TLDR
Two main categories of privacy-preserving techniques for protecting two types of private information, data-oriented and context-oriented privacy, respectively are reviewed, and a number of important open challenges for future research are discussed. Expand
Distributed Privacy-Preserving Access Control in Sensor Networks
The owner and users of a sensor network may be different, which necessitates privacy-preserving access control. On the one hand, the network owner need enforce strict access control so that theExpand
Towards event source unobservability with minimum network traffic in sensor networks
TLDR
The main idea is to introduce carefully chosen dummy traffic to hide the real event sources in combination with mechanisms to drop dummy messages to prevent explosion of network traffic. Expand
DP²AC: Distributed Privacy-Preserving Access Control in Sensor Networks
TLDR
This paper presents DP 2 AC, a Distributed Privacy- Preserving Access Control scheme for sensor networks, which is the first work of its kind and proposes a suite of distributed techniques for token-reuse detection (TRD) and thoroughly compare their performance with regard to TRD capability, communication overhead, storage overhead, and attack resilience. Expand
...
1
2
3
4
...