Privacy preservation for WSN: A Survey

This paper presents a review of privacy-preserving techniques for wireless sensor networks (WSN). A lot of work has been done to enhance efficient use of power and resources in wireless sensor networks with the help of specific routing algorithms and different layers’ protocols. As the popularity and uses of wireless sensor network increase, privacy of individuals is of very high demand. In this paper two main categories of privacy preserving techniques for WSN have been presented, data-oriented and context-oriented. Some interesting open challenges for future research have also been introduced. This paper should provide some fruitful help for further research in privacy preservation for WSN.

[1]  Sajal K. Das,et al.  Privacy preservation in wireless sensor networks: A state-of-the-art survey , 2009, Ad Hoc Networks.

[2]  Jian Ren,et al.  Providing Source-Location Privacy in Wireless Sensor Networks , 2009, WASA.

[3]  Daniel Minoli,et al.  Wireless Sensor Networks: Technology, Protocols, and Applications , 2007 .

[4]  Donggang Liu,et al.  Location Privacy in Sensor Networks Against a Global Eavesdropper , 2007, 2007 IEEE International Conference on Network Protocols.

[5]  Jian Ren,et al.  Routing-based source-location privacy protection in wireless sensor networks , 2009, 2009 IEEE International Conference on Electro/Information Technology.

[6]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[7]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[8]  Jianying Zhou,et al.  Wireless Sensor Network Security , 2008 .

[9]  Jian Ren,et al.  Mixing Ring-Based Source-Location Privacy in Wireless Sensor Networks , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.

[10]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[11]  Basel Alomair,et al.  Statistical Framework for Source Anonymity in Sensor Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[12]  Marco Gruteser,et al.  Privacy-Aware Location Sensor Networks , 2003, HotOS.

[13]  Shivakant Mishra,et al.  Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks , 2006, Pervasive Mob. Comput..

[14]  Kui Ren,et al.  Distributed Privacy-Preserving Access Control in Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.

[15]  Xue Liu,et al.  PDA: Privacy-Preserving Data Aggregation in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[16]  Alexandre V. Evfimievski,et al.  Information sharing across private databases , 2003, SIGMOD '03.

[17]  Kui Ren,et al.  DP²AC: Distributed Privacy-Preserving Access Control in Sensor Networks , 2009, IEEE INFOCOM 2009.

[18]  Shivakant Mishra,et al.  Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks , 2004, International Conference on Dependable Systems and Networks, 2004.

[19]  Wenyuan Xu,et al.  Temporal Privacy in Wireless Sensor Networks , 2007, 27th International Conference on Distributed Computing Systems (ICDCS '07).

[20]  Hu Yan-jun Wireless Sensor Network Technology , 2006 .

[21]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[22]  Fillia Makedon,et al.  Entrapping adversaries for source protection in sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).

[23]  Wade Trappe,et al.  Source-location privacy in energy-constrained sensor network routing , 2004, SASN '04.

[24]  Yehuda Lindell,et al.  Privacy Preserving Data Mining , 2002, Journal of Cryptology.

[25]  Edith C. H. Ngai On providing sink anonymity for sensor networks , 2009, IWCMC.

[26]  Wenyuan Xu,et al.  Temporal privacy in wireless sensor networks: Theory and practice , 2009, TOSN.

[27]  Shivakant Mishra,et al.  Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).