Privacy Notions and Review of Privacy Preservation Mechanisms in Wireless Sensor Networks

The current research work in wireless sensor networks has mostly focused on the resolving issues related to power consumption and computational resource constraints in the wireless sensor networks .To achieve the same various specific routing schemes ,MAC and cross layered protocols and techniques have been proposed and designed .But with recent advances the privacy issues related to the data collected and transmitted by the wireless sensor networks had taken the center stage .Privacy preservation in wireless sensor networks has become more challenging because of the wireless nature of communication in WSN as well as its self organizing architecture. The present paper provides a comparative review of various privacy preserving mechanisms proposed and implemented in wireless sensor networks with respect to the privacy notions of k- anonymity and L-diversity. Along with the discussion and analysis the present work is an effort for the pavement of a way towards the future research in the field of privacy preservation in WSN.

[1]  Shivakant Mishra,et al.  Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[2]  Gelareh Taban,et al.  Privacy-Preserving Integrity-Assured Data Aggregation in Sensor Networks , 2009, 2009 International Conference on Computational Science and Engineering.

[3]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[4]  Yongdae Kim,et al.  Revisiting random key pre-distribution schemes for wireless sensor networks , 2004, SASN '04.

[5]  David E. Culler,et al.  SPINS: security protocols for sensor networks , 2001, MobiCom '01.

[6]  Kui Ren,et al.  Distributed Privacy-Preserving Access Control in Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.

[7]  Jirí Kur,et al.  Location Privacy Issues in Wireless Sensor Networks , 2008, FIDIS.

[8]  C. Castelluccia,et al.  Efficient aggregation of encrypted data in wireless sensor networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.

[9]  Wenyuan Xu,et al.  Channel surfing and spatial retreats: defenses against wireless denial of service , 2004, WiSe '04.

[10]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[11]  Wang Ting-ting,et al.  Improved group-key-management scheme for WSN , 2009, 2009 ISECS International Colloquium on Computing, Communication, Control, and Management.

[12]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[13]  Roberto Di Pietro,et al.  Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks , 2006, Wirel. Networks.

[14]  Noel E. O'Connor,et al.  Low-Energy Symmetric Key Distribution in Wireless Sensor Networks , 2011, IEEE Transactions on Dependable and Secure Computing.

[15]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[16]  Berk Sunar,et al.  Public Key Cryptography in Sensor Networks - Revisited , 2004, ESAS.

[17]  Qi Shi,et al.  Applying Secure Data Aggregation techniques for a Structure and Density Independent Group Based Key Management Protocol , 2007, Third International Symposium on Information Assurance and Security.

[18]  Shivakant Mishra,et al.  Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks , 2006, Pervasive Mob. Comput..

[19]  Sajal K. Das,et al.  Privacy preservation in wireless sensor networks: A state-of-the-art survey , 2009, Ad Hoc Networks.

[20]  Kenneth E. Barner,et al.  Sensor Data Cryptography in Wireless Sensor Networks , 2008, IEEE Transactions on Information Forensics and Security.

[21]  Peter Langendörfer,et al.  In-network-aggregation as case study for a support tool reducing the complexity of designing secure wireless sensor networks , 2008, 2008 33rd IEEE Conference on Local Computer Networks (LCN).

[22]  Firdous Kausar,et al.  An efficient key distribution scheme for heterogeneous sensor networks , 2007, IWCMC.

[23]  Albert Levi,et al.  Key distribution scheme for peer-to-peer communication in mobile underwater wireless sensor networks , 2014, Peer-to-Peer Netw. Appl..