Objectives for Sensing Applications in Wireless Community Networks ( Invited Paper )

Wireless Community Networks (WCN) are formed by the integration of user-operated wireless sensor networks that are internetworked by wireless mesh networks available within urban communities. WCNs enable novel applications for the members of the community. These include different sensing applications, where individuals contribute sensor data for further use within their community at large or with well-defined restrictions to certain users. Sensing application scenarios for WCNs differ from traditional sensor network applications with respect to their security and privacy requirements. In this paper, we define three representative scenarios—personal sensing, designated sensing, and community sensing. These scenarios are then studied with respect to their privacy and security implications. In particular, we identify main research questions and highlight the challenges of using various security and privacy approaches from networking and cryptography to make sensing applications in WCNs security and privacy aware. Keywords-wireless community networks, wireless mesh networks, wireless sensor networks, sensing applications, security, privacy, anonymity, access control

[1]  Dharma P. Agrawal,et al.  Adaptive state-based multi-radio multi-channel multi-path routing in Wireless Mesh Networks , 2009, Pervasive Mob. Comput..

[2]  Robert Tappan Morris,et al.  Tarzan: a peer-to-peer anonymizing network layer , 2002, CCS '02.

[3]  Djamel Djenouri,et al.  A survey of security issues in mobile ad hoc and sensor networks , 2005, IEEE Communications Surveys & Tutorials.

[4]  Delphine Christin Impenetrable obscurity vs. informed decisions: privacy solutions for Participatory Sensing , 2010, 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).

[5]  Rafail Ostrovsky,et al.  Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.

[6]  Jonathan Katz,et al.  Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products , 2008, Journal of Cryptology.

[7]  Satish Kumar,et al.  Next century challenges: scalable coordination in sensor networks , 1999, MobiCom.

[8]  Gene Tsudik,et al.  QUEST Software and , 2022 .

[9]  Wen Hu,et al.  Preserving privacy in participatory sensing systems , 2010, Comput. Commun..

[10]  Himabindu Pucha,et al.  The performance impact of traffic patterns on routing protocols in mobile ad hoc networks , 2007, Comput. Networks.

[11]  Dirk Westhoff,et al.  Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation , 2006, IEEE Transactions on Mobile Computing.