Preservation of temporal privacy in body sensor networks

Abstract Wireless body sensor networks (WBSNs) are being widely adopted as building blocks for today's medical monitoring systems. These affordable devices can effectively reduce the overall costs of medical operations and improve the quality of healthcare. Recent studies reveal that an adversary might trace the apparently insignificant traffic statistics of sensor nodes over the air and turn such data to invaluable information so as to breach the privacy of the victim sources. The preservation of patients' privacy is an indispensable requirement for such systems. Many aspects of privacy of these systems have already been studied in the literature. However, context-oriented privacy (especially temporal privacy) has gained less attention. Grounded in the queuing theory, in this paper, we present an efficient method based on time-dependent priority queue to preserve the privacy. At the same time delay constraints of the original packets are maintained and QoS of the transmitted data are not affected. All of the theoretically obtained results have been validated conducting extensive simulation experiments.

[1]  Dharma P. Agrawal,et al.  Linear wireless sensor networks: Classification and applications , 2011, J. Netw. Comput. Appl..

[2]  Seyed Pooya Shariatpanahi,et al.  A Dummy-Based Approach for Preserving Source Rate Privacy , 2016, IEEE Transactions on Information Forensics and Security.

[3]  Ashwin Machanavajjhala,et al.  Privacy-Preserving Data Publishing , 2009, Found. Trends Databases.

[4]  Benjamin C. M. Fung,et al.  Privacy-preserving data publishing , 2007 .

[5]  David W. Bates,et al.  White Paper: Personal Health Records: Definitions, Benefits, and Strategies for Overcoming Barriers to Adoption , 2006, J. Am. Medical Informatics Assoc..

[6]  Athanasios V. Vasilakos,et al.  A Survey on Ambient Intelligence in Healthcare , 2013, Proceedings of the IEEE.

[7]  Wenyuan Xu,et al.  Temporal Privacy in Wireless Sensor Networks , 2007, 27th International Conference on Distributed Computing Systems (ICDCS '07).

[8]  Sumit Ghosh,et al.  A fundamental framework for network security , 1997 .

[9]  Manjusha Pandey,et al.  Privacy Provisioning in Wireless Sensor Networks , 2014, Wirel. Pers. Commun..

[10]  Mor Harchol-Balter,et al.  Performance Modeling and Design of Computer Systems: Contents , 2013 .

[11]  Ahmad Khonsari,et al.  On the Perfect Privacy: A Statistical Analysis of Network Traffic Approach , 2016, IEEE Communications Letters.

[12]  A. Varga,et al.  THE OMNET++ DISCRETE EVENT SIMULATION SYSTEM , 2003 .

[13]  Randolph D. Nelson,et al.  Probability, stochastic processes, and queueing theory - the mathematics of computer performance modeling , 1995 .

[14]  Vitaly Shmatikov,et al.  Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses , 2006, ESORICS.

[15]  Wenyuan Xu,et al.  Temporal privacy in wireless sensor networks: Theory and practice , 2009, TOSN.

[16]  Parv Venkitasubramaniam,et al.  Preventing Timing Analysis in Networks: A Statistical Inference Perspective , 2013, IEEE Signal Processing Magazine.

[17]  Leonard Kleinrock,et al.  Time Dependent Priority Queues , 1967, Oper. Res..

[18]  Bart De Decker,et al.  Privacy-Preserving Telemonitoring for eHealth , 2009, DBSec.

[19]  Fei Hu,et al.  Privacy-Preserving Telecardiology Sensor Networks: Toward a Low-Cost Portable Wireless Hardware/Software Codesign , 2007, IEEE Transactions on Information Technology in Biomedicine.

[20]  Sheldon M. Ross Introduction to Probability Models. , 1995 .

[21]  Henk C. A. van Tilborg,et al.  Encyclopedia of Cryptography and Security, 2nd Ed , 2005 .

[22]  Cristina Nita-Rotaru,et al.  A survey of attack and defense techniques for reputation systems , 2009, CSUR.

[23]  Philip S. Yu,et al.  Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.

[24]  Grammati E. Pantziou,et al.  A k-anonymity privacy-preserving approach in wireless medical monitoring environments , 2012, Personal and Ubiquitous Computing.

[25]  Hisashi Kobayashi,et al.  System Modeling and Analysis: Foundations of System Performance Evaluation , 2008 .

[26]  Vidya Dhamdhere,et al.  A Review of Privacy Preserving Techniques in Wireless Sensor Network , 2014 .

[27]  Xiaoyan Hong,et al.  Effective probabilistic approach protecting sensor traffic , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.