CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

Privacy preservation for WSN: A Survey

by Prakhar Gupta, Meenu Chawla
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 48 - Number 3
Year of Publication: 2012
Authors: Prakhar Gupta, Meenu Chawla
10.5120/7326-0159

Prakhar Gupta, Meenu Chawla . Privacy preservation for WSN: A Survey. International Journal of Computer Applications. 48, 3 ( June 2012), 11-16. DOI=10.5120/7326-0159

@article{ 10.5120/7326-0159,
author = { Prakhar Gupta, Meenu Chawla },
title = { Privacy preservation for WSN: A Survey },
journal = { International Journal of Computer Applications },
issue_date = { June 2012 },
volume = { 48 },
number = { 3 },
month = { June },
year = { 2012 },
issn = { 0975-8887 },
pages = { 11-16 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume48/number3/7326-0159/ },
doi = { 10.5120/7326-0159 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:43:06.490688+05:30
%A Prakhar Gupta
%A Meenu Chawla
%T Privacy preservation for WSN: A Survey
%J International Journal of Computer Applications
%@ 0975-8887
%V 48
%N 3
%P 11-16
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper presents a review of privacy-preserving techniques for wireless sensor networks (WSN). A lot of work has been done to enhance efficient use of power and resources in wireless sensor networks with the help of specific routing algorithms and different layers' protocols. As the popularity and uses of wireless sensor network increase, privacy of individuals is of very high demand. In this paper two main categories of privacy preserving techniques for WSN have been presented, data-oriented and context-oriented. Some interesting open challenges for future research have also been introduced. This paper should provide some fruitful help for further research in privacy preservation for WSN.

References
  1. I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci. Wireless sensor networks: a Survey: Computer Networks 38 (4) (2002) 393–422.
  2. K. Sohraby, D. Minoli and T. Znati. Wireless Sensor Network: Technology, Protocols and Applications: John Wiley & Sons, 2007,pg10-11.
  3. C. Ozturk, Y. Zhang, and W. Trappe. Source-location privacy in energy constrained sensor network routing: In Proceedings of the 2nd ACM workshop on Security of Ad hoc and Sensor Networks, 2004.
  4. M. Gruteser, G. Schelle, A. Jain, R. Han, and D. Grunwald. Privacy-aware location sensor networks: In 9th USENIX Workshop on Hot Topics in Operating Systems (HotOS IX), 2003.
  5. Na Li, Nan Zhang, Sajal K. Das, and Bhavani Thuraisingham. Privacy preservation in wireless sensor networks: A state-of-the-art survey. Ad Hoc Networks 7 (2009) 1501–1514.
  6. John Paul Walters, Zhengqiang Liang, Weisong Shi, and Vipin Chaudhary. Wireless Sensor Network Security: A Survey:Security in Distributed, Grid, and Pervasive Computing Yang Xiao,(Eds. ) Auerbach Publications, CRC Press.
  7. R. Agrawal, A. Evfimievski, R. Srikant, Information sharing across private databases, in: Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data, 2003, pp. 86–97.
  8. R. Agrawal, R. Srikan, Privacy-preserving data mining, in: Proceedings of the 2000 ACM SIGMOD on Management of Data, Dallas, TX USA, May 15–18, 2000, pp. 439–450.
  9. L. Sweeney, K-anonymity: a model for protecting privacy, International Journal on Uncertainty, Fuzziness and Knowledgebased Systems 2 (2) (2002) 557–570. pp. 86–97.
  10. L. Eschenauer and V. D. Gligor, "A key-management scheme for distributed sensor networks," in Proceedings of the 9th ACM Conference on Computer and Communications Security, November 2002, pp. 41–47.
  11. D. Liu and P. Ning, "Establishing pairwise keys in distributed sensor networks," in Proceedings of 10th ACM Conference on Computer and Communications Security (CCS03), October 2003, pp. 52–61.
  12. W. B. He, X. Liu, H. Nguyen, K. Nahrstedt, T. Abdelzaher, PDA: privacy-preserving data aggregation in wireless sensor networks, in: Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM 2007), May 2007, pp. 2045–2053.
  13. R. Zhang, Y. Zhang, K. Ren, DP^2AC: distributed privacy-preserving access control in sensor networks, to appear in: Proceedings of the 28th IEEE International Conference on Computer Communications (INFOCOM 2009), pp. 1298–1306.
  14. Jean-Franois Raymond. Tra_c analysis: Protocols, attacks, design issues and open problems. In Proceedings of International Workshop on Design Issues in Anonymity and Unobservability, pages 10{29. Springer- Verlag New York, Inc. , 2001.
  15. Pandurang Kamat, Wenyuan Xu, Wade Trappe, and Yanyong Zhang. Temporal privacy in wireless sensor networks. In ICDCS '07: Proceedings of the 27th International Conference on Distributed computing Systems, pages 23-30, Washington, DC, USA, 2007. IEEE Computer Society.
  16. Pandurang Kamat, Wenyuan Xu, Wade Trappe, and Yanyong Zhang. Temporal privacy in wireless sensor networks: Theory and practice. ACM Transactions on Sensor Networks, 5(4):1-24, 2009.
  17. Celal Ozturk, Yanyong Zhang, and Wade Trappe. Source-location privacy in energy-constrained sensor network routing. In SASN '04: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, pages 88-93, New York, NY, USA, 2004. ACM.
  18. Yun Li and Jian Ren. Providing source-location privacy in wireless sensor networks. In WASA '09: Proceedings of the 4th International Conference on Wireless Algorithms, Systems, and Applications, pages 338-347, Berlin, Heidelberg, 2009. Springer-Verlag.
  19. Yun Li, Leron Lightfoot, and Jian Ren. Routing-based source-location privacy protection in wireless sensor networks. In IEEE International Conference on Electro/Information Technology, 2009, pages 29-34, 2009.
  20. Yun Li and Jian Ren. Mixing ring-based source-location privacy in wireless sensor networks. In International Conference on Computer Communications and Networks, pages 1-6, Los Alamitos, CA, USA, 2009. IEEE Computer Society.
  21. Yi Ouyang, Zhengyi Le, Guanling Chen, James Ford, and Fillia Makedon. Entrapping adversaries for source protection in sensor networks. In WOWMOM '06: Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks, pages 23-34,Washington, DC, USA, 2006. IEEE Computer Society.
  22. Celal Ozturk, Yanyong Zhang, and Wade Trappe. Source-location privacy in energy-constrained sensor network routing. In SASN '04: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, pages 88-93, New York, NY, USA, 2004. ACM.
  23. K. Mehta, Donggang Liu, and M. Wright. Location privacy in sensor networks against a global eavesdropper. In IEEE International Conference on Network Protocols, 2007. ICNP 2007, pages 31-323, October 2007.
  24. Basel Alomair, Andrew Clark, Jorge Cuellar, and Radha Poovendran. Statistical framework for source anonymity in sensor networks. Technical Report 3, Network Security Lab (NSL), College of Engineering, University of Washington, 2009.
  25. Jing Deng, Richard Han, and Shivakant Mishra. Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks. In DSN '04: Proceedings of the 2004 International Conference on Dependable Systems and Networks, pages 637-646, Washington, DC, USA, 2004. IEEE Computer Society.
  26. Jing Deng, Richard Han, and Shivakant Mishra. Countermeasures against traffic analysis attacks in wireless sensor networks. In SECURECOMM '05: Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, pages 113-126, Washington, DC, USA, 2005. IEEE Computer Society.
  27. Jing Deng, Richard Han, and Shivakant Mishra. Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks. Pervasive and Mobile Computing, 2(2):159-186, April 2006.
  28. Edith C. -H. Ngai. On providing sink anonymity for sensor networks. In IWCMC '09: Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing, pages 269-273, New York, NY, USA, 2009. ACM.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Sensor Network Privacy Data Mining