Privacy Preserving Data Gathering in Wireless Sensor Network
-
Published:
Issue:
Volume:
Page:237-251
-
ISSN:
-
Container-title:Network Security, Administration and Management
-
language:
-
Short-container-title:
Author:
Kaosar Md. Golam1, Yi Xun1
Affiliation:
1. Victoria University, Australia
Abstract
Sensor devices provide sophisticated services in collecting data in various applications, some of which are privacy sensitive; others are ordinary. This chapter emphasizes the necessity and some mechanisms of privacy preserving data gathering techniques in wireless sensor network communication. It also introduces a new solution for privacy preserving data gathering in wireless sensor networks. By using perturbation technique in a semi-trusted server model, this new solution is capable of reducing a significant amount of computation in data collection process. In this technique, data of a sensor is perturbed into two components which are unified into two semi-trusted servers. Servers are assumed not to collude each other. Neither of them have possession of any individual data. Therefore, they cannot discover individual data. There are many real life applications in which the proposed model can be applied. Moreover, this chapter also shows a technique to collect grouped data from distributed sources keeping the privacy preserved. Security proofs show that any of the servers or any individual sensor neither can discover any individual data nor can associate any data to an individual sensor. Thus, the privacy of individual data is preserved.
Reference43 articles.
1. Agrawal, R., & Srikant, R. (2000). Privacy-preserving data mining. Proceedings of ACM SIGMOD International Conference on Management of Data, (pp. 439–450). 2. Ali, M., Voigt, T., & Uzmi, Z. A. (2006). Mobility management in sensor networks. Mobility and Scalability in Wireless Sensor Networks, San Francisco, USA, June 2006. 3. Blumenthal, J., Handy, M., Golatowski, F., Haase, M., & Timmermann, D. (2003). Wireless sensor networks - new challenges in software engineering. Proceedings of ETFA '03, IEEE Conference, 16-19 Sept. 2003, vol 1, (pp. 551- 556). ISBN: 0-7803-7937-3 4. Boukerche, A., El-Khatib, K., Xu, L., & Korba, L. (2004a). SDAR: A secure distributed anonymous routing protocol for wireless and mobile ad hoc networks. In 29th Annual IEEE International Conference on Local Computer Networks, 16-18 Nov. 2004, (pp. 618– 624). 5. Boukerche, A., El-Khatib, K., Xu, L., & Korba, L. (2004b). Anonymity enabling scheme for wireless ad hoc networks. In Global Telecommunications Conference Workshops. GlobeCom Workshops 2004, (pp. 136–140).
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
|
|