Skip to main content

An Enhanced Data Privacy Mechanism Suitable for Ubiquitous Sensor Networks

  • Conference paper
Grid and Distributed Computing (GDC 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 261))

Included in the following conference series:

  • 1545 Accesses

Abstract

Sensor network maintains high limitation of resource because it performs many communications in order to create encryption keys. To solve this problem, this research suggests LA2EP. LA2EP Protocol can minimize resource and provides a new scheme for authentication and encryption that can provide anonymity of node for safe communication. To analyze the performance of the suggested scheme, a degree of anonymity that is provided by the scheme suggested by using an Entropy-based modeling was measured. As a result, when the suggested scheme was used, the degree of anonymity of sensor node was high. It showed that an important element to increase the degree of anonymity was to let the sensor’s ID not known correctly. Also, as a result of calculating spaces for operation, communication, and storage while considering the characteristic of sensor network, which is limited in resource, it showed suitability for sensor network environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Akkaya, K., Younis, M.: A survey on routing protocols for wireless sensor networks. Ad Hoc Networks 3, 325–349 (2005)

    Article  Google Scholar 

  2. Li, N., Zhang, N., Das, S.K., Thuraisingham, B.: Privacy preservation in wireless sensor networks: A state-of-the-art survey. Ad Hoc Networks 7(8), 1501–1514 (2009)

    Article  Google Scholar 

  3. Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Procs. of the 1st Int. Conf. on Mobile Systems, Applications and Services, pp. 31–42. ACM (2003)

    Google Scholar 

  4. Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 571–588 (2002)

    Google Scholar 

  5. Wadaa, A., Olariu, S., Wilson, L., Eltoweissy, M., Jones, K.: On providing anonymity in wireless sensor networks. In: ICPADS 2004, pp. 411–418 (2004)

    Google Scholar 

  6. Mehta, K., Liu, D., Wright, M.: Location privacy in sensor networks against a global eavesdropper. In: ICNP 2007, pp. 314–323 (2007)

    Google Scholar 

  7. Xi, Y., Schwiebert, L., Shi, W.: Preserving source location privacy in monitoring-based wireless sensor networks. In: Procs. of the 20th Int. Parallel and Distributed Processing Symposium. IEEE Computer Society (2006)

    Google Scholar 

  8. Ozturk, C., Zhang, Y., Trappe, W.: Source-location privacy in energy-constrained sensor network routing. In: Procs. of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 88–93. ACM (2004)

    Google Scholar 

  9. Misra, S., Xue, G.: Efficient anonymity schemes for clustered wireless sensor networks. IJSNet, 50–63 (2006)

    Google Scholar 

  10. Pietro, R.D., Mancini, L.V., Mei, A.: Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks. Wirel. Netw. 12(6), 709–721 (2006)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Park, JH., Jung, YH., Lee, KH., Lee, KW., Jun, MS. (2011). An Enhanced Data Privacy Mechanism Suitable for Ubiquitous Sensor Networks. In: Kim, Th., et al. Grid and Distributed Computing. GDC 2011. Communications in Computer and Information Science, vol 261. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27180-9_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27180-9_17

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-27179-3

  • Online ISBN: 978-3-642-27180-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics