Skip to main content
Log in

Privacy Provisioning in Wireless Sensor Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Privacy is a necessary component of any security discussion. Privacy and security must be considered separately as well as together. Threads of privacy are visible throughout the procedure of building security solutions for any system. The notions for privacy also play an important role in the technical implications of privacy preservation within any network or its subsystems. Analyzing the mitigations and protections for privacy are considered in privacy notions. The privacy notions being theoretical systems and identified vulnerabilities in the sensor networks not being mapped to such privacy preservation notions necessities the analytical review of privacy provisioning in wireless sensor network (WSN) being formalized within a framework consisting or the vulnerabilities associated with each component of the network and mechanisms of privacy preservation along with the privacy notions. The current research paper provides an analytical review of the privacy provisioning in WSNs with the perspective of development of a proposed framework for privacy notions and quantitative as well as qualitative measures associated with the privacy preservation in sensor network mapped with the various techniques implemented for privacy preservation of different components of the network and the network as a whole. This analytical review has been done on the basis of set of beliefs that an adversary has while launching an attack on the network. Further the existing techniques for privacy preservation of receiver and source node location, location of sink node, traffic analysis prevention and preserving temporal privacy in WSN have been analyses on the basis of adversary’s set of beliefs’ mitigated by them and the notion of privacy implemented by these techniques like k-anonymity, l-diversity or t-closeness. The present effort aims to provide the researchers with an insight of the new concept of belief mitigation for privacy provisioning in WSN.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). A survey on sensor networks. IEEE Communications in Magazine, 40(8), 102–114.

    Article  Google Scholar 

  2. Li, N., Zhang, N., Das, S. K., & Thuraisingham, B. (2009). Privacy preservation in wireless sensor networks: A state-of-the-art survey. Ad Hoc Networks, 7(2009), 1501–1514.

    Article  Google Scholar 

  3. Deng, J., Han, R., & Mishra, S. (2005). Security, privacy, and fault tolerance in wireless sensor networks. Boston: Artech House.

    Google Scholar 

  4. Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: Attacks and countermeasures. Elsevier’s AdHoc Networks Journal, Special Issue on Sensor Network Applications and Protocols, 1(2–3), 293–315.

  5. Xu, W., Trappe, W., Zhang, Y., & Wood, T. (2005). The feasibility of launching and detecting jamming attacks in wireless networks. In ACM MobiHoc.

  6. Xu, W., Wood, T., Trappe, W., & Zhang, Y. (2004). Channel surfing and spatial retreats: Defenses against wireless denial of service. In ACM WiSe (pp. 80–89).

  7. Gaubatz, G., Kaps, J. P., & Sunar, B. (2004). Public key cryptography in sensor networks-revisited. In 1st European workshop on security in ad-hoc and sensor networks (ESAS 2004).

  8. Hwang, J., & Kim, Y. (2004). Revisiting random key pre-distribution schemes for wireless sensor networks. In Proceedings of the 2nd ACM workshop on security of ad hoc and sensor networks (SASN ’04) (pp. 43–52). New York, NY: ACM Press.

  9. Zhang, R., Zhang, Y. & Ren, K. (2009). Distributed privacy preserving access control in sensor networks. In INFOCOM 2009, IEEE (pp. 1251–1259).

  10. Perrig, A., et al. (2002). SPINS: Security protocols for sensor networks. Wireless Networks, 8(5), 521–534.

    Article  MATH  Google Scholar 

  11. Aysal, T. C., & Barner, K. E. (2008). Sensor data cryptography in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 3(2), 273–289.

    Article  Google Scholar 

  12. Ouyang, Y., Le, Z., Xu, Y., Triandopoulos, N., Zhang, S., Ford, J., et al. (2007). Providing anonymity in wireless sensor networks. In IEEE international conference on pervasive services (pp. 145–148).

  13. Xi, Y., Schwiebert, L., & Shi, W. (2006). Weisong preserving source location privacy in monitoring-based wireless sensor networks. In IEEE international parallel and distributed processing symposium. Los Alamitos, CA: IEEE Computer Society.

  14. Deng, J., Han, R., & Mishra, S. (2004). Intrusion toleranceand anti-traffic analysis strategies for wireless sensor networks. In Proceedings of the 2004 international conference on dependable systems and networks (DSN ’04) (pp. 637–646). Washington, DC: IEEE Computer Society.

  15. Ozturk, C., Zhang, Y., & Trappe, W. (2004). Source-location privacy in energy-constrained sensor network routing. In Proceedings of the 2nd ACM workshop on security of ad hoc and sensor networks (SASN ’04) (pp. 88–93). New York, NY: ACM.

  16. Deng, J., Han, R., & Mishra, S. (2005). Countermeasures against traffic analysis attacks in wireless sensor networks. In Proceedings of the first international conference on security and privacy for emerging areas in communications networks (SECURECOMM ’05) (pp. 113–126). Washington, DC: IEEE Computer Society.

  17. Xi, Y., Schwiebert, L., & Shi, W. (2006). Preserving source location privacy in monitoring-based wireless sensor networks. In IEEE international parallel and distributed processing symposium. Los Alamitos, CA: IEEE Computer Society.

  18. Syverson, P. F., Goldschlag, D. M., & Reed, M. G. (1997). Anonymous connections and onion routing. In Proceedings of the IEEE symposium on security and privacy (pp. 44–54).

  19. Xi, Y., Schwiebert, L., & Shi, W. S. (2006). Preserving source location privacy in monitoring-based wireless sensor networks. In Proceedings of the 20th international parallel and distributed processing symposium (IPDPS 2006).

  20. Hong, X., Wang, P., Kong, J., Zheng, Q., & Liu, J. (2005). Elective probabilistic approach protecting sensor traffic. In Military communications conference (MILCOM 2005) (Vol. 1, pp. 169–175). IEEE.

  21. Przydatek, B., Song, D., & Perrig, A. (2003). SIA: Secure information aggregation in sensor networks. ACM SENSYS, 255–265.

  22. He, W., Liu, X., Nguyen, H., Nahrstedt, K., & Abdelzaher, T. T. (2007). PDA: Privacy-preserving data aggregation in wireless sensor networks. In 26th IEEE international conference on computer communications (INFOCOM 2007) (pp. 2045–2053). IEEE.

  23. Kamat, P., Xu, W., Trappe, W., & Zhang, Y. (2007). Temporal privacy in wireless sensor networks. In Proceedings of the 27th international conference on distributed computing systems (ICDCS ’07) (pp. 23–30). Washington, DC: IEEE Computer Society.

  24. Li, Y., & Ren, J. (2009). Providing source-location privacy in wireless sensor networks. In Proceedings of the 4th international conference on wireless algorithms, systems, and applications (WASA ’09) (pp. 338–347). Berlin, Heidelberg: Springer.

  25. Ngai Edith, C.-H. (2009). On providing sink anonymity for sensor networks. In Proceedings of the 2009 international conference on wireless communications and mobile computing (IWCMC ’09) (pp. 269–273). New York, NY: ACM.

  26. Shaikh, R. A., Jameel, H., d’Auriol, B. J., Lee, S., Song, Y.-J., & Lee, H. (2008). Network Level privacy for wireless sensor networks. In Fourth international conference on information assurance and, security (pp. 261–266).

  27. Zhang, W., Wang, C., & Feng, T. (2008). GP2S: Generic privacy-preservation solutions for approximate aggregation of sensor data (concise contribution). In Proceedings of the 2008 sixth annual IEEE international conference on pervasive computing and communications (PERCOM ’08) (pp. 179–184). Washington, DC: IEEE Computer Society.

  28. Levis, P., Lee, N., Welsh, M., & Cullar, D. (2003). TOSSIM: Accurate and scalable simulation of entire TinyOS applications. In Proceedings of the first ACM conference on embedded networked sensor systems (SenSys 2003).

  29. Hill, J., et al. (2000). System architecture directions for networked sensors. In ASPLOS, 93.

  30. Alkhatib, A. A. A., & Baicher, G. S. (2012). Wireless sensor network architecture. In International conference on computer networks and communication systems (CNCS 2012) IPCSIT (Vol. 35). \(\copyright \) Singapore: IACSIT Press.

  31. Yuksel, E. (2011). Qualitative and quantitative security analyses for ZigBee wireless sensor networks. Ph.D. thesis. Technical University of Denmark.

  32. Cover, T. M., & Thomas, J. A. (2006). Elements of information theory (2nd ed.). ISBN: 0-471-24195-4.

  33. Sweeney, L. (2002). k-anonymity: A model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-Based Systems, 10(5), 557–570.

    Article  MATH  MathSciNet  Google Scholar 

  34. Machanavajjhala, A., Kifer, D., Gehrke, J., & Venkitasubramaniam, M. (2007). \(L\)-diversity: Privacy beyond \(k\)-anonymity. TKDD, 1(1).

  35. Li, N., & Li, T. (2007). t-closeness: Privacy beyond k-anonymity and l-diversity. In ICDE.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Manjusha Pandey.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Pandey, M., Verma, S. Privacy Provisioning in Wireless Sensor Networks. Wireless Pers Commun 75, 1115–1140 (2014). https://doi.org/10.1007/s11277-013-1411-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-013-1411-6

Keywords

Navigation