ABSTRACT
Advances in sensor networks and mobile technologies enable the provision of improved medical services through monitoring of patients; however by recording continuously location data there is an increased privacy risk. Recording user related data requires the creation of appropriate privacy preserving policies, which often depend on the good intention of the data collector. Since it is often feasible for a malicious or negligent data provider to expose these data to an unauthorized user, one solution is to protect the patient's privacy by making difficult a linkage between specific measurements with patient's identity. In this paper we present a privacy preserving architecture which builds upon the concept of k-anonymity. While patient vital parameters can be constantly recorded with the use of sensor networks and critical events produce alerts that are notifying the medical personnel, we prevent an outsider to link the signals received with the identity of the user carrying the sensor. The collected data cannot be further used for identification of diseases or other important questions.
- P. Samarati and L. Sweeney. "Protecting Privacy when Disclosing Information: k-Anonymity and its Enforcement through Generalization and Suppression", Technical Report SRI-CSL-98-04, Computer Science Laboratory, SRI International, 1998.Google Scholar
- Hoh, B., Gruteser, M.: Protecting location privacy through path confusion. In: Securecomm, pp. 194--205 (2005) Google ScholarDigital Library
- Abbasi, A., Khonsari, A and Talebi, M. "Source location anonymity for sensor networks". In Proceedings of the 6th IEEE Conference on Consumer Communications and Networking conference (CCNC'09). IEEE Press, Piscataway, NJ, USA, 588--592, 2009 Google ScholarDigital Library
- K. Mehta, D. Liu, and M. Wright, "Location privacy in sensor networks against a global eavesdropper," ICNP, 2007.Google Scholar
- Gruteser, M., Schelle, G., Jain, A., Han, R., Grunwald, D. 2003. Privacy-aware location sensor networks. In Proceedings of the 9th Workshop on Hot Topics in Operating Systems (HotOS'03). Google ScholarDigital Library
- M. Shao, S. Zhu, W. Zhang, and G. Cao, "pDCS: Security and Privacy Support for Data-Centric Sensor Networks," IEEE INFOCOM, 2007.Google Scholar
- Priyantha, N., Chakraborty, A., and Balakrishnan, H. The Cricket Location-Support System. In Proceedings of the sixth annual international conference on Mobile computing and networking, In Proceedings of MOBICOM 2000, pages 32--43, Boston, MA, August 2000. Google ScholarDigital Library
- DiPietro, R., Mancini, L. V. and Jajodia, S. Providing secrecy in key management protocols for large wireless sensor networks, Journal of AdHoc Networks, 1, 4 (2003), 455--468.Google Scholar
- Newsome, J., Shi, R., Song, D. and Perrig, A. The Sybil attack in sensor networks: Analysis and defenses, In Proceedings of the IEEE International Conference on Information Processing in Sensor Networks, (IPSN 2004) (2004). Google ScholarDigital Library
- S. Olariu, M. Eltoweissy, and M. Younis, "ANSWER: Autonomous Wireless sensor network," in the Proceedings of the 1st ACM International Workshop on QoS and Security for Wireless and Mobile Networks (Q2SWinet'05), Montreal, Canada, October 2005. Google ScholarDigital Library
- Pfitzmann, and Köhntopp, M. Anonymity, unobservability, and pseudonymity -- a proposal for terminology. In H. Federrath, editor, DIAU'00, LNCS 2009, 2000, 1--9. Google ScholarDigital Library
- Sohrabi, K., Gao, J., Ailawadhi, V. and Pottie, G. Protocols for self-organization of a wireless sensor network, IEEE Personal Communications, 7, 5 (2000), 16--27.Google ScholarCross Ref
- B. Mamalis, D. Gavalas, C. Konstantopoulos and G. Pantziou. "Clustering in Wireless Sensor Networks". In: "RFID and Sensor Networks: Architectures, Protocols, Security and Integrations", Y. Zhang, L. T. Yang, J. Chen (Eds.), CRC Press, pp. 324--353, 2009.Google Scholar
- Ameer Ahmed Abbasi, Mohamed Younis, "A survey on clustering algorithms for wireless sensor networks", Computer Communications 30, pp. 2826--2841, 2007. Google ScholarDigital Library
- K. Xu, M. Gerla, A heterogeneous routing protocol based on a new stable clustering scheme, in: Proceeding of IEEE Military Communications Conference (MILCOM 2002), Anaheim, CA, October 2002.Google Scholar
- J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, and K. Pister. System architecture directions for network sensors. ASPLOS, pages 93{104, 2000. Google ScholarDigital Library
- Ouyang Y, Le Z, Xu Z; Triandopoulos, N.; Zhang S; Ford, J.; Makedon, F.;, "Providing Anonymity in Wireless Sensor Networks," Proceedings of the IEEE International Conference on Pervasive Services (ICPS'07), pp. 145--148, Istanbul, Turkey, July 15--20, 2007.Google ScholarCross Ref
- A. Perrig, R. Szewczyk, V. Wen, D. Culler, J. D. Tygar, SPINS: security protocols for sensor networks, Proceedings of ACM MobiCom'01, Rome, Italy, 2001, pp. 189--199. Google ScholarDigital Library
- J. Heidemann, F. Silva, C. Intanagonwiwat, R. Govindan, D. Estrin, and D. Ganesan. Building efficient wireless sensor networks with low-level naming. In SOSP, October 2001. Google ScholarDigital Library
- Protecting anonymity in wireless medical monitoring environments
Recommendations
A k-anonymity privacy-preserving approach in wireless medical monitoring environments
With the proliferation of wireless sensor networks and mobile technologies in general, it is possible to provide improved medical services and also to reduce costs as well as to manage the shortage of specialized personnel. Monitoring a person's health ...
Efficient anonymity schemes for clustered wireless sensor networks
In this paper, we propose two simple and efficient schemes for establishing anonymity in Clustered Wireless Sensor Networks (CWSNs). The first scheme Simple Anonymity Scheme (SAS), uses a range of pseudonyms as identifiers for a node to ensure ...
Breaking anonymity of some recent lightweight RFID authentication protocols
Due to their impressive advantages, Radio Frequency IDentification (RFID) systems are ubiquitously found in various novel applications. These applications are usually in need of quick and accurate authentication or identification. In many cases, it has ...
Comments