skip to main content
10.1145/2141622.2141687acmotherconferencesArticle/Chapter ViewAbstractPublication PagespetraConference Proceedingsconference-collections
research-article

Protecting anonymity in wireless medical monitoring environments

Authors Info & Claims
Published:25 May 2011Publication History

ABSTRACT

Advances in sensor networks and mobile technologies enable the provision of improved medical services through monitoring of patients; however by recording continuously location data there is an increased privacy risk. Recording user related data requires the creation of appropriate privacy preserving policies, which often depend on the good intention of the data collector. Since it is often feasible for a malicious or negligent data provider to expose these data to an unauthorized user, one solution is to protect the patient's privacy by making difficult a linkage between specific measurements with patient's identity. In this paper we present a privacy preserving architecture which builds upon the concept of k-anonymity. While patient vital parameters can be constantly recorded with the use of sensor networks and critical events produce alerts that are notifying the medical personnel, we prevent an outsider to link the signals received with the identity of the user carrying the sensor. The collected data cannot be further used for identification of diseases or other important questions.

References

  1. P. Samarati and L. Sweeney. "Protecting Privacy when Disclosing Information: k-Anonymity and its Enforcement through Generalization and Suppression", Technical Report SRI-CSL-98-04, Computer Science Laboratory, SRI International, 1998.Google ScholarGoogle Scholar
  2. Hoh, B., Gruteser, M.: Protecting location privacy through path confusion. In: Securecomm, pp. 194--205 (2005) Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Abbasi, A., Khonsari, A and Talebi, M. "Source location anonymity for sensor networks". In Proceedings of the 6th IEEE Conference on Consumer Communications and Networking conference (CCNC'09). IEEE Press, Piscataway, NJ, USA, 588--592, 2009 Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. K. Mehta, D. Liu, and M. Wright, "Location privacy in sensor networks against a global eavesdropper," ICNP, 2007.Google ScholarGoogle Scholar
  5. Gruteser, M., Schelle, G., Jain, A., Han, R., Grunwald, D. 2003. Privacy-aware location sensor networks. In Proceedings of the 9th Workshop on Hot Topics in Operating Systems (HotOS'03). Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. M. Shao, S. Zhu, W. Zhang, and G. Cao, "pDCS: Security and Privacy Support for Data-Centric Sensor Networks," IEEE INFOCOM, 2007.Google ScholarGoogle Scholar
  7. Priyantha, N., Chakraborty, A., and Balakrishnan, H. The Cricket Location-Support System. In Proceedings of the sixth annual international conference on Mobile computing and networking, In Proceedings of MOBICOM 2000, pages 32--43, Boston, MA, August 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. DiPietro, R., Mancini, L. V. and Jajodia, S. Providing secrecy in key management protocols for large wireless sensor networks, Journal of AdHoc Networks, 1, 4 (2003), 455--468.Google ScholarGoogle Scholar
  9. Newsome, J., Shi, R., Song, D. and Perrig, A. The Sybil attack in sensor networks: Analysis and defenses, In Proceedings of the IEEE International Conference on Information Processing in Sensor Networks, (IPSN 2004) (2004). Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. S. Olariu, M. Eltoweissy, and M. Younis, "ANSWER: Autonomous Wireless sensor network," in the Proceedings of the 1st ACM International Workshop on QoS and Security for Wireless and Mobile Networks (Q2SWinet'05), Montreal, Canada, October 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Pfitzmann, and Köhntopp, M. Anonymity, unobservability, and pseudonymity -- a proposal for terminology. In H. Federrath, editor, DIAU'00, LNCS 2009, 2000, 1--9. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Sohrabi, K., Gao, J., Ailawadhi, V. and Pottie, G. Protocols for self-organization of a wireless sensor network, IEEE Personal Communications, 7, 5 (2000), 16--27.Google ScholarGoogle ScholarCross RefCross Ref
  13. B. Mamalis, D. Gavalas, C. Konstantopoulos and G. Pantziou. "Clustering in Wireless Sensor Networks". In: "RFID and Sensor Networks: Architectures, Protocols, Security and Integrations", Y. Zhang, L. T. Yang, J. Chen (Eds.), CRC Press, pp. 324--353, 2009.Google ScholarGoogle Scholar
  14. Ameer Ahmed Abbasi, Mohamed Younis, "A survey on clustering algorithms for wireless sensor networks", Computer Communications 30, pp. 2826--2841, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. K. Xu, M. Gerla, A heterogeneous routing protocol based on a new stable clustering scheme, in: Proceeding of IEEE Military Communications Conference (MILCOM 2002), Anaheim, CA, October 2002.Google ScholarGoogle Scholar
  16. J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, and K. Pister. System architecture directions for network sensors. ASPLOS, pages 93{104, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Ouyang Y, Le Z, Xu Z; Triandopoulos, N.; Zhang S; Ford, J.; Makedon, F.;, "Providing Anonymity in Wireless Sensor Networks," Proceedings of the IEEE International Conference on Pervasive Services (ICPS'07), pp. 145--148, Istanbul, Turkey, July 15--20, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  18. A. Perrig, R. Szewczyk, V. Wen, D. Culler, J. D. Tygar, SPINS: security protocols for sensor networks, Proceedings of ACM MobiCom'01, Rome, Italy, 2001, pp. 189--199. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. J. Heidemann, F. Silva, C. Intanagonwiwat, R. Govindan, D. Estrin, and D. Ganesan. Building efficient wireless sensor networks with low-level naming. In SOSP, October 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  1. Protecting anonymity in wireless medical monitoring environments

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            PETRA '11: Proceedings of the 4th International Conference on PErvasive Technologies Related to Assistive Environments
            May 2011
            401 pages
            ISBN:9781450307727
            DOI:10.1145/2141622

            Copyright © 2011 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 25 May 2011

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader