TITLE

k-anonymity Based Privacy Preserving for Data Collection in Wireless Sensor Networks

AUTHOR(S)
Kaliyamurthie, K. P.; Parameswari, D.; Udayakumar, R.
PUB. DATE
May 2013
SOURCE
Indian Journal of Science & Technology;May2013, Vol. 6 Issue 5 Supp., p4604
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
In this paper, k-anonymity notion is adopted to be used in wireless sensor networks (WSN) as a security Framework with two levels of privacy. A base level of privacy is provided for the data shared with semi trusted sink and a deeper level of privacy is provided against eavesdroppers. In the proposed method, some portions of data are encrypted and the rest is generalized. Generalization shortens the size of the data transmitted in the network causing energy saving at the cost of information loss. On the other hand, encryption provides anonymization with no information loss and without saving energy. Thus, there is a tradeoff between information loss and energy saving. In our system, this tradeoff is intelligently managed by a system parameter, which adjusts the amount of data portions to be encrypted. We use a method based on bottom up clustering that chooses the data portions to be encrypted among the ones that cause maximum information loss when generalized. In this way, a high degree of energy saving is realized within the given limits of information loss. Our analysis shows that the proposed method achieves the desired privacy levels with low information loss and with considerable energy saving.
ACCESSION #
87991867

 

Related Articles

  • Safety Data Fusion Algorithm in Wireless Sensor Network. Ruan Dian-xu; Zhang Xiao-Guang; Li Li-jun // Journal of Networks;May2013, Vol. 8 Issue 5, p1121 

    This paper presents a wireless sensor network security data fusion algorithm which has data integrity and privacy protection. Firstly, using homomorphism encryption algorithm realizes the data privacy; using the key message authentication code based on hash function guarantees the freshness of...

  • SERCID: A Secure Mechanism for Data Collection in Wireless Sensor Networks. Yuxin Mao // Journal of Digital Information Management;Apr2012, Vol. 10 Issue 2, p79 

    The unattended nature of wireless sensor networks makes them very vulnerable to malicious attacks. An adversary can physically compromise a subset of sensor nodes in a wireless sensor network to eavesdrop information. Due to some intrinsic features of wireless sensor network, it is difficult to...

  • A New Data Aggregation Scheme to Support Energy Efficiency and Privacy Preservation for Wireless Sensor Networks. Min Yoon; Yong-Ki Kim; Jae-Woo Chang // International Journal of Security & Its Applications;Jan2013, Vol. 7 Issue 1, p129 

    Because a sensor node has limited resources, such as battery capacity, data aggregation techniques have been proposed for wireless sensor networks (WSNs). On the other hand, the provision of efficient data aggregation for preserving data privacy is challenging issue in WSNs. Existing data...

  • Integrity and Privacy Preserving Data Aggregation Algorithm for WSNs. Hua Zhang // Applied Mechanics & Materials;2014, Vol. 721, p732 

    This paper proposed an integrity and privacy preserving data aggregation algorithm for WSNs, which is called IPPDA. First, it attached a group of congruent numbers to the sensing data in order to execute integrity checking operated by sink node using Chinese remainder theorem (CRT); then it...

  • EFFICIENT TIME SYNCHRONIZED ONE-TIME PASSWORD SCHEME TO PROVIDE SECURE WAKE-UP AUTHENTICATION ON WIRELESS SENSOR NETWORKS. Aljareh, Salem; Kavoukis, Anastasios // International Journal of Advanced Smart Sensor Network Systems;Jan2013, Vol. 3 Issue 1, p1 

    In this paper we propose Time Synchronized One-Time-Password scheme to provide secure wake up authentication. The main constraint of wireless sensor networks is their limited power resource that prevents us from using radio transmission over the network to transfer the passwords. On the other...

  • Comparative Analysis of the Selective Encryption Methods for Wireless Multimedia Sensor Networks. Ponomarchuk, Yu. V. // Bulletin of PNU;2013, Vol. 31 Issue 4, p65 

    This paper considers selective encryption methods for multimedia data, which were proposed for the wireless multimedia sensor networks (WMSNs) in order to support the quality of service and security requirements of the applications. Since WMSN devices are simple, cheap in terms of memory...

  • A Novel Key Management Protocol for Wireless Sensor Networks Based on PUFs. Bahrampour, Ramin; Atani, Reza Ebrahimi // International Journal of Future Generation Communication & Netwo;Apr2013, Vol. 6 Issue 2, p93 

    In this paper we focus on physical attacks on sensor nodes in a wireless sensor networks. Node capture attacks is one of the most dangerous attacks applied to WSNs which aims to capture a node in the network and try to steal some secret information. To be more specific we first survey node...

  • Encrypted Data Comparison and Aggregation for Wireless Sensor Networks. Jianghong Guo; JianFeng Ma // International Journal of Advancements in Computing Technology;Jun2012, Vol. 4 Issue 11, p42 

    Data aggregation is an important method to decrease the energy consumption of wireless sensor networks and privacy protection is another important issue for secure end-end data transmission. In most of existing data aggregation schemes for sensor networks, the encrypted data must be decrypted...

  • EFFICIENT TIME SYNCHRONIZED ONE-TIME PASSWORD SCHEME TO PROVIDE SECURE WAKE-UP AUTHENTICATION ON WIRELESS SENSOR NETWORKS. Aljareh, Salem; Kavoukis, Anastasios // International Journal of Advanced Smart Sensor Network Systems;Jan2013, Vol. 3 Issue 1, p1 

    In this paper we propose Time Synchronized One-Time-Password scheme to provide secure wake up authentication. The main constraint of wireless sensor networks is their limited power resource that prevents us from using radio transmission over the network to transfer the passwords. On the other...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics