pDCS:: Security and privacy support for data-centric sensor networks

被引:22
|
作者
Shao, Min [1 ]
Zhu, Sencun [2 ]
Zhang, Wensheng [3 ]
Cao, Guohong [4 ]
机构
[1] Microsoft Corp, 1 Microsoft Way, Redmond, WA 98052 USA
[2] Penn State Univ, Coll Informat Sci & Technol, Dept Comp Sci & Engn, University Pk, PA 16802 USA
[3] Iowa State Univ Sci & Technol, Dept Comp Sci, Ames, IA 50011 USA
[4] Penn State Univ, Dept Comp Sci & Engn, University Pk, PA 16802 USA
来源
基金
美国国家科学基金会;
关键词
security; privacy; data-centric; keyed bloom filter; wireless sensor networks;
D O I
10.1109/INFCOM.2007.154
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The demand for efficient data dissemination/access techniques to find the relevant data from within a sensor network has led to the development of data-centric sensor networks (DCS), where the sensor data as contrast to sensor nodes are named based on attributes such as event type or geographic location. However, saving data inside a network also creates security problems due to the lack of tamper-resistance of the sensor nodes and the unattended nature of the sensor network. For example, an attacker may simply locate and compromise the node storing the event of his interest. To address these security problems, we present pDCS, a privacy-enhanced DCS network which offers different levels of data privacy based on different cryptographic keys. In addition, we propose several query optimization techniques based on Euclidean Steiner Tree and Keyed Bloom Filter to minimize the query overhead while providing certain query privacy. Finally, detailed analysis and simulations show that the Keyed Bloom Filter scheme can significantly reduce the message overhead with the same level of query delay and maintain a very high level of query privacy.
引用
收藏
页码:1298 / +
页数:2
相关论文
共 50 条
  • [1] pDCS: Security and Privacy Support for Data-Centric Sensor Networks
    Min Shao
    Zhu, Sencun
    Zhang, Wensheng
    Cao, Guohong
    Yi Yang
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2009, 8 (08) : 1023 - 1038
  • [2] Data-centric security: Integrating data privacy and data security
    Hennessy, S. D.
    Lauer, G. D.
    Zunic, N.
    Gerber, B.
    Nelson, A. C.
    IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2009, 53 (02)
  • [3] Data-centric security: Integrating data privacy and data security
    Hennessy, Shawn D.
    Lauer, George D.
    Zunic, Nev
    Gerber, Benjamin
    Nelson, Adam C.
    IBM Journal of Research and Development, 2009, 53 (02):
  • [4] Ubiquitous Data-Centric Sensor Networks
    Yang, Ting
    Woo, Peng-Yung
    Wang, Zhaoxia
    Taheri, Javid
    Choor, Chin Hoong
    Hu, Guoqiang
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [6] Data-centric communication strategy for wireless sensor networks
    Kuniyasu, Tetsuro
    Shigeyasu, Tetsuya
    INTERNATIONAL JOURNAL OF SPACE-BASED AND SITUATED COMPUTING, 2018, 8 (01) : 30 - 39
  • [7] Artery: A data-centric architecture for wireless sensor networks
    Lin, L
    Wu, HL
    CCCT 2003 VOL, 2, PROCEEDINGS: COMMUNICATIONS SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2003, : 270 - 275
  • [8] On Data-centric Intrusion Detection in Wireless Sensor Networks
    Riecker, Michael
    Barroso, Ana
    Hollick, Matthias
    Biedermann, Sebastian
    2012 IEEE INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND COMMUNICATIONS, CONFERENCE ON INTERNET OF THINGS, AND CONFERENCE ON CYBER, PHYSICAL AND SOCIAL COMPUTING (GREENCOM 2012), 2012, : 325 - 334
  • [9] Tinker: A tool for designing data-centric sensor networks
    Elson, Jeremy
    Parker, Andrew
    IPSN 2006: THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING IN SENSOR NETWORKS, 2006, : 350 - 357
  • [10] Efficient data-centric routing in wireless sensor networks
    Yen, HH
    Lin, FYS
    Lin, SP
    ICC 2005: IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5, 2005, : 3025 - 3029