pDCS: Security and Privacy Support for Data-Centric Sensor Networks

被引:20
作者
Min Shao [1 ]
Zhu, Sencun [2 ,3 ]
Zhang, Wensheng [4 ]
Cao, Guohong [2 ]
Yi Yang [2 ]
机构
[1] Microsoft Corp, Redmond, WA 98052 USA
[2] Penn State Univ, Dept Comp Sci & Engn, University Pk, PA 16802 USA
[3] Penn State Univ, Coll Informat Sci & Technol, University Pk, PA 16802 USA
[4] Iowa State Univ, Dept Comp Sci, Ames, IA 50011 USA
基金
美国国家科学基金会;
关键词
Security; privacy; data centric; keyed Bloom Filter; wireless sensor networks; SYNCHRONIZATION;
D O I
10.1109/TMC.2008.168
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The demand for efficient data dissemination/ access techniques to find relevant data from within a sensor network has led to the development of Data-Centric Sensor (DCS) networks, where the sensor data instead of sensor nodes are named based on attributes such as event type or geographic location. However, saving data inside a network also creates security problems due to the lack of tamper resistance of the sensor nodes and the unattended nature of the sensor network. For example, an attacker may simply locate and compromise the node storing the event of his interest. To address these security problems, we present pDCS, a privacy-enhanced DCS network which offers different levels of data privacy based on different cryptographic keys. pDCS also includes an efficient key management scheme to facilitate the management of multiple types of keys used in the system. In addition, we propose several query optimization techniques based on euclidean Steiner Tree and keyed Bloom Filter (KBF) to minimize the query overhead while preserving query privacy. Finally, detailed analysis and simulations show that the KBF scheme can significantly reduce the message overhead with the same level of query delay and maintain a very high level of query privacy.
引用
收藏
页码:1023 / 1038
页数:16
相关论文
共 50 条
  • [31] Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications
    Moshaddique Al Ameen
    Jingwei Liu
    Kyungsup Kwak
    Journal of Medical Systems, 2012, 36 : 93 - 101
  • [32] Sovereign: Self-Contained Smart Home With Data-Centric Network and Security
    Zhang, Zhiyi
    Yu, Tianyuan
    Ma, Xinyu
    Guan, Yu
    Moll, Philipp
    Zhang, Lixia
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (15) : 13808 - 13822
  • [33] A Data-Centric Approach for Privacy-Aware Business Process Enablement
    Short, Stuart
    Kaluvuri, Samuel Paul
    ENTERPRISE INTEROPERABILITY, 2011, 76 : 191 - 203
  • [34] ACCESSORS A Data-Centric Permission Model for the Internet of Things
    Stach, Christoph
    Mitschang, Bernhard
    ICISSP: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, : 30 - 40
  • [35] An energy-aware data-centric generic utility based approach in wireless sensor networks
    Chen, WP
    Sha, L
    IPSN '04: THIRD INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING IN SENSOR NETWORKS, 2004, : 215 - 224
  • [36] Performance Analysis of an Efficient Data-Centric Misbehavior Detection Technique for Vehicular Networks
    Rakhi, S.
    Shobha, K. R.
    INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND COMMUNICATION TECHNOLOGIES (ICCNCT 2018), 2019, 15 : 321 - 331
  • [37] Security, Privacy, and Trustworthiness of Sensor Networks and Internet of Things
    Katsikas, Sokratis
    Gkioulos, Vasileios
    SENSORS, 2020, 20 (14) : 1 - 5
  • [38] DPAC: A New Data-Centric Privacy-Preserving Access Control Model
    Wang, Xu
    Ma, Baihe
    Liu, Ren Ping
    Oppermann, Ian
    PROVABLE AND PRACTICAL SECURITY, PROVSEC 2024, PT II, 2025, 14904 : 267 - 276
  • [39] Addressing Data-Centric Security Requirements for IoT-Based Systems
    Rodriguez, Juan D. Parra
    Schreckling, Daniel
    Posegga, Joachim
    2016 INTERNATIONAL WORKSHOP ON SECURE INTERNET OF THINGS (SIOT), 2016, : 1 - 10
  • [40] Data-centric routing in sensor networks: Single-hop broadcast or multi-hop unicast?
    Zhong, Xuan
    Khosla, Ravish
    Khanna, Gunjan
    Bagchi, Saurabh
    Coyle, Edward J.
    2007 IEEE 65TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-6, 2007, : 150 - 154