Privacy preservation in wireless sensor networks: A state-of-the-art survey

被引:189
作者
Li, Na [1 ]
Zhang, Nan [2 ]
Das, Sajal K. [1 ]
Thuraisingham, Bhavani [3 ]
机构
[1] Univ Texas Arlington, Dept Comp Sci & Engn, Arlington, TX 76019 USA
[2] George Washington Univ, Dept Comp Sci, Washington, DC 20052 USA
[3] Univ Texas Dallas, Dept Comp Sci, Erik Jonsson Sch Engn & Comp Sci, Richardson, TX 75080 USA
关键词
Wireless sensor network; Privacy;
D O I
10.1016/j.adhoc.2009.04.009
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Much of the existing work on wireless sensor networks (WSNs) has focused on addressing the power and computational resource constraints of WSNs by the design of specific routing, MAC, and cross-layer protocols. Recently, there have been heightened privacy concerns over the data collected by and transmitted through WSNs. The wireless transmission required by a WSN, and the self-organizing nature of its architecture, makes privacy protection for WSNs an especially challenging problem. This paper provides a state-of-the-art survey of privacy-preserving techniques for WSNs. In particular, we review two main categories of privacy-preserving techniques for protecting two types of private information, data-oriented and context-oriented privacy, respectively. We also discuss a number of important open challenges for future research. Our hope is that this paper sheds some light on a fruitful direction of future research for privacy preservation in WSNs. (C) 2009 Elsevier B.V. All rights reserved.
引用
收藏
页码:1501 / 1514
页数:14
相关论文
共 37 条
[1]  
Agrawal R., 2000, Privacy-preserving data mining, P439, DOI DOI 10.1145/342009.335438
[2]  
Agrawal Rakesh, 2003, P 2003 ACM SIGMOD IN, P86, DOI DOI 10.1145/872757.872771
[3]   Wireless sensor networks: a survey [J].
Akyildiz, IF ;
Su, W ;
Sankarasubramaniam, Y ;
Cayirci, E .
COMPUTER NETWORKS, 2002, 38 (04) :393-422
[4]  
[Anonymous], 1996, Stochastic Processes
[5]   Query privacy in wireless sensor networks [J].
Carbunar, Bogdan ;
Yu, Yang ;
Shi, Larry ;
Pearce, Michael ;
Vasudevan, Venu .
2007 4TH ANNUAL IEEE COMMUNICATIONS SOCIETY CONFERENCE ON SENSOR, MESH AND AD-HOC COMMUNICATIONS AND NETWORKS, VOLS 1 AND 2, 2007, :203-212
[6]  
Chaum D., 1983, Advances in Cryptology, Proceedings of Crypto 82, P199
[7]  
CRISTOFARO ED, 2009, P 2 ACM C W IN PRESS
[8]   Countermeasures against traffic analysis attacks in wireless sensor networks [J].
Deng, J ;
Han, R ;
Mishra, S .
First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Proceedings, 2005, :113-124
[9]  
Deng J, 2004, 2004 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, P637
[10]  
DENG J, 2006, PERVASIVE MOBILE COM, V2, P159