Achieving network level privacy in wireless sensor networks

Riaz Ahmed Shaikh, Hassan Jameel, Brian J. d'Auriol, Heejo Lee, Sungyoung Lee, Young Jae Song

Research output: Contribution to journalArticle

33 Citations (Scopus)

Abstract

Full network level privacy has often been categorized into four sub-categories: Identity, Route, Location and Data privacy. Achieving full network level privacy is a critical and challenging problem due to the constraints imposed by the sensor nodes (e.g., energy, memory and computation power), sensor networks (e.g., mobility and topology) and QoS issues (e.g., packet reach-ability and timeliness). In this paper, we proposed two new identity, route and location privacy algorithms and data privacy mechanism that addresses this problem. The proposed solutions provide additional trustworthiness and reliability at modest cost of memory and energy. Also, we proved that our proposed solutions provide protection against various privacy disclosure attacks, such as eavesdropping and hop-by-hop trace back attacks.

Original languageEnglish
Pages (from-to)1447-1472
Number of pages26
JournalSensors
Volume10
Issue number3
DOIs
Publication statusPublished - 2010 Mar 1

Fingerprint

privacy
Data privacy
Privacy
Wireless sensor networks
Data storage equipment
sensors
Sensor nodes
Sensor networks
Humulus
Quality of service
Topology
attack
routes
Costs
Aptitude
Disclosure
topology
costs
Costs and Cost Analysis
energy

Keywords

  • Anonymity
  • Eavesdropping
  • Hop-by-hop trace back
  • Privacy
  • Routing
  • Wireless sensor networks

ASJC Scopus subject areas

  • Electrical and Electronic Engineering
  • Atomic and Molecular Physics, and Optics
  • Analytical Chemistry
  • Biochemistry
  • Medicine(all)

Cite this

Shaikh, R. A., Jameel, H., d'Auriol, B. J., Lee, H., Lee, S., & Song, Y. J. (2010). Achieving network level privacy in wireless sensor networks. Sensors, 10(3), 1447-1472. https://doi.org/10.3390/s100301447

Achieving network level privacy in wireless sensor networks. / Shaikh, Riaz Ahmed; Jameel, Hassan; d'Auriol, Brian J.; Lee, Heejo; Lee, Sungyoung; Song, Young Jae.

In: Sensors, Vol. 10, No. 3, 01.03.2010, p. 1447-1472.

Research output: Contribution to journalArticle

Shaikh, RA, Jameel, H, d'Auriol, BJ, Lee, H, Lee, S & Song, YJ 2010, 'Achieving network level privacy in wireless sensor networks', Sensors, vol. 10, no. 3, pp. 1447-1472. https://doi.org/10.3390/s100301447
Shaikh RA, Jameel H, d'Auriol BJ, Lee H, Lee S, Song YJ. Achieving network level privacy in wireless sensor networks. Sensors. 2010 Mar 1;10(3):1447-1472. https://doi.org/10.3390/s100301447
Shaikh, Riaz Ahmed ; Jameel, Hassan ; d'Auriol, Brian J. ; Lee, Heejo ; Lee, Sungyoung ; Song, Young Jae. / Achieving network level privacy in wireless sensor networks. In: Sensors. 2010 ; Vol. 10, No. 3. pp. 1447-1472.
@article{47d1daf7f08c456a8ed3953a7eb938aa,
title = "Achieving network level privacy in wireless sensor networks",
abstract = "Full network level privacy has often been categorized into four sub-categories: Identity, Route, Location and Data privacy. Achieving full network level privacy is a critical and challenging problem due to the constraints imposed by the sensor nodes (e.g., energy, memory and computation power), sensor networks (e.g., mobility and topology) and QoS issues (e.g., packet reach-ability and timeliness). In this paper, we proposed two new identity, route and location privacy algorithms and data privacy mechanism that addresses this problem. The proposed solutions provide additional trustworthiness and reliability at modest cost of memory and energy. Also, we proved that our proposed solutions provide protection against various privacy disclosure attacks, such as eavesdropping and hop-by-hop trace back attacks.",
keywords = "Anonymity, Eavesdropping, Hop-by-hop trace back, Privacy, Routing, Wireless sensor networks",
author = "Shaikh, {Riaz Ahmed} and Hassan Jameel and d'Auriol, {Brian J.} and Heejo Lee and Sungyoung Lee and Song, {Young Jae}",
year = "2010",
month = "3",
day = "1",
doi = "10.3390/s100301447",
language = "English",
volume = "10",
pages = "1447--1472",
journal = "Sensors (Switzerland)",
issn = "1424-8220",
publisher = "Multidisciplinary Digital Publishing Institute (MDPI)",
number = "3",

}

TY - JOUR

T1 - Achieving network level privacy in wireless sensor networks

AU - Shaikh, Riaz Ahmed

AU - Jameel, Hassan

AU - d'Auriol, Brian J.

AU - Lee, Heejo

AU - Lee, Sungyoung

AU - Song, Young Jae

PY - 2010/3/1

Y1 - 2010/3/1

N2 - Full network level privacy has often been categorized into four sub-categories: Identity, Route, Location and Data privacy. Achieving full network level privacy is a critical and challenging problem due to the constraints imposed by the sensor nodes (e.g., energy, memory and computation power), sensor networks (e.g., mobility and topology) and QoS issues (e.g., packet reach-ability and timeliness). In this paper, we proposed two new identity, route and location privacy algorithms and data privacy mechanism that addresses this problem. The proposed solutions provide additional trustworthiness and reliability at modest cost of memory and energy. Also, we proved that our proposed solutions provide protection against various privacy disclosure attacks, such as eavesdropping and hop-by-hop trace back attacks.

AB - Full network level privacy has often been categorized into four sub-categories: Identity, Route, Location and Data privacy. Achieving full network level privacy is a critical and challenging problem due to the constraints imposed by the sensor nodes (e.g., energy, memory and computation power), sensor networks (e.g., mobility and topology) and QoS issues (e.g., packet reach-ability and timeliness). In this paper, we proposed two new identity, route and location privacy algorithms and data privacy mechanism that addresses this problem. The proposed solutions provide additional trustworthiness and reliability at modest cost of memory and energy. Also, we proved that our proposed solutions provide protection against various privacy disclosure attacks, such as eavesdropping and hop-by-hop trace back attacks.

KW - Anonymity

KW - Eavesdropping

KW - Hop-by-hop trace back

KW - Privacy

KW - Routing

KW - Wireless sensor networks

UR - http://www.scopus.com/inward/record.url?scp=77955500884&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=77955500884&partnerID=8YFLogxK

U2 - 10.3390/s100301447

DO - 10.3390/s100301447

M3 - Article

C2 - 22294881

AN - SCOPUS:77955500884

VL - 10

SP - 1447

EP - 1472

JO - Sensors (Switzerland)

JF - Sensors (Switzerland)

SN - 1424-8220

IS - 3

ER -