2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2011
DOI: 10.1109/wowmom.2011.5986491
|View full text |Cite
|
Sign up to set email alerts
|

Events privacy in WSNs: A new model and its application

Abstract: A novel issue resource constrained Wireless Sensor Networks (WSNs) are affected by is context privacy. Indeed, while a few solutions do exist to provide data privacy to WSNs (i.e. to protect message confidentiality), providing context privacy (e.g. preventing an adversary to locate the source of a message) is still an open research problem. This paper attacks the issue providing several contributions. First, a formal model to reason about event privacy in WSNs is introduced. This model also captures dynamic ev… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(13 citation statements)
references
References 18 publications
0
13
0
Order By: Relevance
“…For example, many studies discussed the patients' privacy concerns when using a wireless body area network to gather data about daily health conditions [160], [161]. However, the resource limitations of WSNs impede the wide inclusion of privacy solutions to protect message confidentiality [162]. MDPs can be used to find a balanced tradeoff between the complexity of privacy models and energy consumption.…”
Section: ) Cross-layer Optimized Sensor Network (Closns)mentioning
confidence: 99%
“…For example, many studies discussed the patients' privacy concerns when using a wireless body area network to gather data about daily health conditions [160], [161]. However, the resource limitations of WSNs impede the wide inclusion of privacy solutions to protect message confidentiality [162]. MDPs can be used to find a balanced tradeoff between the complexity of privacy models and energy consumption.…”
Section: ) Cross-layer Optimized Sensor Network (Closns)mentioning
confidence: 99%
“…Routing Aggregation Packet injection Anonymity/ -anonymity/pseudonymity Statistics [44] x x Anonymity [39] x [30] x x [22] x x [28] -anonymity [25] x x [52] x x [29] x [31] x x Anonymity [21] x [34] Pseudonymity [20] x x [49] x x [53] x [16] x (+ ring signature) Pseudonymity [46] x x [50] Pseudonymity [35] x [54] x [13] (x) (x) [14] x x Pseudonymity [24] x Anonymity [38] x [18] (x) x x [47] x [48] x [26] x x [42] x Pseudonymity [27] x x [45] x x [15] (x) x x [19] x x x Pseudonymity [32] x [23] x x x [17] x Pseudonymity [43] x x [36] x [33] x [37] x [40] x x x [41] x x x the survey is representative of the different directions in this field. Additionally, since papers are from the last 5 years, this section gives an up-to-date vision on the research trends in WSN privacy.…”
Section: Encryptionmentioning
confidence: 99%
“…Even if privacy seems a single requirement, it involves several goals that may be achieved to a different extent. [39] Source [30] x (query) [22] x (sensor data) [28] Source [25] x (source) [52] Sink [29] x (events) [31] x (query)…”
Section: Goalsmentioning
confidence: 99%
See 2 more Smart Citations