Achieving network level privacy in wireless sensor networks

Riaz Ahmed Shaikh, Hassan Jameel Asghar, Brian J. d'Auriol, Heejo Lee, Sungyoung Lee, Young-Jae Song

Research output: Contribution to journalArticlepeer-review

42 Citations (Scopus)
79 Downloads (Pure)

Abstract

Full network level privacy has often been categorized into four sub-categories: Identity, Route, Location and Data privacy. Achieving full network level privacy is a critical and challenging problem due to the constraints imposed by the sensor nodes (e.g., energy, memory and computation power), sensor networks (e.g., mobility and topology) and QoS issues (e.g., packet reach-ability and timeliness). In this paper, we proposed two new identity, route and location privacy algorithms and data privacy mechanism that addresses this problem. The proposed solutions provide additional trustworthiness and reliability at modest cost of memory and energy. Also, we proved that our proposed solutions provide protection against various privacy disclosure attacks, such as eavesdropping and hop-by-hop trace back attacks.
Original languageEnglish
Pages (from-to)1447-1472
Number of pages26
JournalSensors
Volume10
Issue number3
DOIs
Publication statusPublished - 2010

Bibliographical note

Version archived for private and non-commercial use with the permission of the author/s and according to publisher conditions. For further rights please check publisher website http://www.mdpi.com/home.

Keywords

  • anonymity
  • eavesdropping
  • hop-by-hop trace back
  • privacy
  • routing
  • wireless sensor networks

Fingerprint

Dive into the research topics of 'Achieving network level privacy in wireless sensor networks'. Together they form a unique fingerprint.

Cite this