Table of Contents Author Guidelines Submit a Manuscript
Journal of Sensors
Volume 2016, Article ID 4082084, 18 pages
http://dx.doi.org/10.1155/2016/4082084
Review Article

Privacy Models in Wireless Sensor Networks: A Survey

Carlos III University of Madrid, Avenida de la Universidad 30, Leganés, 28911 Madrid, Spain

Received 23 February 2016; Accepted 8 September 2016

Academic Editor: Christos Riziotis

Copyright © 2016 J. M. de Fuentes et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. L. Atzori, A. Iera, and G. Morabito, “The internet of things: a survey,” Computer Networks, vol. 54, no. 15, pp. 2787–2805, 2010. View at Publisher · View at Google Scholar · View at Scopus
  2. I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “Wireless sensor networks: a survey,” Computer Networks, vol. 38, no. 4, pp. 393–422, 2002. View at Publisher · View at Google Scholar · View at Scopus
  3. C. Y. Chow, W. Xu, and T. He, “Privacy enhancing technologies for wireless sensor networks,” in The Art of Wireless Sensor Networks, pp. 609–641, Springer, 2014. View at Google Scholar
  4. A. Tayebi, S. Berber, and A. Swain, “Wireless sensor network attacks: an overview and critical analysis,” in Proceedings of the 7th International Conference on Sensing Technology (ICST '13), pp. 97–102, Wellington, New Zealand, December 2013. View at Publisher · View at Google Scholar · View at Scopus
  5. R. Rios, J. Lopez, and J. Cuellar, “Location privacy in WSNs: solutions, challenges, and future trends,” in Foundations of Security Analysis and Design VII, vol. 8604 of Lecture Notes in Computer Science, pp. 244–282, Springer, 2014. View at Publisher · View at Google Scholar
  6. P. Gupta and M. Chawla, “Privacy preservation for WSN: a survey,” International Journal of Computer Applications, vol. 48, no. 3, pp. 11–16, 2012. View at Publisher · View at Google Scholar
  7. N. Oualha and A. Olivereau, “Sensor and data privacy in industrial wireless sensor networks,” in Proceedings of the Conference on Network and Information Systems Security, pp. 1–8, 2011.
  8. M. Conti, J. Willemsen, and B. Crispo, “Providing source location privacy in wireless sensor networks: a survey,” IEEE Communications Surveys & Tutorials, vol. 15, no. 3, pp. 1238–1280, 2013. View at Publisher · View at Google Scholar · View at Scopus
  9. R. Bista and J.-W. Chang, “Privacy-preserving data aggregation protocols for wireless sensor networks: a survey,” Sensors, vol. 10, no. 5, pp. 4577–4601, 2010. View at Publisher · View at Google Scholar · View at Scopus
  10. H. Alemdar and C. Ersoy, “Wireless sensor networks for healthcare: a survey,” Computer Networks, vol. 54, no. 15, pp. 2688–2710, 2010. View at Publisher · View at Google Scholar · View at Scopus
  11. M. Al Ameen, J. Liu, and K. Kwak, “Security and privacy issues in wireless sensor networks for healthcare applications,” Journal of Medical Systems, vol. 36, no. 1, pp. 93–101, 2012. View at Publisher · View at Google Scholar · View at Scopus
  12. K. Islam, W. Shen, and X. Wang, “Wireless sensor network reliability and security in factory automation: a survey,” IEEE Transactions on Systems, Man and Cybernetics Part C: Applications and Reviews, vol. 42, no. 6, pp. 1243–1256, 2012. View at Publisher · View at Google Scholar · View at Scopus
  13. D. Christin, A. Reinhardt, SS. Kanhere, and M. Hollick, “Fine-grained access control enabling privacy support in wireless sensor networks,” in Proceedings of the 9th KuVS Fachgespräch Drahtlose Sensornetze, vol. 1, pp. 29–32, Würzburg, Germany, September 2010.
  14. A.-S. Abuzneid, T. Sobh, M. Faezipour, A. Mahmood, and J. James, “Fortified anonymous communication protocol for location privacy in WSN: a modular approach,” Sensors, vol. 15, no. 3, pp. 5820–5864, 2015. View at Publisher · View at Google Scholar · View at Scopus
  15. K. Mehta, D. Liu, and M. Wright, “Protecting location privacy in sensor networks against a global eavesdropper,” IEEE Transactions on Mobile Computing, vol. 11, no. 2, pp. 320–336, 2012. View at Publisher · View at Google Scholar · View at Scopus
  16. A. Debnath, P. Singaravelu, and S. Verma, “Efficient spatial privacy preserving scheme for sensor network,” Central European Journal of Engineering, vol. 3, no. 1, pp. 1–10, 2013. View at Publisher · View at Google Scholar · View at Scopus
  17. C. Ma, K. Xue, and P. Hong, “Distributed access control with adaptive privacy preserving property for wireless sensor networks,” Security and Communication Networks, vol. 7, no. 4, pp. 759–773, 2014. View at Publisher · View at Google Scholar · View at Scopus
  18. B. Di Ying, D. Makrakis, and H. T. Mouftah, “Anti-traffic analysis attack for location privacy in WSNs,” EURASIP Journal on Wireless Communications and Networking, vol. 2014, article 131, 2014. View at Publisher · View at Google Scholar · View at Scopus
  19. M. M. E. A. Mahmoud and X. Shen, “A cloud-based scheme for protecting source-location privacy against hotspot-locating attack in wireless sensor networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 10, pp. 1805–1818, 2012. View at Publisher · View at Google Scholar · View at Scopus
  20. J. Long, M. Dong, K. Ota, and A. Liu, “Achieving source location privacy and network lifetime maximization through tree-based diversionary routing in wireless sensor networks,” IEEE Access, vol. 2, pp. 633–651, 2014. View at Publisher · View at Google Scholar · View at Scopus
  21. M. Raj, N. Li, D. Liu, M. Wright, and S. K. Das, “Using data mules to preserve source location privacy in Wireless Sensor Networks,” Pervasive and Mobile Computing, vol. 11, no. 1, pp. 244–260, 2014. View at Publisher · View at Google Scholar · View at Scopus
  22. M. M. Groat, W. Hey, and S. Forrest, “KIPDA: k-indistinguishable privacy-preserving data aggregation in wireless sensor networks,” in Proceedings of the IEEE INFOCOM, pp. 2024–2032, IEEE, Shanghai, China, April 2011. View at Publisher · View at Google Scholar · View at Scopus
  23. W. Tan, K. Xu, and D. Wang, “An anti-tracking source-location privacy protection protocol in WSNs based on path extension,” IEEE Internet of Things Journal, vol. 1, no. 5, pp. 461–471, 2014. View at Publisher · View at Google Scholar · View at Scopus
  24. Y. Yang, M. Shao, S. Zhu, and G. Cao, “Towards statistically strong source anonymity for sensor Networks,” ACM Transactions on Sensor Networks, vol. 9, no. 3, article 34, Article ID 2480737, 2013. View at Publisher · View at Google Scholar · View at Scopus
  25. B. Alomair, A. Clark, J. Cuellar, and R. Poovendran, “Toward a statistical framework for source anonymity in sensor networks,” IEEE Transactions on Mobile Computing, vol. 12, no. 2, pp. 248–260, 2013. View at Publisher · View at Google Scholar · View at Scopus
  26. J. Wu and F. Zhang, “Privacy-preserving regression modeling and attack analysis in sensor network,” in Cloud Computing and Big Data, W. Qiang, X. Zheng, and C.-H. Hsu, Eds., vol. 9106 of Lecture Notes in Computer Science, pp. 354–366, Springer, New York, NY, USA, 2015. View at Publisher · View at Google Scholar
  27. E. C.-H. Ngai and I. Rodhe, “On providing location privacy for mobile sinks in wireless sensor networks,” Wireless Networks, vol. 19, no. 1, pp. 115–130, 2013. View at Publisher · View at Google Scholar · View at Scopus
  28. C.-Y. Chow, M. F. Mokbel, and T. He, “A privacy-preserving location monitoring system for wireless sensor networks,” IEEE Transactions on Mobile Computing, vol. 10, no. 1, pp. 94–107, 2011. View at Publisher · View at Google Scholar · View at Scopus
  29. S. Ortolani, M. Conti, B. Crispo, and R. Di Pietro, “Events privacy in WSNs: a new model and its application,” in Proceedings of the IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM '11), pp. 1–9, IEEE, Lucca, Italy, June 2011. View at Publisher · View at Google Scholar · View at Scopus
  30. B. Carbunar, Y. Yu, W. Shi, M. Pearce, and V. Vasudevan, “Query privacy in wireless sensor networks,” ACM Transactions on Sensor Networks, vol. 6, no. 2, article 14, pp. 1–12, 2010. View at Publisher · View at Google Scholar · View at Scopus
  31. L. Buttyán and T. Holczer, “Perfectly anonymous data aggregation in wireless sensor networks,” in Proceedings of the IEEE 7th International Conference on Mobile Ad hoc and Sensor Systems (MASS '10), pp. 513–518, November 2010. View at Publisher · View at Google Scholar · View at Scopus
  32. X. Liao and J. Li, “Privacy-preserving and secure top-k query in two-tier wireless sensor network,” in Proceedings of the IEEE Global Communications Conference (GLOBECOM '12), pp. 335–341, IEEE, Anaheim, Calif, USA, December 2012. View at Publisher · View at Google Scholar · View at Scopus
  33. D. He, S. Chan, and M. Guizani, “Accountable and privacy-enhanced access control in wireless sensor networks,” IEEE Transactions on Wireless Communications, vol. 14, no. 1, pp. 389–398, 2015. View at Publisher · View at Google Scholar · View at Scopus
  34. J.-H. Park, Y.-H. Jung, H. Ko, J.-J. Kim, and M.-S. Jun, “A privacy technique for providing anonymity to sensor nodes in a sensor network,” Communications in Computer and Information Science, vol. 150, no. 1, pp. 327–335, 2011. View at Publisher · View at Google Scholar · View at Scopus
  35. Y. Zhang, M. Price, L. Opyrchal, and K. Frikken, “All Proxy Scheme for event source anonymity in wireless sensor networks,” in Proceedings of the 6th International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP '10), pp. 263–268, IEEE, Brisbane, Australia, December 2010. View at Publisher · View at Google Scholar · View at Scopus
  36. P. Kumar, A. Gurtov, M. Ylianttila, S.-G. Lee, and H. J. Lee, “A strong authentication scheme with user privacy for wireless sensor networks,” ETRI Journal, vol. 35, no. 5, pp. 889–899, 2013. View at Publisher · View at Google Scholar · View at Scopus
  37. N. Bruce, Y. S. Lee, S. G. Lee, and H. J. Lee, “A privacy preserving security protocol-based application for wireless communication system,” in Proceedings of the IEEE 17th International Conference on High Performance Computing and Communications (HPCC '15), the IEEE 7th International Symposium on Cyberspace Safety and Security (CSS '15) and the IEEE 12th International Conference on Embedded Software and Systems (ICESS '15), pp. 1651–1656, New York, NY, USA, August 2015. View at Publisher · View at Google Scholar
  38. L. Zhou, Q. Wen, and H. Zhang, “Protecting sensor location privacy against adversaries in wireless sensor networks,” in Proceedings of the 5th International Conference on Computational and Information Sciences (ICCIS '13), pp. 1384–1387, Shiyang, China, June 2013. View at Publisher · View at Google Scholar · View at Scopus
  39. Y. Li and J. Ren, “Source-location privacy through dynamic routing in wireless sensor networks,” in Proceedings of the IEEE INFOCOM, pp. 1–9, March 2010. View at Publisher · View at Google Scholar · View at Scopus
  40. S. B. Othman, A. A. Bahattab, A. Trad, and H. Youssef, “Confidentiality and integrity for data aggregation in WSN using homomorphic encryption,” Wireless Personal Communications, vol. 80, no. 2, pp. 867–889, 2014. View at Publisher · View at Google Scholar · View at Scopus
  41. K. Xie, X. Ning, X. Wang et al., “An efficient privacy-preserving compressive data gathering scheme in WSNs,” in Algorithms and Architectures for Parallel Processing, G. Wang, A. Zomaya, G. M. Perez, and K. Li, Eds., vol. 9528 of Lecture Notes in Computer Science, pp. 702–715, Springer, New York, NY, USA, 2015. View at Publisher · View at Google Scholar
  42. R.-H. Hu, X.-M. Dong, and D.-L. Wang, “Protecting data source location privacy in wireless sensor networks against a global eavesdropper,” International Journal of Distributed Sensor Networks, vol. 2014, Article ID 492802, 17 pages, 2014. View at Publisher · View at Google Scholar
  43. G. Yang, S. Li, X. Xu, H. Dai, and Z. Yang, “Precision-enhanced and encryption-mixed privacy-preserving data aggregation in wireless sensor networks,” International Journal of Distributed Sensor Networks, vol. 9, no. 4, Article ID 427275, pp. 1–12, 2013. View at Publisher · View at Google Scholar
  44. X. Luo, X. Ji, and M.-S. Park, “Location privacy against traffic analysis attacks in wireless sensor networks,” in Proceedings of the International Conference in Information Science and Applications (ICISA '10), pp. 1–6, Seoul, South Korea, April 2010. View at Publisher · View at Google Scholar · View at Scopus
  45. B. Ntirenganya, Z. Zhang, L. Zhu, Y.-A. Tan, Z. Yang, and C. Guo, “Enhanced privacy preserving pattern-code based data aggregation in wireless sensor networks,” in Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Networks (MSN '13), pp. 336–341, December 2013. View at Publisher · View at Google Scholar · View at Scopus
  46. L. Yao, L. Kang, F. Deng, J. Deng, and G. Wu, “Protecting source-location privacy based on multirings in wireless sensor networks,” Concurrency and Computation: Practice and Experience, vol. 27, no. 15, pp. 3863–3876, 2015. View at Publisher · View at Google Scholar
  47. J. E. Tapiador, M. Srivatsa, J. A. Clark, and J. A. McDermid, “Decorrelating WSN traffic patterns with maximally uninformative constrained routing,” in NETWORKING 2011 Workshops, vol. 6827 of Lecture Notes in Computer Science, pp. 207–218, Springer, Berlin, Germany, 2011. View at Publisher · View at Google Scholar
  48. X. Yang, X. Ren, S. Yang, and J. McCann, “A novel temporal perturbation based privacy-preserving scheme for real-time monitoring systems,” Computer Networks, vol. 88, pp. 72–88, 2015. View at Publisher · View at Google Scholar · View at Scopus
  49. C. Li and Y. Liu, “ESMART: energy-efficient slice-mix-aggregate for wireless sensor network,” International Journal of Distributed Sensor Networks, vol. 2013, Article ID 134509, 9 pages, 2013. View at Publisher · View at Google Scholar · View at Scopus
  50. A. Gurjar and A. R. B. Patil, “Cluster based anonymization for source location privacy in wireless sensor network,” in Proceedings of the 3rd International Conference on Communication Systems and Network Technologies (CSNT '13), pp. 248–251, IEEE, Gwalior, India, April 2013. View at Publisher · View at Google Scholar · View at Scopus
  51. A. Back, U. Möller, and A. Stiglic, “Traffic analysis attacks and trade-offs in anonymity providing systems,” in Information Hiding, I. S. Moskowitz, Ed., vol. 2137 of Lecture Notes in Computer Science, pp. 245–257, Springer, London, UK, 2001. View at Publisher · View at Google Scholar
  52. L. Yao, L. Kang, P. Shang, and G. Wu, “Protecting the sink location privacy in wireless sensor networks,” Personal and Ubiquitous Computing, vol. 17, no. 5, pp. 883–893, 2013. View at Publisher · View at Google Scholar · View at Scopus
  53. K.-J. Kim and S.-P. Hong, “Privacy care architecture in wireless sensor networks,” International Journal of Distributed Sensor Networks, vol. 9, no. 5, Article ID 369502, 2013. View at Publisher · View at Google Scholar · View at Scopus
  54. X. Zhang, H. Chen, K. Wang, H. Peng, Y. Fan, and D. Li, “Rotation-based privacy-preserving data aggregation in wireless sensor networks,” in Proceedings of the 1st IEEE International Conference on Communications (ICC '14), pp. 4184–4189, IEEE, Sydney, Australia, June 2014. View at Publisher · View at Google Scholar · View at Scopus