skip to main content
10.1145/1774088.1774554acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

Dealing with anonymity in wireless sensor networks

Published: 22 March 2010 Publication History

Abstract

Nowadays Wireless Sensor Networks (WSN) are used in many application contexts. Data handled by WSN are required to be protected for privacy reasons since they can be directly or indirectly related to individuals. The problem of preventing the identification of individuals starting from their data, known as anonymity, is a fundamental requirement for privacy aware systems.
This paper proposes a solution to guarantee anonymity for a wide spread type of WSN by means of privacy policies. The solution is based on a UML model that introduces the conceptual elements and guidelines that are needed to build privacy policies for WSN.

References

[1]
I. F. Akyildiz, F. Brunetti, and C. Blazquez. NanoNetworking: A New Communication Paradigm. Computer Networks Journal, (Elsevier), June 2008.
[2]
I. F. Akyildiz, T. Melodia, and K. Chowdhury. A Survey on Wireless Multimedia Sensor Networks. Computer Networks Journal, (Elsevier), March 2007.
[3]
J. Al-Muhtadi, R. Campbell, A. Kapadia, M. D. Mickunas, and S. Yi. Routing through the mist: privacy preserving communication in ubiquitous computing environments. In Proc. of IEEE Int. Conf. on Distributed Computing systems (ICDS), Vienna(Austria), 2002.
[4]
H. Chan and A. Perrig. Security and privacy in sensor networks. IEEE Computer Magazine, pp 103--105, 2003.
[5]
A. Coen-Porisini, P. Colombo, S. Sicari and A. Trombetta. A Conceptual Model for Privacy Policies. In Proc. of SEA 2007, Cambridge, Boston, 2007.
[6]
Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal of the European Communities of 23 November 1995 No L. 281 p. 31.
[7]
S. Duri, M. Gruteser, X. Liu, P. Moskowitz, R. Perez, M. Singh, and J. Tang. Framework for security and privacy in automotive telematics. In 2nd ACM International Worksphop on Mobile Commerce, 2000.
[8]
A. Smailagic, D. P. Siewiorek, J. Anhalt, and Y. Wang D. Kogan. Location sensing and privacy in a context aware computing environment. In Proc of. Pervasive Computing, 2001.
[9]
M. Gruteser and D. Grunwald. A methodological assessment of location privacy risks in wireless hotspot networks. In Proc. of the First International Conference on Security in Pervasive Computing, 2003.
[10]
M. Gruteser, G. Schelle, A. Jain, R. Han, and D. Grunwald. Privacy-aware location sensor networks. In Proc. of the 9th USENIX Workshop on Hot Topics in Operating Systems (HotOS IX), 2003.
[11]
M. Langheinrich. A privacy awareness system for ubiquitous computing environments. In Proc of the 4th Int. Conf. on Ubiquitous Computing, 2002.
[12]
D. Molnar and D. Wagner. Privacy and security in library rfid: Issues, practices, and architectures. In Proc. of ACM CCS, 2004
[13]
Q. Ni, A. Trombetta, E. Bertino, and J. Lobo. Privacy-aware role-based access control. In Proc. of ACM Symp. on Access Control Methods And Technologies (SACMAT07), 2007.
[14]
OMG. Unified Modeling Language: Infrastructure, 2009. Ver. 2.2, formal/2009-02-04
[15]
OMG. Unified Modeling Language: Superstructure, 2009. Ver. 2.2, formal/2009-02-02
[16]
A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler. Spins: security protocols for sensor networks. Wireless Networking, 8(5):521--534, 2002.
[17]
N. B. Priyantha, A. Chakraborty, and H. Balakrishnan. The cricket locationsupport system. In Proc. of the Sixth Annual ACM International Conference on Mobile Computing and Networking (MOBICOM), August 2000.
[18]
P. Samarati, and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical Report SRI-CSL-98-04, Computer Science Laboratory, SRI International, 1998.
[19]
J. P. M. She and J. T. W. Yeow. Nanotechnology-Enabled Wireless Sensor Networks: From a Device Perspective. IEEE Sensors Journal, Vol. 6 (5) Oct. 2006.
[20]
E. Snekkenes. Concepts for personal location privacy policies. In Proc. of the 3rd ACM Conf. on Electronic Commerce, 2001.
[21]
H. Zhanga, A. Arorab, Y. Choic, and M. G. Goudac. Reliable bursty convergecast in wireless sensor networks. Computer Communications, (Elsevier), 30(13), Pages 2560--2576, 2007.

Cited By

View all
  1. Dealing with anonymity in wireless sensor networks

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SAC '10: Proceedings of the 2010 ACM Symposium on Applied Computing
    March 2010
    2712 pages
    ISBN:9781605586397
    DOI:10.1145/1774088
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 22 March 2010

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Research-article

    Conference

    SAC'10
    Sponsor:
    SAC'10: The 2010 ACM Symposium on Applied Computing
    March 22 - 26, 2010
    Sierre, Switzerland

    Acceptance Rates

    SAC '10 Paper Acceptance Rate 364 of 1,353 submissions, 27%;
    Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

    Upcoming Conference

    SAC '25
    The 40th ACM/SIGAPP Symposium on Applied Computing
    March 31 - April 4, 2025
    Catania , Italy

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 08 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media