Query privacy in wireless sensor networks Article

Carbunar, B, Yu, Y, Shi, W et al. (2010). Query privacy in wireless sensor networks . 6(2), 10.1145/1689239.1689244

cited authors

  • Carbunar, B; Yu, Y; Shi, W; Pearce, M; Vasudevan, V

fiu authors

abstract

  • Existing mechanisms for querying wireless sensor networks leak client interests to the servers performing the queries. The leaks are not only in terms of specific regions of interest but also of client access patterns. In this article we introduce the problem of preserving the privacy of clients querying a wireless sensor network owned by untrusted organizations. We first propose an efficient protocol, SPYC, that ensures full client privacy in settings where the servers providing access to the network are honest-but-curious and whose collaboration does not extend beyond well-defined administrative purposes. Furthermore, we study the same query privacy problem in a setting where servers exhibit malicious behavior or where powerful external attackers have access to sensor network traffic information. In this setting we propose two metrics for quantifying the privacy achieved by a client's query sequence. We then extend SPYC with a suite of practical algorithms, then analyze the privacy and efficiency levels they provide. Our TOSSIM simulations show that the proposed extensions are communication efficient while significantly improving client privacy levels. © 2010 ACM.

publication date

  • February 1, 2010

Digital Object Identifier (DOI)

volume

  • 6

issue

  • 2