CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A Survey on Privacy Preserving Techniques in WSN

by Snehalata K. Funde, A. D. Gujar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 86 - Number 1
Year of Publication: 2014
Authors: Snehalata K. Funde, A. D. Gujar
10.5120/14950-3108

Snehalata K. Funde, A. D. Gujar . A Survey on Privacy Preserving Techniques in WSN. International Journal of Computer Applications. 86, 1 ( January 2014), 18-20. DOI=10.5120/14950-3108

@article{ 10.5120/14950-3108,
author = { Snehalata K. Funde, A. D. Gujar },
title = { A Survey on Privacy Preserving Techniques in WSN },
journal = { International Journal of Computer Applications },
issue_date = { January 2014 },
volume = { 86 },
number = { 1 },
month = { January },
year = { 2014 },
issn = { 0975-8887 },
pages = { 18-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume86/number1/14950-3108/ },
doi = { 10.5120/14950-3108 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:03:05.441422+05:30
%A Snehalata K. Funde
%A A. D. Gujar
%T A Survey on Privacy Preserving Techniques in WSN
%J International Journal of Computer Applications
%@ 0975-8887
%V 86
%N 1
%P 18-20
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A great part of the existing tackle Wireless Sensor Networks (WSN) has concentrated on tending to the force and computational asset demands of WSN by the configuration of particular steering, MAC, and cross-layer conventions. As of late, there have been increased privacy concerns over the data gathered by and transmitted through WSN. The remote transmission needed by a WSN, and the self-composing nature of its structural engineering, makes privacy assurance for WSN a particularly testing issue. This paper gives a state-of-art review of privacy-preserving strategies for WSN. Specifically, we audit two fundamental classes of privacy-preserving strategies for ensuring two sorts of private data, data-turned and connection situated privacy, separately. We likewise talk about a number of essential open challenges for future research. Our trust is that this paper sheds some light on a productive course of prospective research for privacy conservation in WSN.

References
  1. R. Agrawal ,R. Srikan ,Prvacy preserving Data mining in proceedings of the 2008 ACM SIGMOD on mamnagement of data , Dallas TX USA MAY 15-18 2000, pp 439-450.
  2. G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, Tan, Kian-Lee, Private queries in location based services: anonymizers are not necessary, in: Proceedings of the 2008 ACM SIGMOD international conference on Management of data, Vancouver, Canada, 2008, pp. 121–132.
  3. LF Akyilidiz, W. Su, Y Shankarsubramaniam, E. Cayirci, Wireless sensor networks: a survey, computer networks 38(4) 2002 (393-422).
  4. R. Dingledine, N. Mathewson, P. Syverson, Tor: the secondgeneration Onion router, in: Proceedings of the 13th USENIX Security Symposium, 2004
  5. J. Deng, R. Han, S. Mishra, Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks, in: IEEE International Conference on Dependable Systems and Networks (DSN 2004), Florence, Italy, 28 June–1 July 2004, pp. 637-646.
  6. J. Deng, R. Han, S. Mishra, Countermeasures against traffic analysis attacks in wireless sensor networks, in: First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SecureComm) 2005, September 2005, pp. 113–126.
  7. J. Deng, R. Han, S. Mishra, Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks, Pervasive and Mobile Computing Elsevier 2 (2) (2006) 159–186.
  8. E. D. Cristofaro, J. Bohli, D. Westho, FAIR: fuzzy-based aggregation providing in-network Resilience for real-time wireless sensor networks, to appear, in: Proceedings of the Second ACM Conference Wireless Network Security (Wisec), 2009.
  9. M. J. Freedman, K. Nissim, B. Pinkas, Efficient private matching and set intersection, in: Advances in Cryptography, Proceedings of Eurocrypt 2004, 2004, pp. 1–19.
  10. R. Agrawal, A. Evfimievski, R. Srikant, information sharing across private databases: proceedings of the 2003ACM SIGMOD International conference on management of data, 2003 , pp. 86- 97
Index Terms

Computer Science
Information Sciences

Keywords

WSN MAC Data privacy