pDCS: Security and Privacy Support for Data-Centric Sensor Networks
- 1 January 2007
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- p. 1298-1306
- https://doi.org/10.1109/infcom.2007.154
Abstract
The demand for efficient data dissemination/access techniques to find the relevant data from within a sensor network has led to the development of data-centric sensor networks (DCS), where the sensor data as contrast to sensor nodes are named based on attributes such as event type or geographic location. However, saving data inside a network also creates security problems due to the lack of tamper-resistance of the sensor nodes and the unattended nature of the sensor network. For example, an attacker may simply locate and compromise the node storing the event of his interest. To address these security problems, we present pDCS, a privacy-enhanced DCS network which offers different levels of data privacy based on different cryptographic keys. In addition, we propose several query optimization techniques based on Euclidean Steiner Tree and Keyed Bloom Filter to minimize the query overhead while providing certain query privacy. Finally, detailed analysis and simulations show that the Keyed Bloom Filter scheme can significantly reduce the message overhead with the same level of query delay and maintain a very high level of query privacy.Keywords
This publication has 21 references indexed in Scilit:
- Multiresolution storage and search in sensor networksACM Transactions on Storage, 2005
- Security in wireless sensor networksCommunications of the ACM, 2004
- On the complexity of graph tree partition problemsDiscrete Applied Mathematics, 2004
- A pairwise key pre-distribution scheme for wireless sensor networksPublished by Association for Computing Machinery (ACM) ,2003
- Trajectory based forwarding and its applicationsPublished by Association for Computing Machinery (ACM) ,2003
- Data-centric storage in sensornetsACM SIGCOMM Computer Communication Review, 2003
- Preserving privacy in environments with location-based applicationsIEEE Pervasive Computing, 2003
- GHTPublished by Association for Computing Machinery (ACM) ,2002
- CrowdsACM Transactions on Information and System Security, 1998
- Space/time trade-offs in hash coding with allowable errorsCommunications of the ACM, 1970