Abstract
With the proliferation of wireless sensor networks and mobile technologies in general, it is possible to provide improved medical services and also to reduce costs as well as to manage the shortage of specialized personnel. Monitoring a personâs health condition using sensors provides a lot of benefits but also exposes personal sensitive information to a number of privacy threats. By recording user-related data, it is often feasible for a malicious or negligent data provider to expose these data to an unauthorized user. One solution is to protect the patientâs privacy by making difficult a linkage between specific measurements with a patientâs identity. In this paper we present a privacy-preserving architecture which builds upon the concept of k-anonymity; we present a clustering-based anonymity scheme for effective network management and data aggregation, which also protects userâs privacy by making an entity indistinguishable from other k similar entities. The presented algorithm is resource aware, as it minimizes energy consumption with respect to other more costly, cryptography-based approaches. The system is evaluated from an energy-consuming and network performance perspective, under different simulation scenarios.
Similar content being viewed by others
References
Samarati P, Sweeney L (1998) âProtecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppressionâ, technical report SRI-CSL-98-04. Computer Science Laboratory, SRI International
Hoh B, Gruteser M (2005) Protecting location privacy through path confusion. In: Securecomm, IEEE Press, pp 194â205
Ouyang Y, Le Z, Xu Z, Triandopoulos N, Zhang S, Ford J, Makedon F (2007) Providing anonymity in wireless sensor networks. In: Proceedings of the IEEE international conference on pervasive services (ICPSâ07). Istanbul, Turkey, pp. 145â148
Abbasi A, Khonsari A, Talebi M (2009) Source location anonymity for sensor networks. In: Proceedings of the 6th IEEE conference on consumer communications and networking conference (CCNCâ09). IEEE Press, Piscataway, NJ, USA, pp 588â592
Mehta K, Liu D, Wright M (2007) Location privacy in sensor networks against a global eavesdropper. In: Proceedings of the IEEE international conference on network protocols, ICNP, pp 314â323
Gruteser M, Schelle G, Jain A, Han R, Grunwald D (2003) Privacy-aware location sensor networks. In: Proceedings of the 9th workshop on hot topics in operating systems (HotOSâ03)
Shao M, Zhu S, Zhang W, Cao G (2007) pDCS: security and privacy support for data-centric sensor networks. In: Proceedings of the 26th IEEE international conference on computer communications, IEEE INFOCOM, pp 1298â1306
Priyantha N, Chakraborty A, Balakrishnan H (2000) The cricket location-support system. In Proceedings of the sixth annual international conference on mobile computing and networking. In Proceedings of the MOBICOM 2000. Boston, MA, pp 32â43
Chow C-Y, Mokbel M, He T (2011) A privacy preserving location monitoring system for wireless sensor networks. IEEE Trans Mob Comput 10(1):94â107
Belsis P, Pantziou G (2011) Protecting anonymity in wireless medical monitoring environments. In: Proceedings of the 4th international conference on PErvasive technologies related to assistive environments (PETRAâ11). ACM, New York, NY, USA (Article 55)
DiPietro R, Mancini LV, Jajodia S (2003) Providing secrecy in key management protocols for large wireless sensor networks. J AdHoc Netw 1(4):455â468
Newsome J, Shi R, Song D, Perrig A (2004) The Sybil attack in sensor networks: analysis and defenses. In Proceedings of the IEEE international conference on information processing in sensor networks, (IPSN 2004)
Olariu S, Eltoweissy M, Younis M (2005) ANSWER: autonomous wireless sensor network. In: Proceedings of the 1st ACM international workshop on QoS and security for wireless and mobile networks (Q2SWinetâ05). Montreal, Canada
Pfitzmann A, Köhntopp M (2000) Anonymity, unobservability, and pseudonymityâa proposal for terminology. In: Federrath H (ed) DIAUâ00. LNCS 2009, 1â9
Sohrabi K, Gao J, Ailawadhi V, Pottie G (2000) Protocols for self-organization of a wireless sensor network. IEEE Pers Commun 7(5):16â27
Perrig A, Szewczyk R, Wen V, Culler D, Tygar JD (2001) SPINS: security protocols for sensor networks. In: Proceedings of ACM MobiComâ01. Rome, Italy, pp 189â199
Vogt H (2004) Exploring message authentication in sensor networks. In: Proceedings of ESAS 2004 (1st European workshop on security in ad hoc and sensor networks), LNCS. Springer, Heidelberg, Germany
Heidemann J, Silva F, Intanagonwiwat C, Govindan R, Estrin D, Ganesan D (2001) Building efficient wireless sensor networks with low-level naming. In SOSP
Mamalis B, Gavalas D, Konstantopoulos C, Pantziou G (2009) Clustering in wireless sensor networks. In: Zhang Y, Yang LT, Chen J (eds) RFID and sensor networks: architectures, protocols, security and integrations. CRC Press, Boca Raton, FL, pp 324â353
Abbasi A, Younis M (2007) A survey on clustering algorithms for wireless sensor networks. Comput Commun 30:2826â2841
Xu K, Gerla M (2002) A heterogeneous routing protocol based on a new stable clustering scheme. In: Proceeding of IEEE military communications conference (MILCOM 2002). Anaheim, CA
Hill J, Szewczyk R, Woo A, Hollar S, Culler D, Pister K (2000) System architecture directions for network sensors. In: ASPLOS, pp 93â104
Wang Q, Hempstead M, Yang W (2006) A realistic power consumption model for wireless sensor network devices. Sens Ad Hoc Commun Netw 1:286â295
Meulenaer G, Gosset F, Standaert F, Pereia O (2008) On the energy cost of communication and cryptography in wireless sensor networks. In: Proceedings of IEEE international conference on wireless and mobile computing and communication. Avignon, France, pp 580â585
Healy M, Newe T, Lewis E (2007) Efficiently securing data on a wireless sensor network. J Phys Conf Ser 76(1):1â6
Law Y, Doumen J, Hartel P (2006) Survey and benchmark of block ciphers for wireless sensor networks. ACM Trans Sen Netw 2(1):65â93
Piotrowski K, Langendoerfer P, Peter S (2006) How public key cryptography influences wireless sensor node lifetime. In: SASNâ06: proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks. ACM, New York, NY, USA, pp 169â176
IEEE Std 802.15.4âą (2003) Wireless medium access control (MAC) and physical layer (PHY) specifications for low-rate wireless personal area networks (LR-WPANs)
Paek J, Chintalapudi K, Govindan R, Caffrey J, Masri S (2005) A wireless sensor network for structural health monitoring: performance and experience. In: EmNetsâ05: proceedings of the 2nd IEEE workshop on embedded networked sensors. IEEE Computer Society, Washington, DC, USA, pp 1â9
The Pamvotis network performance simulator. http://pamvotis.org. Accessed Mar 2010
Rivest R (1995) The RC5 encryption algorithm. In: Proceedings of the 1994 Leuven workshop on fast software encryption. Springer, pp 86â96
Ganesan P, Venugopalan R, Peddabachagari P, Dean A, Mueller F, Sichitiu M (2003) Analyzing and modeling encryption overhead for sensor network nodes. In Proceedings of the 1st ACM international workshop on wireless sensor networks and applications. San Diego, California, USA
Acknowledgments
This research has been co-funded by the European Union (Social Fund) and Greek national resources under the framework of the âArchimedes III: Funding of Research Groups in TEI of Athensâ project of the âEducation & Lifelong Learningâ Operational Programme.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Belsis, P., Pantziou, G. A k-anonymity privacy-preserving approach in wireless medical monitoring environments. Pers Ubiquit Comput 18, 61â74 (2014). https://doi.org/10.1007/s00779-012-0618-y
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00779-012-0618-y