Next Article in Journal
Paper Actuators Made with Cellulose and Hybrid Materials
Next Article in Special Issue
Reliable Asynchronous Image Transfer Protocol in Wireless Multimedia Sensor Networks
Previous Article in Journal
Automatically Augmenting Lifelog Events Using Pervasively Generated Content from Millions of People
Previous Article in Special Issue
Secure Adaptive Topology Control for Wireless Ad-Hoc Sensor Networks
Sensors 2010, 10(3), 1447-1472; doi:10.3390/s100301447

Achieving Network Level Privacy in Wireless Sensor Networks

1,*  and 1
1 Department of Computer Engeering, Kyung Hee University, Global Campus, Korea 2 Computing Department, Macquarie University, NSW, Australia 3 Department of Computer Science & Engeering, Korea University, Seoul, Korea Contributed to this work when he was in Kyung Hee University, 1 Hoegi-dong, Dongdaemun-gu, Seoul 130-701, Korea.
This paper is an extended version of our paper entitled “Network level privacy for wireless sensor networks” that has been published in proceedings of the 4th International Conference on Information Assurance and Security (IAS 08), that was held in Naples, Italy in September 2008 (pp. 261-266).
* Author to whom correspondence should be addressed.
Received: 17 December 2009 / Revised: 4 February 2010 / Accepted: 9 February 2010 / Published: 26 February 2010
View Full-Text   |   Download PDF [477 KB, uploaded 21 June 2014]   |   Browse Figures


Full network level privacy has often been categorized into four sub-categories: Identity, Route, Location and Data privacy. Achieving full network level privacy is a critical and challenging problem due to the constraints imposed by the sensor nodes (e.g., energy, memory and computation power), sensor networks (e.g., mobility and topology) and QoS issues (e.g., packet reach-ability and timeliness). In this paper, we proposed two new identity, route and location privacy algorithms and data privacy mechanism that addresses this problem. The proposed solutions provide additional trustworthiness and reliability at modest cost of memory and energy. Also, we proved that our proposed solutions provide protection against various privacy disclosure attacks, such as eavesdropping and hop-by-hop trace back attacks.
Keywords: anonymity; eavesdropping; hop-by-hop trace back; privacy; routing; wireless sensor networks anonymity; eavesdropping; hop-by-hop trace back; privacy; routing; wireless sensor networks
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Share & Cite This Article

Further Mendeley | CiteULike
Export to BibTeX |
MDPI and ACS Style

Shaikh, R.A.; Jameel, H.; D’Auriol, B.J.; Lee, H.; Lee, S.; Song, Y.-J. Achieving Network Level Privacy in Wireless Sensor Networks. Sensors 2010, 10, 1447-1472.

View more citation formats

Related Articles

Article Metrics

For more information on the journal, click here


Cited By

[Return to top]
Sensors EISSN 1424-8220 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert