Next Article in Journal
Paper Actuators Made with Cellulose and Hybrid Materials
Next Article in Special Issue
Reliable Asynchronous Image Transfer Protocol in Wireless Multimedia Sensor Networks
Previous Article in Journal
Automatically Augmenting Lifelog Events Using Pervasively Generated Content from Millions of People
Previous Article in Special Issue
Secure Adaptive Topology Control for Wireless Ad-Hoc Sensor Networks
Article Menu

Export Article

Open AccessArticle
Sensors 2010, 10(3), 1447-1472;

Achieving Network Level Privacy in Wireless Sensor Networks

Department of Computer Engeering, Kyung Hee University, Global Campus, Korea
Computing Department, Macquarie University, NSW, Australia
Department of Computer Science & Engeering, Korea University, Seoul, Korea
Author to whom correspondence should be addressed.
Contributed to this work when he was in Kyung Hee University, 1 Hoegi-dong, Dongdaemun-gu, Seoul 130-701, Korea.
This paper is an extended version of our paper entitled “Network level privacy for wireless sensor networks” that has been published in proceedings of the 4th International Conference on Information Assurance and Security (IAS 08), that was held in Naples, Italy in September 2008 (pp. 261-266).
Received: 17 December 2009 / Revised: 4 February 2010 / Accepted: 9 February 2010 / Published: 26 February 2010
PDF [477 KB, uploaded 21 June 2014]


Full network level privacy has often been categorized into four sub-categories: Identity, Route, Location and Data privacy. Achieving full network level privacy is a critical and challenging problem due to the constraints imposed by the sensor nodes (e.g., energy, memory and computation power), sensor networks (e.g., mobility and topology) and QoS issues (e.g., packet reach-ability and timeliness). In this paper, we proposed two new identity, route and location privacy algorithms and data privacy mechanism that addresses this problem. The proposed solutions provide additional trustworthiness and reliability at modest cost of memory and energy. Also, we proved that our proposed solutions provide protection against various privacy disclosure attacks, such as eavesdropping and hop-by-hop trace back attacks. View Full-Text
Keywords: anonymity; eavesdropping; hop-by-hop trace back; privacy; routing; wireless sensor networks anonymity; eavesdropping; hop-by-hop trace back; privacy; routing; wireless sensor networks
This is an open access article distributed under the Creative Commons Attribution License (CC BY 3.0).

Share & Cite This Article

MDPI and ACS Style

Shaikh, R.A.; Jameel, H.; D’Auriol, B.J.; Lee, H.; Lee, S.; Song, Y.-J. Achieving Network Level Privacy in Wireless Sensor Networks. Sensors 2010, 10, 1447-1472.

Show more citation formats Show less citations formats

Related Articles

Article Metrics

Article Access Statistics



[Return to top]
Sensors EISSN 1424-8220 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top