Jump to ContentJump to Main Navigation

Open Engineering

formerly Central European Journal of Engineering

1 Issue per year

Open Access

Efficient spatial privacy preserving scheme for sensor network

1Indian Institute of Information Technology-Allahabad, India, Deoghat, Jhalwa, Allahabad, 211012, India

© 2012 Versita Warsaw. This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License. (CC BY-NC-ND 3.0)

Citation Information: Open Engineering. Volume 3, Issue 1, Pages 1–10, ISSN (Online) 2391-5439, DOI: 10.2478/s13531-012-0048-7, December 2012

Publication History

Published Online:


The privacy of sensitive events observed by a wireless sensor networks (WSN) needs to be protected. Adversaries with the knowledge of sensor deployment and network protocols can infer the location of a sensed event by monitoring the communication from the sensors even when the messages are encrypted. Encryption provides confidentiality; however, the context of the event can used to breach the privacy of sensed objects. An adversary can track the trajectory of a moving object or determine the location of the occurrence of a critical event to breach its privacy. In this paper, we propose ring signature to obfuscate the spatial information. Firstly, the extended region of location of an event of interest as estimated from a sensor communication is presented. Then, the increase in this region of spatial uncertainty due to the effect of ring signature is determined. We observe that ring signature can effectively enhance the region of location uncertainty of a sensed event. As the event of interest can be situated anywhere in the enhanced region of uncertainty, its privacy against local or global adversary is ensured. Both analytical and simulation results show that induced delay and throughput are insignificant with negligible impact on the performance of a WSN.

Keywords: Privacy; Security; Wireless sensor network; Ring signature; Authentication

  • [1] Akyildiz F., Su W., Sankarasubramaniam Y., Cayirci E., A Survey on Sensor Networks, IEEE Communication Magazine, 2002, 102–114

  • [2] Hong W.W., Ling C.Y., Design and Implementation of an ECDSA-Based Identity Authentication Protocol on WSN, IEEE Symposium of Wireless Communication, 2009, 1202–1205

  • [3] Chen X., Makki K., Yen K., Pissinou N., Sensor Network Security: A Survey, IEEE Communications Surveys and Tutorials, 2009, 52–73

  • [4] Chan H., Perrig A., Security and Privacy in Sensor Networks, IEEE Computer Magazine, 2003, 103–105

  • [5] Delgosha F., Fekri F., A Multivariate Key-Establishment Scheme for Wireless Sensor Network, IEEE Transactions on Wireless Communications, 2009, 1814–1824 [Web of Science]

  • [6] Li N. et al., Privacy Preservation in Wireless Sensor Networks: A State-of-the-art Survey, International Journal on Ad Hoc Networks, Elsevier, 2009, 1501–1514

  • [7] Kamat P., Trappe W., Zhang Y.Y., Ozturk C., Enhancing Source Location Privacy in Sensor Network Routing, Proceedings of the 25th IEEE International Conference on Distributed Computing Systems, 2005, 599–608

  • [8] Kamat P., Xu W.Y., Trappe W., Zhang Y.Y., Temporal Privacy in Wireless Sensor Networks, Proceedings of the 27th International Conference on Distributed Computing Systems, 2007, 23–23

  • [9] Xi Y., Schwiebert L., Shi W.S., Preserving Source Location Privacy in Monitoring-Based Wireless Sensor Networks, Proceedings of the 20th International Parallel and Distributed Processing Symposium, 2006

  • [10] Yang Y. et al., Towards Event Source Unobservability with Minimum Network Traffic in Sensor Networks, Proceedings of the 1st ACM Conference on Wireless Network Security, 2008, 77–88

  • [11] Mehta K., Liu D.G., Wright M., Location Privacy in Sensor Networks against a Global Eavesdropper, Proceedings of the IEEE International Conference on Network Protocols, 2007, 314–323

  • [12] Lu R., Lin X., Zhu H., Shen X., TESP2: Timed Efficient Source Privacy Preservation Scheme for Wireless Sensor Networks, Proceedings of the IEEE Conference on Communication, 2010

  • [13] Dieu D. et al., EDPPS: An Energy-efficient Data Privacy Protection Scheme for Wireless Sensor Networks, Proceedings of the 5th International Conference on Computer Sciences and Convergence Information Technology, 2010

  • [14] Qi Z.H., Yang G., Ren X.Y., Li Y.W., An ID-based Ring Signcryption Scheme for Wireless Sensor Networks, Proceedings of the International Conference on Wireless Sensor Network, 2010, 368–373

  • [15] Zhang R., Zhang Y., Ren K., DP2AC: Distributed Privacy-Preserving Access Control in Sensor Networks, Proceedings of the 28th Annual IEEE International Conference on Computer Communications, 2009, 1251–1259

  • [16] Li Y., Ren J., Preserving Source-Location Privacy in Wireless Sensor Networks, Proceedings of the 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, 2009, 1–9

  • [17] Cheikhrouhou O., RiSeG: A Logical Ring Based Secure Group Communication Protocol for Wireless Sensor Networks, Proceedings of the International Conference on Communication in Wireless Environments and Ubiquitous Systems: New Challenges, 2010, 1–5

  • [18] Rivest R., Shamir A., Tauman Y., How to Leak a Secret, Advance in cryptology-ASIACrypt, LNCS 2248, Springer, 2001, 552–565

  • [19] Bresson E., Stern J., Szydlo M., Threshold Ring Signatures and Applications to Ad-Hoc Groups, Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology, LNCS 2442, Springer, 2002, 465–480

  • [20] Xiao J.F., Zeng G.H., Improved Threshold Ring Signature for Ad-Hoc Group, International Conference on Wireless Communication, Networking and Mobile Computing, 2006, 1–4

  • [21] Wang L., Zhang G., Ma C., A Survey of Ring Signature, International Journal on Frontiers of Electrical and Electronic Engineering, Springer, 2008, 19

  • [22] Freudiger J., Raya M., Hubaux J.P., Self-Organized Anonymous Authentication in Mobile Ad Hoc Networks, Proceedings of the International Conference on Security and Privacy in Communication Networks, 2009, 350–372

  • [23] Gervasi O. et al., Linkable Ring Signatures: Security Models and New Schemes, Computational Science and its Applications, LNCS 3481, Springer, 2005, 614–623

  • [24] Tsang P. et al., Separable Linkable Threshold Ring Signatures, Proceedings of Cryptology — INDOCRYPT, LNCS 3348, 2005, 337–376

  • [25] Liu J., Wei V., Wong D., Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups, Information Security and Privacy, LNCS 3108, Springer, 2004, 325–335

  • [26] Chaurasia B.K., Verma S., Tomar G.S., Abraham A., Optimizing Pseudonym Updation in Vehicular Ad-hoc Networks, Transactions on Computational Science IV, Special Issue on Security in Computing, LNCS 5430, Springer, 2009, 136–148

  • [27] Chaurasia B.K., Verma S., Maximizing Anonymity of a Vehicle, Journals of Autonomous and Adaptive Communication Systems, Special Issue on: Security, Trust, and Privacy in DTN and Vehicular Communication, Inderscience, Vol. 3,No. 2, 2010, 198–216

  • [28] Singaravelu P., Verma S., Performance Analysis of Multivariate Cryptosystems for Wireless Sensor Network, Computer and Electrical Engineering Journal, Elsevier, 2012

Citing Articles

Here you can find all Crossref-listed publications in which this article is cited. If you would like to receive automatic email messages as soon as this article is cited in other publications, simply activate the “Citation Alert” on the top of this page.

Oladele Ademola Atoyebi, Antony Stewart, and June Sampson
Ageing International, 2014

Comments (0)

Please log in or register to comment.