Jump to ContentJump to Main Navigation
Show Summary Details
More options …

Open Engineering

formerly Central European Journal of Engineering

Editor-in-Chief: Ritter, William

1 Issue per year

CiteScore 2017: 0.70

SCImago Journal Rank (SJR) 2017: 0.211
Source Normalized Impact per Paper (SNIP) 2017: 0.787

Open Access
See all formats and pricing
More options …

Efficient spatial privacy preserving scheme for sensor network

Ashmita Debnath / Pradheepkumar Singaravelu / Shekhar Verma
Published Online: 2012-12-29 | DOI: https://doi.org/10.2478/s13531-012-0048-7


The privacy of sensitive events observed by a wireless sensor networks (WSN) needs to be protected. Adversaries with the knowledge of sensor deployment and network protocols can infer the location of a sensed event by monitoring the communication from the sensors even when the messages are encrypted. Encryption provides confidentiality; however, the context of the event can used to breach the privacy of sensed objects. An adversary can track the trajectory of a moving object or determine the location of the occurrence of a critical event to breach its privacy. In this paper, we propose ring signature to obfuscate the spatial information. Firstly, the extended region of location of an event of interest as estimated from a sensor communication is presented. Then, the increase in this region of spatial uncertainty due to the effect of ring signature is determined. We observe that ring signature can effectively enhance the region of location uncertainty of a sensed event. As the event of interest can be situated anywhere in the enhanced region of uncertainty, its privacy against local or global adversary is ensured. Both analytical and simulation results show that induced delay and throughput are insignificant with negligible impact on the performance of a WSN.

Keywords: Privacy; Security; Wireless sensor network; Ring signature; Authentication

  • [1] Akyildiz F., Su W., Sankarasubramaniam Y., Cayirci E., A Survey on Sensor Networks, IEEE Communication Magazine, 2002, 102–114 Google Scholar

  • [2] Hong W.W., Ling C.Y., Design and Implementation of an ECDSA-Based Identity Authentication Protocol on WSN, IEEE Symposium of Wireless Communication, 2009, 1202–1205 Google Scholar

  • [3] Chen X., Makki K., Yen K., Pissinou N., Sensor Network Security: A Survey, IEEE Communications Surveys and Tutorials, 2009, 52–73 Google Scholar

  • [4] Chan H., Perrig A., Security and Privacy in Sensor Networks, IEEE Computer Magazine, 2003, 103–105 Google Scholar

  • [5] Delgosha F., Fekri F., A Multivariate Key-Establishment Scheme for Wireless Sensor Network, IEEE Transactions on Wireless Communications, 2009, 1814–1824 Web of ScienceGoogle Scholar

  • [6] Li N. et al., Privacy Preservation in Wireless Sensor Networks: A State-of-the-art Survey, International Journal on Ad Hoc Networks, Elsevier, 2009, 1501–1514 Google Scholar

  • [7] Kamat P., Trappe W., Zhang Y.Y., Ozturk C., Enhancing Source Location Privacy in Sensor Network Routing, Proceedings of the 25th IEEE International Conference on Distributed Computing Systems, 2005, 599–608 Google Scholar

  • [8] Kamat P., Xu W.Y., Trappe W., Zhang Y.Y., Temporal Privacy in Wireless Sensor Networks, Proceedings of the 27th International Conference on Distributed Computing Systems, 2007, 23–23 Google Scholar

  • [9] Xi Y., Schwiebert L., Shi W.S., Preserving Source Location Privacy in Monitoring-Based Wireless Sensor Networks, Proceedings of the 20th International Parallel and Distributed Processing Symposium, 2006 Google Scholar

  • [10] Yang Y. et al., Towards Event Source Unobservability with Minimum Network Traffic in Sensor Networks, Proceedings of the 1st ACM Conference on Wireless Network Security, 2008, 77–88 Google Scholar

  • [11] Mehta K., Liu D.G., Wright M., Location Privacy in Sensor Networks against a Global Eavesdropper, Proceedings of the IEEE International Conference on Network Protocols, 2007, 314–323 Google Scholar

  • [12] Lu R., Lin X., Zhu H., Shen X., TESP2: Timed Efficient Source Privacy Preservation Scheme for Wireless Sensor Networks, Proceedings of the IEEE Conference on Communication, 2010 Google Scholar

  • [13] Dieu D. et al., EDPPS: An Energy-efficient Data Privacy Protection Scheme for Wireless Sensor Networks, Proceedings of the 5th International Conference on Computer Sciences and Convergence Information Technology, 2010 Google Scholar

  • [14] Qi Z.H., Yang G., Ren X.Y., Li Y.W., An ID-based Ring Signcryption Scheme for Wireless Sensor Networks, Proceedings of the International Conference on Wireless Sensor Network, 2010, 368–373 Google Scholar

  • [15] Zhang R., Zhang Y., Ren K., DP2AC: Distributed Privacy-Preserving Access Control in Sensor Networks, Proceedings of the 28th Annual IEEE International Conference on Computer Communications, 2009, 1251–1259 Google Scholar

  • [16] Li Y., Ren J., Preserving Source-Location Privacy in Wireless Sensor Networks, Proceedings of the 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, 2009, 1–9 Google Scholar

  • [17] Cheikhrouhou O., RiSeG: A Logical Ring Based Secure Group Communication Protocol for Wireless Sensor Networks, Proceedings of the International Conference on Communication in Wireless Environments and Ubiquitous Systems: New Challenges, 2010, 1–5 Google Scholar

  • [18] Rivest R., Shamir A., Tauman Y., How to Leak a Secret, Advance in cryptology-ASIACrypt, LNCS 2248, Springer, 2001, 552–565 Google Scholar

  • [19] Bresson E., Stern J., Szydlo M., Threshold Ring Signatures and Applications to Ad-Hoc Groups, Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology, LNCS 2442, Springer, 2002, 465–480 Google Scholar

  • [20] Xiao J.F., Zeng G.H., Improved Threshold Ring Signature for Ad-Hoc Group, International Conference on Wireless Communication, Networking and Mobile Computing, 2006, 1–4 Google Scholar

  • [21] Wang L., Zhang G., Ma C., A Survey of Ring Signature, International Journal on Frontiers of Electrical and Electronic Engineering, Springer, 2008, 19 Google Scholar

  • [22] Freudiger J., Raya M., Hubaux J.P., Self-Organized Anonymous Authentication in Mobile Ad Hoc Networks, Proceedings of the International Conference on Security and Privacy in Communication Networks, 2009, 350–372 Google Scholar

  • [23] Gervasi O. et al., Linkable Ring Signatures: Security Models and New Schemes, Computational Science and its Applications, LNCS 3481, Springer, 2005, 614–623 Google Scholar

  • [24] Tsang P. et al., Separable Linkable Threshold Ring Signatures, Proceedings of Cryptology — INDOCRYPT, LNCS 3348, 2005, 337–376 Google Scholar

  • [25] Liu J., Wei V., Wong D., Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups, Information Security and Privacy, LNCS 3108, Springer, 2004, 325–335 Google Scholar

  • [26] Chaurasia B.K., Verma S., Tomar G.S., Abraham A., Optimizing Pseudonym Updation in Vehicular Ad-hoc Networks, Transactions on Computational Science IV, Special Issue on Security in Computing, LNCS 5430, Springer, 2009, 136–148 Google Scholar

  • [27] Chaurasia B.K., Verma S., Maximizing Anonymity of a Vehicle, Journals of Autonomous and Adaptive Communication Systems, Special Issue on: Security, Trust, and Privacy in DTN and Vehicular Communication, Inderscience, Vol. 3,No. 2, 2010, 198–216 Google Scholar

  • [28] Singaravelu P., Verma S., Performance Analysis of Multivariate Cryptosystems for Wireless Sensor Network, Computer and Electrical Engineering Journal, Elsevier, 2012 Google Scholar

About the article

Published Online: 2012-12-29

Published in Print: 2013-03-01

Citation Information: Open Engineering, Volume 3, Issue 1, Pages 1–10, ISSN (Online) 2391-5439, DOI: https://doi.org/10.2478/s13531-012-0048-7.

Export Citation

© 2012 Versita Warsaw. This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License. BY-NC-ND 3.0

Citing Articles

Here you can find all Crossref-listed publications in which this article is cited. If you would like to receive automatic email messages as soon as this article is cited in other publications, simply activate the “Citation Alert” on the top of this page.

J. M. de Fuentes, L. González-Manzano, and O. Mirzaei
Journal of Sensors, 2016, Volume 2016, Page 1

Comments (0)

Please log in or register to comment.
Log in