Abstract
With the proliferation of wireless sensor networks and mobile technologies in general, it is possible to provide improved medical services and also to reduce costs as well as to manage the shortage of specialized personnel. Monitoring a person’s health condition using sensors provides a lot of benefits but also exposes personal sensitive information to a number of privacy threats. By recording user-related data, it is often feasible for a malicious or negligent data provider to expose these data to an unauthorized user. One solution is to protect the patient’s privacy by making difficult a linkage between specific measurements with a patient’s identity. In this paper we present a privacy-preserving architecture which builds upon the concept of k-anonymity; we present a clustering-based anonymity scheme for effective network management and data aggregation, which also protects user’s privacy by making an entity indistinguishable from other k similar entities. The presented algorithm is resource aware, as it minimizes energy consumption with respect to other more costly, cryptography-based approaches. The system is evaluated from an energy-consuming and network performance perspective, under different simulation scenarios.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Samarati P, Sweeney L (1998) “Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression”, technical report SRI-CSL-98-04. Computer Science Laboratory, SRI International
Hoh B, Gruteser M (2005) Protecting location privacy through path confusion. In: Securecomm, IEEE Press, pp 194–205
Ouyang Y, Le Z, Xu Z, Triandopoulos N, Zhang S, Ford J, Makedon F (2007) Providing anonymity in wireless sensor networks. In: Proceedings of the IEEE international conference on pervasive services (ICPS’07). Istanbul, Turkey, pp. 145–148
Abbasi A, Khonsari A, Talebi M (2009) Source location anonymity for sensor networks. In: Proceedings of the 6th IEEE conference on consumer communications and networking conference (CCNC’09). IEEE Press, Piscataway, NJ, USA, pp 588–592
Mehta K, Liu D, Wright M (2007) Location privacy in sensor networks against a global eavesdropper. In: Proceedings of the IEEE international conference on network protocols, ICNP, pp 314–323
Gruteser M, Schelle G, Jain A, Han R, Grunwald D (2003) Privacy-aware location sensor networks. In: Proceedings of the 9th workshop on hot topics in operating systems (HotOS’03)
Shao M, Zhu S, Zhang W, Cao G (2007) pDCS: security and privacy support for data-centric sensor networks. In: Proceedings of the 26th IEEE international conference on computer communications, IEEE INFOCOM, pp 1298–1306
Priyantha N, Chakraborty A, Balakrishnan H (2000) The cricket location-support system. In Proceedings of the sixth annual international conference on mobile computing and networking. In Proceedings of the MOBICOM 2000. Boston, MA, pp 32–43
Chow C-Y, Mokbel M, He T (2011) A privacy preserving location monitoring system for wireless sensor networks. IEEE Trans Mob Comput 10(1):94–107
Belsis P, Pantziou G (2011) Protecting anonymity in wireless medical monitoring environments. In: Proceedings of the 4th international conference on PErvasive technologies related to assistive environments (PETRA‘11). ACM, New York, NY, USA (Article 55)
DiPietro R, Mancini LV, Jajodia S (2003) Providing secrecy in key management protocols for large wireless sensor networks. J AdHoc Netw 1(4):455–468
Newsome J, Shi R, Song D, Perrig A (2004) The Sybil attack in sensor networks: analysis and defenses. In Proceedings of the IEEE international conference on information processing in sensor networks, (IPSN 2004)
Olariu S, Eltoweissy M, Younis M (2005) ANSWER: autonomous wireless sensor network. In: Proceedings of the 1st ACM international workshop on QoS and security for wireless and mobile networks (Q2SWinet’05). Montreal, Canada
Pfitzmann A, Köhntopp M (2000) Anonymity, unobservability, and pseudonymity—a proposal for terminology. In: Federrath H (ed) DIAU’00. LNCS 2009, 1–9
Sohrabi K, Gao J, Ailawadhi V, Pottie G (2000) Protocols for self-organization of a wireless sensor network. IEEE Pers Commun 7(5):16–27
Perrig A, Szewczyk R, Wen V, Culler D, Tygar JD (2001) SPINS: security protocols for sensor networks. In: Proceedings of ACM MobiCom’01. Rome, Italy, pp 189–199
Vogt H (2004) Exploring message authentication in sensor networks. In: Proceedings of ESAS 2004 (1st European workshop on security in ad hoc and sensor networks), LNCS. Springer, Heidelberg, Germany
Heidemann J, Silva F, Intanagonwiwat C, Govindan R, Estrin D, Ganesan D (2001) Building efficient wireless sensor networks with low-level naming. In SOSP
Mamalis B, Gavalas D, Konstantopoulos C, Pantziou G (2009) Clustering in wireless sensor networks. In: Zhang Y, Yang LT, Chen J (eds) RFID and sensor networks: architectures, protocols, security and integrations. CRC Press, Boca Raton, FL, pp 324–353
Abbasi A, Younis M (2007) A survey on clustering algorithms for wireless sensor networks. Comput Commun 30:2826–2841
Xu K, Gerla M (2002) A heterogeneous routing protocol based on a new stable clustering scheme. In: Proceeding of IEEE military communications conference (MILCOM 2002). Anaheim, CA
Hill J, Szewczyk R, Woo A, Hollar S, Culler D, Pister K (2000) System architecture directions for network sensors. In: ASPLOS, pp 93–104
Wang Q, Hempstead M, Yang W (2006) A realistic power consumption model for wireless sensor network devices. Sens Ad Hoc Commun Netw 1:286–295
Meulenaer G, Gosset F, Standaert F, Pereia O (2008) On the energy cost of communication and cryptography in wireless sensor networks. In: Proceedings of IEEE international conference on wireless and mobile computing and communication. Avignon, France, pp 580–585
Healy M, Newe T, Lewis E (2007) Efficiently securing data on a wireless sensor network. J Phys Conf Ser 76(1):1–6
Law Y, Doumen J, Hartel P (2006) Survey and benchmark of block ciphers for wireless sensor networks. ACM Trans Sen Netw 2(1):65–93
Piotrowski K, Langendoerfer P, Peter S (2006) How public key cryptography influences wireless sensor node lifetime. In: SASN’06: proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks. ACM, New York, NY, USA, pp 169–176
IEEE Std 802.15.4™ (2003) Wireless medium access control (MAC) and physical layer (PHY) specifications for low-rate wireless personal area networks (LR-WPANs)
Paek J, Chintalapudi K, Govindan R, Caffrey J, Masri S (2005) A wireless sensor network for structural health monitoring: performance and experience. In: EmNets’05: proceedings of the 2nd IEEE workshop on embedded networked sensors. IEEE Computer Society, Washington, DC, USA, pp 1–9
The Pamvotis network performance simulator. http://pamvotis.org. Accessed Mar 2010
Rivest R (1995) The RC5 encryption algorithm. In: Proceedings of the 1994 Leuven workshop on fast software encryption. Springer, pp 86–96
Ganesan P, Venugopalan R, Peddabachagari P, Dean A, Mueller F, Sichitiu M (2003) Analyzing and modeling encryption overhead for sensor network nodes. In Proceedings of the 1st ACM international workshop on wireless sensor networks and applications. San Diego, California, USA
Acknowledgments
This research has been co-funded by the European Union (Social Fund) and Greek national resources under the framework of the “Archimedes III: Funding of Research Groups in TEI of Athens” project of the “Education & Lifelong Learning” Operational Programme.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Belsis, P., Pantziou, G. A k-anonymity privacy-preserving approach in wireless medical monitoring environments. Pers Ubiquit Comput 18, 61–74 (2014). https://doi.org/10.1007/s00779-012-0618-y
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00779-012-0618-y