Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

A k-anonymity privacy-preserving approach in wireless medical monitoring environments

  • Original Article
  • Published:
Personal and Ubiquitous Computing Aims and scope Submit manuscript

Abstract

With the proliferation of wireless sensor networks and mobile technologies in general, it is possible to provide improved medical services and also to reduce costs as well as to manage the shortage of specialized personnel. Monitoring a person’s health condition using sensors provides a lot of benefits but also exposes personal sensitive information to a number of privacy threats. By recording user-related data, it is often feasible for a malicious or negligent data provider to expose these data to an unauthorized user. One solution is to protect the patient’s privacy by making difficult a linkage between specific measurements with a patient’s identity. In this paper we present a privacy-preserving architecture which builds upon the concept of k-anonymity; we present a clustering-based anonymity scheme for effective network management and data aggregation, which also protects user’s privacy by making an entity indistinguishable from other k similar entities. The presented algorithm is resource aware, as it minimizes energy consumption with respect to other more costly, cryptography-based approaches. The system is evaluated from an energy-consuming and network performance perspective, under different simulation scenarios.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  1. Samarati P, Sweeney L (1998) “Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression”, technical report SRI-CSL-98-04. Computer Science Laboratory, SRI International

  2. Hoh B, Gruteser M (2005) Protecting location privacy through path confusion. In: Securecomm, IEEE Press, pp 194–205

  3. Ouyang Y, Le Z, Xu Z, Triandopoulos N, Zhang S, Ford J, Makedon F (2007) Providing anonymity in wireless sensor networks. In: Proceedings of the IEEE international conference on pervasive services (ICPS’07). Istanbul, Turkey, pp. 145–148

  4. Abbasi A, Khonsari A, Talebi M (2009) Source location anonymity for sensor networks. In: Proceedings of the 6th IEEE conference on consumer communications and networking conference (CCNC’09). IEEE Press, Piscataway, NJ, USA, pp 588–592

  5. Mehta K, Liu D, Wright M (2007) Location privacy in sensor networks against a global eavesdropper. In: Proceedings of the IEEE international conference on network protocols, ICNP, pp 314–323

  6. Gruteser M, Schelle G, Jain A, Han R, Grunwald D (2003) Privacy-aware location sensor networks. In: Proceedings of the 9th workshop on hot topics in operating systems (HotOS’03)

  7. Shao M, Zhu S, Zhang W, Cao G (2007) pDCS: security and privacy support for data-centric sensor networks. In: Proceedings of the 26th IEEE international conference on computer communications, IEEE INFOCOM, pp 1298–1306

  8. Priyantha N, Chakraborty A, Balakrishnan H (2000) The cricket location-support system. In Proceedings of the sixth annual international conference on mobile computing and networking. In Proceedings of the MOBICOM 2000. Boston, MA, pp 32–43

  9. Chow C-Y, Mokbel M, He T (2011) A privacy preserving location monitoring system for wireless sensor networks. IEEE Trans Mob Comput 10(1):94–107

    Article  Google Scholar 

  10. Belsis P, Pantziou G (2011) Protecting anonymity in wireless medical monitoring environments. In: Proceedings of the 4th international conference on PErvasive technologies related to assistive environments (PETRA‘11). ACM, New York, NY, USA (Article 55)

  11. DiPietro R, Mancini LV, Jajodia S (2003) Providing secrecy in key management protocols for large wireless sensor networks. J AdHoc Netw 1(4):455–468

    Google Scholar 

  12. Newsome J, Shi R, Song D, Perrig A (2004) The Sybil attack in sensor networks: analysis and defenses. In Proceedings of the IEEE international conference on information processing in sensor networks, (IPSN 2004)

  13. Olariu S, Eltoweissy M, Younis M (2005) ANSWER: autonomous wireless sensor network. In: Proceedings of the 1st ACM international workshop on QoS and security for wireless and mobile networks (Q2SWinet’05). Montreal, Canada

  14. Pfitzmann A, Köhntopp M (2000) Anonymity, unobservability, and pseudonymity—a proposal for terminology. In: Federrath H (ed) DIAU’00. LNCS 2009, 1–9

  15. Sohrabi K, Gao J, Ailawadhi V, Pottie G (2000) Protocols for self-organization of a wireless sensor network. IEEE Pers Commun 7(5):16–27

    Article  Google Scholar 

  16. Perrig A, Szewczyk R, Wen V, Culler D, Tygar JD (2001) SPINS: security protocols for sensor networks. In: Proceedings of ACM MobiCom’01. Rome, Italy, pp 189–199

  17. Vogt H (2004) Exploring message authentication in sensor networks. In: Proceedings of ESAS 2004 (1st European workshop on security in ad hoc and sensor networks), LNCS. Springer, Heidelberg, Germany

  18. Heidemann J, Silva F, Intanagonwiwat C, Govindan R, Estrin D, Ganesan D (2001) Building efficient wireless sensor networks with low-level naming. In SOSP

  19. Mamalis B, Gavalas D, Konstantopoulos C, Pantziou G (2009) Clustering in wireless sensor networks. In: Zhang Y, Yang LT, Chen J (eds) RFID and sensor networks: architectures, protocols, security and integrations. CRC Press, Boca Raton, FL, pp 324–353

    Google Scholar 

  20. Abbasi A, Younis M (2007) A survey on clustering algorithms for wireless sensor networks. Comput Commun 30:2826–2841

    Article  Google Scholar 

  21. Xu K, Gerla M (2002) A heterogeneous routing protocol based on a new stable clustering scheme. In: Proceeding of IEEE military communications conference (MILCOM 2002). Anaheim, CA

  22. Hill J, Szewczyk R, Woo A, Hollar S, Culler D, Pister K (2000) System architecture directions for network sensors. In: ASPLOS, pp 93–104

  23. Wang Q, Hempstead M, Yang W (2006) A realistic power consumption model for wireless sensor network devices. Sens Ad Hoc Commun Netw 1:286–295

    Google Scholar 

  24. Meulenaer G, Gosset F, Standaert F, Pereia O (2008) On the energy cost of communication and cryptography in wireless sensor networks. In: Proceedings of IEEE international conference on wireless and mobile computing and communication. Avignon, France, pp 580–585

  25. Healy M, Newe T, Lewis E (2007) Efficiently securing data on a wireless sensor network. J Phys Conf Ser 76(1):1–6

    Google Scholar 

  26. Law Y, Doumen J, Hartel P (2006) Survey and benchmark of block ciphers for wireless sensor networks. ACM Trans Sen Netw 2(1):65–93

    Article  Google Scholar 

  27. Piotrowski K, Langendoerfer P, Peter S (2006) How public key cryptography influences wireless sensor node lifetime. In: SASN’06: proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks. ACM, New York, NY, USA, pp 169–176

  28. IEEE Std 802.15.4™ (2003) Wireless medium access control (MAC) and physical layer (PHY) specifications for low-rate wireless personal area networks (LR-WPANs)

  29. Paek J, Chintalapudi K, Govindan R, Caffrey J, Masri S (2005) A wireless sensor network for structural health monitoring: performance and experience. In: EmNets’05: proceedings of the 2nd IEEE workshop on embedded networked sensors. IEEE Computer Society, Washington, DC, USA, pp 1–9

  30. The Pamvotis network performance simulator. http://pamvotis.org. Accessed Mar 2010

  31. Rivest R (1995) The RC5 encryption algorithm. In: Proceedings of the 1994 Leuven workshop on fast software encryption. Springer, pp 86–96

  32. Ganesan P, Venugopalan R, Peddabachagari P, Dean A, Mueller F, Sichitiu M (2003) Analyzing and modeling encryption overhead for sensor network nodes. In Proceedings of the 1st ACM international workshop on wireless sensor networks and applications. San Diego, California, USA

Download references

Acknowledgments

This research has been co-funded by the European Union (Social Fund) and Greek national resources under the framework of the “Archimedes III: Funding of Research Groups in TEI of Athens” project of the “Education & Lifelong Learning” Operational Programme.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Petros Belsis.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Belsis, P., Pantziou, G. A k-anonymity privacy-preserving approach in wireless medical monitoring environments. Pers Ubiquit Comput 18, 61–74 (2014). https://doi.org/10.1007/s00779-012-0618-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00779-012-0618-y

Keywords

Navigation