2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking &Amp; Services (MobiQuitous) 2007
DOI: 10.1109/mobiq.2007.4451016
|View full text |Cite
|
Sign up to set email alerts
|

Anonymous Data Collection in Sensor Networks

Abstract: Abstract-Sensor networks involving human participants will require privacy protection before wide deployment is feasible. This paper proposes and evaluates a set of protocols that enable anonymous data collection in a sensor network. Sensor nodes, instead of transmitting their actual data, transmit a sample of the data complement to a basestation. The basestation then uses the negative samples to reconstruct a histogram of the original sensor readings. These protocols, collectively defined as a negative survey… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

1
33
0

Year Published

2015
2015
2018
2018

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 65 publications
(34 citation statements)
references
References 20 publications
(16 reference statements)
1
33
0
Order By: Relevance
“…Horney et al [37] proposed a set of protocols that enable anonymous data collection in a sensor network. Sensor nodes, instead of transmitting their actual data, transmit a sample of the data complement to a base station, which then uses the negative samples to reconstruct a histogram of the original sensor readings.…”
Section: Related Workmentioning
confidence: 99%
“…Horney et al [37] proposed a set of protocols that enable anonymous data collection in a sensor network. Sensor nodes, instead of transmitting their actual data, transmit a sample of the data complement to a base station, which then uses the negative samples to reconstruct a histogram of the original sensor readings.…”
Section: Related Workmentioning
confidence: 99%
“…Multiple proposals have been developed, from the aggregation of values [5,6,7,28,29,30,31,32,33,34,35,36], to additions [2,3,26,37,38,39,40,41,42,43], calculus of minimums or maximums [10,44,45] or even more complex tasks such as averages [9,10,30,46], variances [9,46], range queries [6] or logic operations [8].…”
Section: Related Workmentioning
confidence: 99%
“…Anonymity is specially remarkable because aggregators should not learn particular data. Some proposals focus on the anonymity of messages passed through aggregator nodes [6,29,44] or on identity preservation of such nodes [7] or nodes providing information [2,3,5,26,38]. Anonymity is generally achieved by the use of cryptographic schemes, e.g.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations