Abstract:This paper presents a review of privacy-preserving techniques for wireless sensor networks (WSN). A lot of work has been done to enhance efficient use of power and resources in wireless sensor networks with the help of specific routing algorithms and different layers' protocols. As the popularity and uses of wireless sensor network increase, privacy of individuals is of very high demand. In this paper two main categories of privacy preserving techniques for WSN have been presented, data-oriented and context-or… Show more
“…In this regard, WSN privacy needs have already been surveyed by several authors. Chow et al [3], Tayebi et al [4], Rios et al [5], Gupta and Chawla [6], Oualha and Olivereau [7], Conti et al [8], Bista and Chang [9], Alemdar and Ersoy [10], or Al Ameen et al [11] are representative examples of systematic literature reviews on the matter. All of them focus on the different techniques that are proposed by authors to address typical security and privacy needs.…”
Wireless Sensor Networks (WSNs) are attracting attention from the research community. One of the key issues is to provide them with privacy protection. In recent years, a huge amount of contributions has been focused on this area. Surveys and literature reviews have also been produced to give a systematic view of the different approaches taken. However, no previous work has focused on privacy models, that is, the set of assumptions made to build the approach. In particular, this paper focuses on this matter by studying 41 papers of the last 5 years. We highlight the great differences appearing among related papers that could make them incompatible to be applied simultaneously. We propose a set of guidelines to build comprehensive privacy models so as to foster their comparability and suitability analysis for different scenarios.
“…In this regard, WSN privacy needs have already been surveyed by several authors. Chow et al [3], Tayebi et al [4], Rios et al [5], Gupta and Chawla [6], Oualha and Olivereau [7], Conti et al [8], Bista and Chang [9], Alemdar and Ersoy [10], or Al Ameen et al [11] are representative examples of systematic literature reviews on the matter. All of them focus on the different techniques that are proposed by authors to address typical security and privacy needs.…”
Wireless Sensor Networks (WSNs) are attracting attention from the research community. One of the key issues is to provide them with privacy protection. In recent years, a huge amount of contributions has been focused on this area. Surveys and literature reviews have also been produced to give a systematic view of the different approaches taken. However, no previous work has focused on privacy models, that is, the set of assumptions made to build the approach. In particular, this paper focuses on this matter by studying 41 papers of the last 5 years. We highlight the great differences appearing among related papers that could make them incompatible to be applied simultaneously. We propose a set of guidelines to build comprehensive privacy models so as to foster their comparability and suitability analysis for different scenarios.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.