Abstract
Sensor network maintains high limitation of resource because it performs many communications in order to create encryption keys. To solve this problem, this research suggests LA2EP. LA2EP Protocol can minimize resource and provides a new scheme for authentication and encryption that can provide anonymity of node for safe communication. To analyze the performance of the suggested scheme, a degree of anonymity that is provided by the scheme suggested by using an Entropy-based modeling was measured. As a result, when the suggested scheme was used, the degree of anonymity of sensor node was high. It showed that an important element to increase the degree of anonymity was to let the sensor’s ID not known correctly. Also, as a result of calculating spaces for operation, communication, and storage while considering the characteristic of sensor network, which is limited in resource, it showed suitability for sensor network environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Akkaya, K., Younis, M.: A survey on routing protocols for wireless sensor networks. Ad Hoc Networks 3, 325–349 (2005)
Li, N., Zhang, N., Das, S.K., Thuraisingham, B.: Privacy preservation in wireless sensor networks: A state-of-the-art survey. Ad Hoc Networks 7(8), 1501–1514 (2009)
Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Procs. of the 1st Int. Conf. on Mobile Systems, Applications and Services, pp. 31–42. ACM (2003)
Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 571–588 (2002)
Wadaa, A., Olariu, S., Wilson, L., Eltoweissy, M., Jones, K.: On providing anonymity in wireless sensor networks. In: ICPADS 2004, pp. 411–418 (2004)
Mehta, K., Liu, D., Wright, M.: Location privacy in sensor networks against a global eavesdropper. In: ICNP 2007, pp. 314–323 (2007)
Xi, Y., Schwiebert, L., Shi, W.: Preserving source location privacy in monitoring-based wireless sensor networks. In: Procs. of the 20th Int. Parallel and Distributed Processing Symposium. IEEE Computer Society (2006)
Ozturk, C., Zhang, Y., Trappe, W.: Source-location privacy in energy-constrained sensor network routing. In: Procs. of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 88–93. ACM (2004)
Misra, S., Xue, G.: Efficient anonymity schemes for clustered wireless sensor networks. IJSNet, 50–63 (2006)
Pietro, R.D., Mancini, L.V., Mei, A.: Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks. Wirel. Netw. 12(6), 709–721 (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Park, JH., Jung, YH., Lee, KH., Lee, KW., Jun, MS. (2011). An Enhanced Data Privacy Mechanism Suitable for Ubiquitous Sensor Networks. In: Kim, Th., et al. Grid and Distributed Computing. GDC 2011. Communications in Computer and Information Science, vol 261. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27180-9_17
Download citation
DOI: https://doi.org/10.1007/978-3-642-27180-9_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-27179-3
Online ISBN: 978-3-642-27180-9
eBook Packages: Computer ScienceComputer Science (R0)