SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010




   User Controlled Privacy in Participatory Sensing
                      Ramaprasada R. Kalidindi, KVSVN Raju1, V. Valli Kumari2, C.S. Reddy3
                                        Dept. of Computer Science and Engineering,
                                                S.R.K.R. Engineering College,
                                                 Bhimavaram-534204, India.
                                                  rrkalidindi@computer.org
                                     Dept. of Computer Science and Systems Engineering,
                                                AUCE(A), Andhra University,
                                                Visakhapatnam-533003, India.
                          1
                            kvsvn.raju@gmail.com, 2vallikumari@ieee.org, 3csatyanand@gmail.com

Abstract—Most of the sensor network applications in military                 First, the civic authorities in metropolitan cities
and civilian use are surreptitious. If these are used for the           provide general amenities and security to public depending
benefit of society in addition to the individual needs a new set
of applications can be developed. This paper describes                  on the time variant density of population during work hours
infrastructure monitoring based on collaboration between                in offices, evening at parks, and night at clubs etc. This
sensor networks. The solution provides a reputation based               may vary during week days, weekends, festivals, functions
hybrid network where collaborative trust is established based
                                                                        and meetings. Estimating the requirement and deploying
on referrals (opinions).       Depending on the trust, the
information is exchanged between one entity and another with            the security personnel and ambulances and other amenities
different authorization levels. The outcome of the paper is             dynamically is not precise, as getting the real time data is
collaborative data collection with privacy levels controlled by         difficult and costly. Assuming that each person has a cell
individual users.
                                                                        phone, the population density of people at a point of time
Keywords- privacy control; trust; reputation; collaborative             can be identified using cell phone location [7].
networks; urban sensing; participatory sensing; sensor
networks.
                                                                             Second, the spread of a contagious disease and its
                                                                        consequences are known to public and health authorities
                     I. INTRODUCTION                                    only after certain causalities. But estimating the disease
                                                                        spread in real time depending on the people queries to
      Widespread use of low cost tiny sensors in civilian
applications and their eventual integration with Internet has           health websites (viz Google flu trends) minimizes
made them pervasive [1, 2, 3]. Often data collected from                causalities and certain areas can be quarantined in advance
sensor networks in the urban environments inhabited by                  [8].    Sharing person specific data for this type of
humans constitute personal information. The acceptance of               applications is not possible without the consent of its
these sensor networks as public infrastructure will need                owner. If the granularity of the data is high, there will be
citizens’ participation and collaboration. This type of                 more applications of this kind.
applications in urban areas is entirely different from habitat
                                                                             Automatic collection of higher granular data is
monitoring, where privacy is not a concern. Deploying
these networks without addressing the security and privacy              possible with networked sensors at higher densities. When
concerns will turn against those whom it is meant to                    these are used around human habitats they will collect
benefit. And user acceptance depends on the provision of                human related data, but people do not want to make private
appropriate mechanisms to deal with these concerns. The                 life public. Most of the today's sensor network applications
main privacy problem in sensor networks is; they generate               are pervasive in nature in which a centralized authority is
large volumes of information which is easily available
                                                                        used to collect data from individuals. But the individuals
through remote access. Ensuring that sensed information
stays within sensor network and is accessible only to                   are not having any control over their private data. For
trusted parties is an essential step toward achieving privacy           example, giving cell phone location to unauthorized
[4].                                                                    agencies is not allowed under privacy laws. If an individual
      Allowing individual’s control on how personal data is             is willing, this information can be shared with others.
collected, distributed and processed addresses privacy                  People may not be willing to share this information at all
(information privacy) issues. This can be achieved by                   times. If the individual is having control over when to
providing a resolution control in the hands of the user.
                                                                        share and what to share, more people will allow sharing.
High resolution data is more useful, but this choice could
be left to the individual provider so that privacy control can          This will lead to new applications like location advertising,
be done at the source [5, 6]. In an urban environment                   alerting nearest emergency services etc., where
establishing a sensor network over large area is not                    collaborative and opportunistic sensing is used to realize
practically feasible due to cost, but with people’s                     pervasive applications [9]. More people will participate in
participation this can be done with minimum cost. For                   these endeavors if privacy control is with individual rather
example, consider these two applications.                               than with centralized authority.


© 2010 ACEEE                                                       34
DOI: 01.IJNS.01.03.187
ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010



     For infrastructure monitoring applications in gated             applications in medical and vehicular network scenarios.
communities, apartment buildings and rented commercial               The authors integrated this mechanism into the hybrid
complexes, solutions are provided with different networks            hierarchical WSN using anonymization and controlled
for different tasks like power management, water                     information disclosure.
management, security and surveillance etc. With the
availability of sensors with multi-sensing capabilities and                III. COLLABORATION BASED INFRASTRUCTURE
Internet connectivity, these independent networks can be                                  MONITORING
converted to a single IP based Building Information
Network [10] to reduce the overall cost. This development            A. Application Scenario
in sensor networks will reduce man power and other costs                  Monitoring the flats in apartment buildings, houses in
for the infrastructure developer and facilitate monitoring of
                                                                     gated communities and shops in commercial complexes use
the property remotely by the owners. If the owner is
willing, these networks can be integrated to have pre-               video surveillance networks for maintaining security and
installed sensor networks by the developer. The owner will           other sensor networks for maintenance by the developer.
not accept developer control over his/her private data. If           The owners of the flats (or houses/shops) can also have
solutions are available to have control with the owner,              their own sensor networks to monitor their property. The
he/she may be interested to share some data willingly. Each          model describes sensor networks in apartment buildings,
owner can establish or can accept pre-installed individual           but it can also be applied to the other applications above.
network and it can be integrated with other individual
sensor networks to form an integrated network and                    B. Network Model
maintained by a third party. These sensor networks
maintained at a residential locality can be integrated with
                                                                                                    Internet             Base station
another network through Internet. This will create an urban
infrastructure for solid waste management, pollution
                                                                                                                         Cluster head
control, disaster management, etc., for the benefit of
citizens.                                                                                          B
     To this end, we described a model for infrastructure
                                                                                         C                         C
monitoring by collecting data from individual wireless
sensor networks (WSNs). The rest of the paper is
organized as follows: Section II describes related work,                                       C
section III describes collaboration based information                                                                    Sensor field
monitoring, section IV contains description of the model                            s4
and the trust value representation and assumptions, section                              s1              s2             Sensor node
V provide the evaluation of the model and section VI                                          s3   s1
concludes the paper and suggests possible future directions.                              Wired link              Wireless link

                                                                                      Figure 1 Hierarchical Wireless Sensor Network
                   II. RELATED WORK
                                                                          The proposed model in Fig. 1 is a hierarchical
     Giang et al. [11] proposed a scheme to control privacy
                                                                     architecture for integration of sensor networks with
exposure by trust evaluation on the basis of previous
                                                                     Internet.
transactions and peer recommendation.          The authors
                                                                          Wireless sensors ease the deployment1. The sensors
developed a methodology to estimate trust value and
                                                                     deployed in a flat (sensor field) are connected to a station
depending on this trust, users can have a privacy policy to
                                                                     called Cluster Head (C) stationed in each flat. Each Sensor
decide about how much data can be given to others. The
                                                                     Node sends data to cluster head. The cluster head stores
solution is for sharing personal data in the computer in a
                                                                     data from all sensors, so that the owner of the flat can
ubiquitous environment.
                                                                     decide with whom he/she can share the data. If the flat was
     The hybrid trust management scheme by Shaik et al.
                                                                     rented, the owner can delete private data from the cluster
[12] minimizes resource utilization at sensor nodes with a
                                                                     head and after that the tenant will be the owner of the data.
hierarchical distributed WSN, where the group has a trust
                                                                     These cluster heads are connected to a Base Station (B)
value.    The authors presented a trust model which
                                                                     maintained by maintenance authority and in turn the base
calculates trust in three phases at node, cluster head and
                                                                     station is connected to Internet. The cluster head will share
base station.
                                                                     certain infrastructure related data like overhead water tank
     Chen et al. [13] presented a scheme for trust rating
                                                                     level etc. with the base station. The base station will
propagation by on demand and trigger methods in WSNs.
The authors aggregated the trust rating from other nodes
                                                                     The sensor nodes are installed through a cluster head and the security key
with node’s trust value from its own observation.                    is only known to the particular cluster head. Since the wireless signal can
     Mitseva et al. [14] presented a privacy protection              be received by any cluster head within the range, the data is encrypted and
                                                                     only the corresponding cluster head can decrypt. Unidirectional wireless
mechanism with context aware trust establishment for
                                                                     links shown in Fig. 1 are secure links connected to cluster head.

© 2010 ACEEE                                                    35
DOI: 01.IJNS.01.03.187
ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010



maintain shared data and participate in urban infrastructure                       A user authorized at level A1 can have access to entire
through Internet.                                                            data at cluster head level, has privileges to give
     The data collection mechanism is composed of four                       authorization for other users and can configure the sensor
                                                                             network. At level A2 data from sensors s2, s3 and s4 can be
levels viz. sensor node, cluster head, base station and
                                                                             accessed. At level A3 data from s3 and s4 sensors can be
emergency agencies through Internet. Sensor nodes collect                    accessed. At level A4 data from s4 sensors can be accessed.
data from physical activity and send it to cluster head. The                 The data from s4 sensors is generated in emergencies and is
cluster head updates data at the base station periodically.                  available through base station. Since the owner of
Emergency management agencies can access data at base                        information can authorize others for different levels of
station through Internet to deal with emergencies or the                     authorization, the access control will be with owner. All
base station can alert the agency in case of emergencies.                    cluster heads send data from s3 and s4 sensors to base
                                                                             station. The data from s1 sensors is personal and is
Authorized users can access data at the cluster heads and
                                                                             accessible to the owner only. The data from sensors s2, s3
base station. This work attempted to give access to data                     and s4 can be shared with neighbors. They can access this
among trusted parties by finding the trustworthiness using                   data at their cluster head through a secured link provided
reputation.                                                                  by base station, since each cluster head is connected to base
     Sensor Nodes (s1-s4) collect data about the physical                    station.
activity like state of bedroom door, light, overhead water                         The authorization level A2, assigned to different
tank level, fire alarm etc. They transmit this data to Cluster               cluster heads may be withdrawn if the occupant of a flat
                                                                             does not have the trust on them. In a social community,
Head (C). The cluster heads are connected to Base Station
                                                                             trust between two individuals is developed based on their
(B). The base station sends emergency data to emergency                      transactions over time. When a flat owner who is in
services which are connected through Internet. The links                     control of cluster head wants to share information with
between sensor nodes and cluster head are unidirectional.                    friendly neighbors, he/she can trust only few neighbors.
The link between cluster head and base station is                            When these neighbors are changing continuously (new
bidirectional. These links are secured and the base station is               owners and new tenants) trusted neighbors are to be
                                                                             identified dynamically. For example, if the owner of a flat
connected to Internet.
                                                                             gives it for rent, the sensor network collects tenant’s data.
     This model assumes a multi-owner and multi-user                         The tenant may not be interested in sharing his/her data
network with sensor nodes, which continuously produce                        with owner's trusted friends, who may not be his/her trusted
data. The owners of different cluster heads can categorize                   friends. This requires calculation of trust about other
sensors as s1 to s4. Table I gives the type of data from                     cluster heads at the cluster head periodically. When faced
various sensors.                                                             with uncertainty, individuals trust and rely on the previous
                                                                             transactions and opinions of others who have good
                           TABLE I
                       TYPES OF SENSORS                                      transactions with them in the past.
  Sensor   Data of interest                                                       Initially when a new owner approaches maintenance
    s1     State of bed room door, light, etc. (Personal)                    authority for a flat, they will undertake an agreement which
    s2     State of living room door, water heater, A/C etc. (Flat           is a legally binding document on two parties. This
           utilities)                                                        document will give an initial trust, which is called as
    s3     Overhead tank water level, power meter reading, etc.
           (Maintenance utilities)
                                                                             institutional trust, between them. An owner develops a
    s4     Fire, theft alarm, earth quake detection, etc. (Emergency)        reputation for each other owner by making direct
                                                                             observations about other owners in the neighborhood. This
         The owners of cluster heads, administrator at base
                                                                             reputation is used to help an owner evaluate the
station and disaster management teams which are using the
                                                                             trustworthiness of others and make a decision to share data
emergency sensors' data will be the users of network. At
                                                                             within the network.  
each cluster head, there are four authorization levels A1 to
A4 to access different types of data. Table II gives the                                       IV. PROPOSED MODEL
authorization levels. These levels will determine to what
extent the user can have access to data.                                          In social environment, we trust people depending on
                                                                             past interactions with them. These past interactions will be
                           TABLE II
                   USER AUTHORIZATION LEVELS
                                                                             used to build reputation of a particular person. In the
                                                                             absence of these interactions, we take the opinion of others
   Level   Users
    A1     Self
                                                                             to build initial trust. In the network model described in
    A2     Trusted friends                                                   Section III.B, the data is stored with the cluster head and it
    A3     Infrastructure maintenance authority                              is exchanged with base station and other cluster heads,
    A4     Emergency services (Fire services, police, disaster               depending upon their authorization levels. We have to trust
           management teams, etc.)
                                                                             the entities behind these cluster heads and authorization
                                                                             levels are to be entrusted to each entity. Since this trust is

© 2010 ACEEE                                                            36
DOI: 01.IJNS.01.03.187
ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010



needed in between the entities which are dealing with                 value is one (i.e., Rii = 1 ). All transactions to itself are
                                                                                           e

authorization, only the network of base station and cluster
heads is considered.      The terminology used in the                 successful transactions (i.e., t ii = t ii ).
                                                                                                               s


remaining sections is given below.                                        Fig.2 shows transactions between base station and
Base station (B) is the maintenance authority, which will             nodes. Thick line indicates transaction and dashed line
maintain data coming from the cluster heads pertaining to             indicates a request to get opinion.
certain sensors and is connected to all cluster heads and the
Internet.
      Node (N) is the cluster head which will collect data                   B          N1      N2           Ni       Nj            Nn
from sensor nodes and forward certain type of sensors’
data to the base station.
     Neighbor is one of the remaining cluster heads which
                                                                                     Transaction              Request for opinion
is connected to base station with which a cluster head
wants to share information or collect opinion.                               Figure 2. Interactions with nodes to obtain Nj’s reputation
     Opinion ( O xy ) is the value given by a node x                       When a node Ni wants to calculate the trust of a
                                                                      particular node Nj it sends a broadcast request to base
depending upon the reputation of y.
                                                                      station and all other nodes. These nodes will respond to
A. Reputation                                                         this request by sending the reputation of Nj, and the total
     Reputation of a node is the satisfaction of usage of             number of transactions with Nj, which are available in their
shared data and its reciprocation in sharing data. As part of         respective reputation tables. Responding to the request is
infrastructure, the nodes are sharing part of the data with           treated as positive transaction which will increase the
base station. The base station gives reputation ratings               reputation of responding node there by encouraging
depending on their participation in sharing the data. A node          responses. Every time a node interacts with other node it
can also share data with another node and it gives                    updates its reputation table.
reputation rating depending on how the other node is using
                                                                      B. Direct Reputation
the shared data and whether it is sharing data with it or not.
                                                                                                   e
A node can take reputations from other nodes and can                  The direct reputation Rij is the ratio of successful and total
derive an opinion value considering the reputations and its           transactions of node Ni with node Nj. When a node
own transactions.                                                     requests for information from a node, if other node
     Let there are n nodes (N1 - Nn) connected to base                responds by sending the information it will be treated as
station, B. The Reputation of a neighbor Nj at node Ni is             successful transaction; no response will be treated as
derived from direct reputation of Nj at Ni and observed               unsuccessful transaction. When a node Ni is having t ij
reputation of Nj collected from other nodes and base station                                               s
                                                                      total transactions and among them t ij is the successful
                                       e
at Ni.   The direct reputation, R     ij   is an event driven         number of transactions with Nj, the direct reputation is
                                                                      given as in (1).
reputation of a node Nj as perceived by node Ni when it is                                          s
directly transacting with node Nj and Rij ∈ [0,1] .
                                       e                                                         t ij
                                                         The                               Rij =
                                                                                            e
                                                                                                         (1)
                                                                                                 t ij
                     o
observed reputation Rij of a node Nj as perceived by node
                                                                           In a social environment, when we deal with persons,
Ni reflects the Nj’s behavior with neighbors in the                   we form an opinion taking the reputation of that person in
community and Rij ∈ [0,1] .
               o
                               The base station is having             the community into account. It may be a positive or
                                                                      negative opinion depending on various inputs we have
transactions with all other nodes. The nodes may or may
                                                                      about that person. The definition of opinion, as given by
not have transactions with other nodes; t ij is the total and
                                                                      Oxford dictionary, is a belief or judgment about a
  s                                                                   particular thing, which is not necessarily based on fact or
t ij is the successful number of transactions between nodes
                                                                      knowledge. If reputation is considered to form an opinion,
Ni and Nj.
                                                                      more than half of successful transactions be considered as
     The base station and each node will maintain a
                                                                      positive and less than half be as negative. The personal
reputation table consisting of direct reputation of the node
and total number of transactions with that node for base              opinion Oijp of node Ni about Nj is given as in (2).
station and all nodes in the network. The self reputation



© 2010 ACEEE                                                     37
DOI: 01.IJNS.01.03.187
ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010



                    ⎪
             Oijp = ⎨ ij
                         (
                    ⎧ R e − 0.5       )    if   t ij ≠ 0
                                                                   (2)                              nt
                                                                                                                              ∑
                                                                                                                                 n
                                                                                                                                         t kj

                    ⎪0                          t ij = 0                                                                      k = b ,1
                                                                                                         ij
                                           if                                              wi =                 if   t ij <                     (6)
                    ⎩                                                                                n                               n
                                                                                                  ∑      t kj

     Oijp ∈ [− 0.5,0.5] , a positive value represents positive
                                                                                                  k = b ,1

                                                                                       Users at cluster heads collect opinions and consider
opinion and negative value represents negative opinion.                           them in establishing trust with neighbors. Depending on
                                                                                  this trust they authorize users to different levels, thereby
C. Observed Reputation
                             o
                                                                                  having the control to which they have to share their data.
    The observed reputation Rbj is derived from the
reputation collected from base station by node Ni about Nj                                           V.         MODEL EVALUATION
and base station reputation at node Ni. For example, if Ni                              In the housing infrastructure having hundreds of
requests base station to send data about Nj, the base station                     houses at particular place is quite common, but having
       e                                   o
sends Rbj and t bj values. The reputation Rij is derived                          thousands of houses in a single project is very rare. For
                                  e
                                                                                  evaluating our model we have taken one hundred nodes
from the direct reputation value Rbj received from base
                                                                                  having trasactions upto ten thousand. Opinions were
                               e                                                  derived from the reputations and majority opinion is taken
station and direct reputation Rib stored at node Ni about
                                                                                  for consideratrion for other’s opinion as shown in Fig.3.
base station as in (3).
                             Rbj = Rib ⋅ Rb j
                              o     e     e
                                                       (3)
    Opinion ( obj ) of base station about node Nj is given as
in (4).

                  ⎧ o(
                  ⎪ R − 0.5
            obj = ⎨ bj
                                     )    if    t bj ≠ 0
                                                                   (4)
                  ⎪0
                  ⎩                       if    t bj = 0

     obj ∈ [− 0.5,0.5] , since the opinions collected from
base station and other nodes may not match with each
other, these are rounded to one decimal place so that                             The Fig.4 shows majority opinion when the number of
                                                   (
majority opinion is selected. Let S = obj , o1 j , o 2 j ,.......o nj    )        responidng nodes for giving the opinon are varying. The
                                                                                  average opinion, which will vary with the values given by
be the set of opinions (rounded to one decimal place) from                        responding nodes, is also shown. The majority opinion is
base station and other nodes. The majority of the observed                        almost constant except one, for sufficient number of
opinions Oij is given as Oij = M (S ) , where M is a function
          o               o
                                                                                  transactions.
to find the mode of given set of opinions S from base
station and other nodes.
D. Evaluating the Opinion
     The overall opinion Oij is node Ni’s opinion on Nj and
is given as in (5).
                 Oij = wi Oijp + (1 − wi )Oij
                                           o
                                                             (5)
    Where wi is the weight assigned to personal opinion
among personal and other’s opinion at Ni. When a node is
having sufficient number of transactions to judge, there is
no necessity of taking other’s opinions. If a node is having
total transactions more than the average total transactions                            In this paper, we presented a procedure to evaluate
done by other nodes, the node will take only its opinion                          opinion values. These values are used to establish trust and
into account ( wi = 1 ) otherwise other’s opinion is also                         thereby to give authorization. But the behavior of nodes
considered then the weight wi is given as in (6).                                 with bad intentions and colluding with other nodes to get
                                                                                  good opinion are hindrance to the trust establishment.




© 2010 ACEEE                                                                 38
DOI: 01.IJNS.01.03.187
ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010



       VI.    CONCLUSION AND FUTURE DIRECTIONS                       [5] D. Cuff, M. Hansen, and J. Kang, “Urban sensing: Out of the
                                                                          woods,” Communications of ACM, vol.51, March 2008, pp.
   With the emergence of widespread use of sensors in an                  24-33.
urban environment, the need for a proper trust management            [6] D. Wright, D. et al., “The illusion of security,”
between the collaborative entities and the need of the                    Communications. of ACM, vol. 51, March 2008, pp. 56-63.
privacy control with each collaborative entity is strongly           [7] K. Shilton, “Four billion little brothers? Privacy, mobile
                                                                          phones, and ubiquitous data collection,” Communications of
felt. Privacy control at the source will enable willing and               ACM, vol. 52, November 2009, pp. 48-53.
engaged participation of citizens to create urban                    [8] Google,         “Google        flu       trends,”      2010,
infrastructure with reduced cost. This work considered the                http://www.google.org/flutrends (2nd August 2010).
problem of establishing trust with neighbors in a                    [9] C. Cornelius, A. Kapadia, D. Kotz, D. Peebles, M. Shin, and
sufficiently large residential community by collecting                    N. Triandopoulos, “AnonySense: Privacy-aware people
                                                                          centric sensing,” Proc. ACM MobiSys’08, 2008, pp.2 11-
opinions from others. The data is shared by setting                       224.
authorization levels to others depending on trust. Trust             [10] Cisco, “Cisco Connected Real Estate for healthcare:
estimation under malicious behavior of nodes, collusion                   Changing how hospital real estate is developed, used, and
between nodes to get authorization is a problem. Taking                   managed,” 2009, www.cisco.com/.../healthcare/08CS1312-
risk factor into consideration along with trust to exchange               HC_Conn_RealEst_20090208.pdf (2nd August 2010), 6
                                                                          pages.
data are the areas to be considered for further study to have
                                                                     [11] P.D. Giang, L.X. Hung, R.A. Shaikh, Y. Zhung, S. Lee, Y.K.
a robust trust management for participatory sensor                        Lee, and H. Lee, “A trust based approach to control privacy
networks.                                                                 exposure in ubiquitous computing environments,” Proc.
                                                                          IEEE Int. Conf. on Pervasive Services, 2007, pp. 149-152.
                       REFERENCES                                    [12] R.A. Shaik, H. Jameel, S. Lee, S. Rajput, and Y.J. Song,
                                                                          “Trust management problem in distributed wireless sensor
[1] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E.                   networks,” Proc. 12th IEEE Int. Conf. on Embedded and Real
    Cayirci, “A survey on sensor networks,” IEEE Commn.                   Time Computing and Applications, IEEE Computer Society,
    Mag., vol. 40, August 2002, pp. 102-114.                              2006, 4 pages.
[2] C. Chong, and S.P. Kumar, “Sensor networks: Evolution,           [13] H. Chen, H. Wu, X. Cao, and C. Gao, “Trust propagation
    opportunities, and challenges,” Proceedings of the IEEE,              and aggregation in wireless sensor networks,” Proc. Japan-
    vol.91, August 2003, pp. 1247-56.                                     China Joint Workshop on Frontier of Computer Science and
[3] D. Estrin, R. Govindan, J. Heidemann, and S. Kumar, “Next             Technology, IEEE Computer Society, 2007, 8 pages.
    century challenges: Scalable coordination in sensor              [14] A. Mitseva, M. Gerlach, and N.R. Prasad, “Privacy
    networks,” Proc. ACM Mobicom’99, 1999, pp. 263-270.                   protection mechanisms for hybrid hierarchical wireless
[4] H. Chan, and A. Perrig, “Security and privacy in sensor               sensor networks,” Proc. IEEE ISWCS 2007, pp. 332-336.
    networks,” IEEE Computer, vol. 36, October 2003, pp. 103-
    105.




© 2010 ACEEE                                                    39
DOI: 01.IJNS.01.03.187

Weitere ähnliche Inhalte

Was ist angesagt?

InfoSec Technology Management of User Space and Services Through Security Thr...
InfoSec Technology Management of User Space and Services Through Security Thr...InfoSec Technology Management of User Space and Services Through Security Thr...
InfoSec Technology Management of User Space and Services Through Security Thr...ecarrow
 
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...IJCNCJournal
 
Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingRutvik Pensionwar
 
Context-aware Mobile Computing - a Literature Review
Context-aware Mobile Computing - a Literature ReviewContext-aware Mobile Computing - a Literature Review
Context-aware Mobile Computing - a Literature ReviewThiwanka Makumburage
 
Todays Mobile Cybersecurity
Todays Mobile CybersecurityTodays Mobile Cybersecurity
Todays Mobile CybersecurityVivastream
 
Digital Marketing First 2014 - Context Aware Computing and Cross Channel Pers...
Digital Marketing First 2014 - Context Aware Computing and Cross Channel Pers...Digital Marketing First 2014 - Context Aware Computing and Cross Channel Pers...
Digital Marketing First 2014 - Context Aware Computing and Cross Channel Pers...Argus Labs
 
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor NetworksMulti-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor NetworksIDES Editor
 
A Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksA Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksIJMER
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
 
3778975074 january march 2015 1
3778975074 january march 2015 13778975074 january march 2015 1
3778975074 january march 2015 1nicfs
 
A trust-based authentication framework for security of WPAN using network sli...
A trust-based authentication framework for security of WPAN using network sli...A trust-based authentication framework for security of WPAN using network sli...
A trust-based authentication framework for security of WPAN using network sli...IJECEIAES
 
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...IJNSA Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbalIAESIJEECS
 
An IOT Based Low Power Health Monitoring with Active Personal Assistance
An IOT Based Low Power Health Monitoring with Active Personal AssistanceAn IOT Based Low Power Health Monitoring with Active Personal Assistance
An IOT Based Low Power Health Monitoring with Active Personal Assistanceijtsrd
 
IRJET- A Novel Mechanism for Clone Attack Detection in Hybrid IoT Devices
IRJET-  	  A Novel Mechanism for Clone Attack Detection in Hybrid IoT DevicesIRJET-  	  A Novel Mechanism for Clone Attack Detection in Hybrid IoT Devices
IRJET- A Novel Mechanism for Clone Attack Detection in Hybrid IoT DevicesIRJET Journal
 
Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wi...
Development and Evaluation of Energy-Efficient and Adaptive Protocolsfor Wi...Development and Evaluation of Energy-Efficient and Adaptive Protocolsfor Wi...
Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wi...Torsten Braun, Universität Bern
 
context aware computing
context aware computingcontext aware computing
context aware computingswati sonawane
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
 

Was ist angesagt? (20)

InfoSec Technology Management of User Space and Services Through Security Thr...
InfoSec Technology Management of User Space and Services Through Security Thr...InfoSec Technology Management of User Space and Services Through Security Thr...
InfoSec Technology Management of User Space and Services Through Security Thr...
 
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
 
Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous Computing
 
Context-aware Mobile Computing - a Literature Review
Context-aware Mobile Computing - a Literature ReviewContext-aware Mobile Computing - a Literature Review
Context-aware Mobile Computing - a Literature Review
 
Todays Mobile Cybersecurity
Todays Mobile CybersecurityTodays Mobile Cybersecurity
Todays Mobile Cybersecurity
 
Digital Marketing First 2014 - Context Aware Computing and Cross Channel Pers...
Digital Marketing First 2014 - Context Aware Computing and Cross Channel Pers...Digital Marketing First 2014 - Context Aware Computing and Cross Channel Pers...
Digital Marketing First 2014 - Context Aware Computing and Cross Channel Pers...
 
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor NetworksMulti-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
 
A Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksA Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor Networks
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
 
3778975074 january march 2015 1
3778975074 january march 2015 13778975074 january march 2015 1
3778975074 january march 2015 1
 
A trust-based authentication framework for security of WPAN using network sli...
A trust-based authentication framework for security of WPAN using network sli...A trust-based authentication framework for security of WPAN using network sli...
A trust-based authentication framework for security of WPAN using network sli...
 
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
 
An IOT Based Low Power Health Monitoring with Active Personal Assistance
An IOT Based Low Power Health Monitoring with Active Personal AssistanceAn IOT Based Low Power Health Monitoring with Active Personal Assistance
An IOT Based Low Power Health Monitoring with Active Personal Assistance
 
IRJET- A Novel Mechanism for Clone Attack Detection in Hybrid IoT Devices
IRJET-  	  A Novel Mechanism for Clone Attack Detection in Hybrid IoT DevicesIRJET-  	  A Novel Mechanism for Clone Attack Detection in Hybrid IoT Devices
IRJET- A Novel Mechanism for Clone Attack Detection in Hybrid IoT Devices
 
Context aware
Context awareContext aware
Context aware
 
Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wi...
Development and Evaluation of Energy-Efficient and Adaptive Protocolsfor Wi...Development and Evaluation of Energy-Efficient and Adaptive Protocolsfor Wi...
Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wi...
 
context aware computing
context aware computingcontext aware computing
context aware computing
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
 

Andere mochten auch

An Information Maximization approach of ICA for Gender Classification
An Information Maximization approach of ICA for Gender ClassificationAn Information Maximization approach of ICA for Gender Classification
An Information Maximization approach of ICA for Gender ClassificationIDES Editor
 
Inverse Gamma Distribution based Delay and Slew Modeling for On- Chip VLSI RC...
Inverse Gamma Distribution based Delay and Slew Modeling for On- Chip VLSI RC...Inverse Gamma Distribution based Delay and Slew Modeling for On- Chip VLSI RC...
Inverse Gamma Distribution based Delay and Slew Modeling for On- Chip VLSI RC...IDES Editor
 
Depth-Image-based Facial Analysis between Age Groups and Recognition of 3D Faces
Depth-Image-based Facial Analysis between Age Groups and Recognition of 3D FacesDepth-Image-based Facial Analysis between Age Groups and Recognition of 3D Faces
Depth-Image-based Facial Analysis between Age Groups and Recognition of 3D FacesIDES Editor
 
Neural Network Based Noise Identification in Digital Images
Neural Network Based Noise Identification in Digital ImagesNeural Network Based Noise Identification in Digital Images
Neural Network Based Noise Identification in Digital ImagesIDES Editor
 
An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...
An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...
An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...IDES Editor
 
Energy efficient reliable routing considering residual energy in wireless ad ...
Energy efficient reliable routing considering residual energy in wireless ad ...Energy efficient reliable routing considering residual energy in wireless ad ...
Energy efficient reliable routing considering residual energy in wireless ad ...LeMeniz Infotech
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
 
Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A ReviewIDES Editor
 

Andere mochten auch (9)

An Information Maximization approach of ICA for Gender Classification
An Information Maximization approach of ICA for Gender ClassificationAn Information Maximization approach of ICA for Gender Classification
An Information Maximization approach of ICA for Gender Classification
 
Inverse Gamma Distribution based Delay and Slew Modeling for On- Chip VLSI RC...
Inverse Gamma Distribution based Delay and Slew Modeling for On- Chip VLSI RC...Inverse Gamma Distribution based Delay and Slew Modeling for On- Chip VLSI RC...
Inverse Gamma Distribution based Delay and Slew Modeling for On- Chip VLSI RC...
 
Depth-Image-based Facial Analysis between Age Groups and Recognition of 3D Faces
Depth-Image-based Facial Analysis between Age Groups and Recognition of 3D FacesDepth-Image-based Facial Analysis between Age Groups and Recognition of 3D Faces
Depth-Image-based Facial Analysis between Age Groups and Recognition of 3D Faces
 
Neural Network Based Noise Identification in Digital Images
Neural Network Based Noise Identification in Digital ImagesNeural Network Based Noise Identification in Digital Images
Neural Network Based Noise Identification in Digital Images
 
An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...
An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...
An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...
 
Energy efficient reliable routing considering residual energy in wireless ad ...
Energy efficient reliable routing considering residual energy in wireless ad ...Energy efficient reliable routing considering residual energy in wireless ad ...
Energy efficient reliable routing considering residual energy in wireless ad ...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 

Ähnlich wie User Controlled Privacy in Participatory Sensing

Secure Distributed Collection of Data Using Participator Sensing Paradigm
Secure Distributed Collection of Data Using Participator Sensing ParadigmSecure Distributed Collection of Data Using Participator Sensing Paradigm
Secure Distributed Collection of Data Using Participator Sensing ParadigmIJERA Editor
 
Paper Florencio Cano - Patient data security in a wireless and mobile world
Paper Florencio Cano - Patient data security in a wireless and mobile worldPaper Florencio Cano - Patient data security in a wireless and mobile world
Paper Florencio Cano - Patient data security in a wireless and mobile worldWTHS
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfamitkhanna2070
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscapeSamir SEHIL
 
insect monitoring through wsn
insect monitoring through wsninsect monitoring through wsn
insect monitoring through wsnnehasharma12345
 
Chapter 1 of insect monitoring using wsn sensor
Chapter 1 of insect monitoring using wsn sensorChapter 1 of insect monitoring using wsn sensor
Chapter 1 of insect monitoring using wsn sensornehasharma12345
 
Detect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructureDetect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructureeSAT Publishing House
 
Security Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksSecurity Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksAhmad Sharifi
 
Privacy Preserving Aggregate Statistics for Mobile Crowdsensing
Privacy Preserving Aggregate Statistics for Mobile CrowdsensingPrivacy Preserving Aggregate Statistics for Mobile Crowdsensing
Privacy Preserving Aggregate Statistics for Mobile CrowdsensingIJSRED
 
Review Of Energy Harvesting Technologies For Sustainable Wsn
Review Of Energy Harvesting Technologies For Sustainable WsnReview Of Energy Harvesting Technologies For Sustainable Wsn
Review Of Energy Harvesting Technologies For Sustainable WsnYen Kheng Tan (PhD, SrMIEEE)
 
Privacy-aware secured discrete framework in wireless sensor network
Privacy-aware secured discrete framework in wireless sensor networkPrivacy-aware secured discrete framework in wireless sensor network
Privacy-aware secured discrete framework in wireless sensor networkIJECEIAES
 
A survey on hiding user privacy in location based services through clustering
A survey on hiding user privacy in location based services through clusteringA survey on hiding user privacy in location based services through clustering
A survey on hiding user privacy in location based services through clusteringeSAT Journals
 
Vertical Fragmentation of Location Information to Enable Location Privacy in ...
Vertical Fragmentation of Location Information to Enable Location Privacy in ...Vertical Fragmentation of Location Information to Enable Location Privacy in ...
Vertical Fragmentation of Location Information to Enable Location Privacy in ...ijasa
 
Ambient intellegence
Ambient intellegenceAmbient intellegence
Ambient intellegenceLovely Singla
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
 
Wireless Micro-Sensor Network Models
Wireless Micro-Sensor Network ModelsWireless Micro-Sensor Network Models
Wireless Micro-Sensor Network ModelsIOSR Journals
 

Ähnlich wie User Controlled Privacy in Participatory Sensing (20)

Secure Distributed Collection of Data Using Participator Sensing Paradigm
Secure Distributed Collection of Data Using Participator Sensing ParadigmSecure Distributed Collection of Data Using Participator Sensing Paradigm
Secure Distributed Collection of Data Using Participator Sensing Paradigm
 
Paper Florencio Cano - Patient data security in a wireless and mobile world
Paper Florencio Cano - Patient data security in a wireless and mobile worldPaper Florencio Cano - Patient data security in a wireless and mobile world
Paper Florencio Cano - Patient data security in a wireless and mobile world
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdf
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscape
 
insect monitoring through wsn
insect monitoring through wsninsect monitoring through wsn
insect monitoring through wsn
 
Chapter 1 of insect monitoring using wsn sensor
Chapter 1 of insect monitoring using wsn sensorChapter 1 of insect monitoring using wsn sensor
Chapter 1 of insect monitoring using wsn sensor
 
Insect Mointoring
Insect MointoringInsect Mointoring
Insect Mointoring
 
Detect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructureDetect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructure
 
Security Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksSecurity Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing Networks
 
Privacy Preserving Aggregate Statistics for Mobile Crowdsensing
Privacy Preserving Aggregate Statistics for Mobile CrowdsensingPrivacy Preserving Aggregate Statistics for Mobile Crowdsensing
Privacy Preserving Aggregate Statistics for Mobile Crowdsensing
 
Review Of Energy Harvesting Technologies For Sustainable Wsn
Review Of Energy Harvesting Technologies For Sustainable WsnReview Of Energy Harvesting Technologies For Sustainable Wsn
Review Of Energy Harvesting Technologies For Sustainable Wsn
 
thesis final2
thesis final2thesis final2
thesis final2
 
Privacy-aware secured discrete framework in wireless sensor network
Privacy-aware secured discrete framework in wireless sensor networkPrivacy-aware secured discrete framework in wireless sensor network
Privacy-aware secured discrete framework in wireless sensor network
 
A survey on hiding user privacy in location based services through clustering
A survey on hiding user privacy in location based services through clusteringA survey on hiding user privacy in location based services through clustering
A survey on hiding user privacy in location based services through clustering
 
Vertical Fragmentation of Location Information to Enable Location Privacy in ...
Vertical Fragmentation of Location Information to Enable Location Privacy in ...Vertical Fragmentation of Location Information to Enable Location Privacy in ...
Vertical Fragmentation of Location Information to Enable Location Privacy in ...
 
Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)
 
Ambient intellegence
Ambient intellegenceAmbient intellegence
Ambient intellegence
 
Q01813104114
Q01813104114Q01813104114
Q01813104114
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
 
Wireless Micro-Sensor Network Models
Wireless Micro-Sensor Network ModelsWireless Micro-Sensor Network Models
Wireless Micro-Sensor Network Models
 

Mehr von IDES Editor

Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance AnalysisIDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
 
Mental Stress Evaluation using an Adaptive Model
Mental Stress Evaluation using an Adaptive ModelMental Stress Evaluation using an Adaptive Model
Mental Stress Evaluation using an Adaptive ModelIDES Editor
 
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityGenetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityIDES Editor
 
3-D FFT Moving Object Signatures for Velocity Filtering
3-D FFT Moving Object Signatures for Velocity Filtering3-D FFT Moving Object Signatures for Velocity Filtering
3-D FFT Moving Object Signatures for Velocity FilteringIDES Editor
 

Mehr von IDES Editor (20)

Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 
Mental Stress Evaluation using an Adaptive Model
Mental Stress Evaluation using an Adaptive ModelMental Stress Evaluation using an Adaptive Model
Mental Stress Evaluation using an Adaptive Model
 
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityGenetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
 
3-D FFT Moving Object Signatures for Velocity Filtering
3-D FFT Moving Object Signatures for Velocity Filtering3-D FFT Moving Object Signatures for Velocity Filtering
3-D FFT Moving Object Signatures for Velocity Filtering
 

Kürzlich hochgeladen

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 

Kürzlich hochgeladen (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

User Controlled Privacy in Participatory Sensing

  • 1. ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010 User Controlled Privacy in Participatory Sensing Ramaprasada R. Kalidindi, KVSVN Raju1, V. Valli Kumari2, C.S. Reddy3 Dept. of Computer Science and Engineering, S.R.K.R. Engineering College, Bhimavaram-534204, India. rrkalidindi@computer.org Dept. of Computer Science and Systems Engineering, AUCE(A), Andhra University, Visakhapatnam-533003, India. 1 kvsvn.raju@gmail.com, 2vallikumari@ieee.org, 3csatyanand@gmail.com Abstract—Most of the sensor network applications in military First, the civic authorities in metropolitan cities and civilian use are surreptitious. If these are used for the provide general amenities and security to public depending benefit of society in addition to the individual needs a new set of applications can be developed. This paper describes on the time variant density of population during work hours infrastructure monitoring based on collaboration between in offices, evening at parks, and night at clubs etc. This sensor networks. The solution provides a reputation based may vary during week days, weekends, festivals, functions hybrid network where collaborative trust is established based and meetings. Estimating the requirement and deploying on referrals (opinions). Depending on the trust, the information is exchanged between one entity and another with the security personnel and ambulances and other amenities different authorization levels. The outcome of the paper is dynamically is not precise, as getting the real time data is collaborative data collection with privacy levels controlled by difficult and costly. Assuming that each person has a cell individual users. phone, the population density of people at a point of time Keywords- privacy control; trust; reputation; collaborative can be identified using cell phone location [7]. networks; urban sensing; participatory sensing; sensor networks. Second, the spread of a contagious disease and its consequences are known to public and health authorities I. INTRODUCTION only after certain causalities. But estimating the disease spread in real time depending on the people queries to Widespread use of low cost tiny sensors in civilian applications and their eventual integration with Internet has health websites (viz Google flu trends) minimizes made them pervasive [1, 2, 3]. Often data collected from causalities and certain areas can be quarantined in advance sensor networks in the urban environments inhabited by [8]. Sharing person specific data for this type of humans constitute personal information. The acceptance of applications is not possible without the consent of its these sensor networks as public infrastructure will need owner. If the granularity of the data is high, there will be citizens’ participation and collaboration. This type of more applications of this kind. applications in urban areas is entirely different from habitat Automatic collection of higher granular data is monitoring, where privacy is not a concern. Deploying these networks without addressing the security and privacy possible with networked sensors at higher densities. When concerns will turn against those whom it is meant to these are used around human habitats they will collect benefit. And user acceptance depends on the provision of human related data, but people do not want to make private appropriate mechanisms to deal with these concerns. The life public. Most of the today's sensor network applications main privacy problem in sensor networks is; they generate are pervasive in nature in which a centralized authority is large volumes of information which is easily available used to collect data from individuals. But the individuals through remote access. Ensuring that sensed information stays within sensor network and is accessible only to are not having any control over their private data. For trusted parties is an essential step toward achieving privacy example, giving cell phone location to unauthorized [4]. agencies is not allowed under privacy laws. If an individual Allowing individual’s control on how personal data is is willing, this information can be shared with others. collected, distributed and processed addresses privacy People may not be willing to share this information at all (information privacy) issues. This can be achieved by times. If the individual is having control over when to providing a resolution control in the hands of the user. share and what to share, more people will allow sharing. High resolution data is more useful, but this choice could be left to the individual provider so that privacy control can This will lead to new applications like location advertising, be done at the source [5, 6]. In an urban environment alerting nearest emergency services etc., where establishing a sensor network over large area is not collaborative and opportunistic sensing is used to realize practically feasible due to cost, but with people’s pervasive applications [9]. More people will participate in participation this can be done with minimum cost. For these endeavors if privacy control is with individual rather example, consider these two applications. than with centralized authority. © 2010 ACEEE 34 DOI: 01.IJNS.01.03.187
  • 2. ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010 For infrastructure monitoring applications in gated applications in medical and vehicular network scenarios. communities, apartment buildings and rented commercial The authors integrated this mechanism into the hybrid complexes, solutions are provided with different networks hierarchical WSN using anonymization and controlled for different tasks like power management, water information disclosure. management, security and surveillance etc. With the availability of sensors with multi-sensing capabilities and III. COLLABORATION BASED INFRASTRUCTURE Internet connectivity, these independent networks can be MONITORING converted to a single IP based Building Information Network [10] to reduce the overall cost. This development A. Application Scenario in sensor networks will reduce man power and other costs Monitoring the flats in apartment buildings, houses in for the infrastructure developer and facilitate monitoring of gated communities and shops in commercial complexes use the property remotely by the owners. If the owner is willing, these networks can be integrated to have pre- video surveillance networks for maintaining security and installed sensor networks by the developer. The owner will other sensor networks for maintenance by the developer. not accept developer control over his/her private data. If The owners of the flats (or houses/shops) can also have solutions are available to have control with the owner, their own sensor networks to monitor their property. The he/she may be interested to share some data willingly. Each model describes sensor networks in apartment buildings, owner can establish or can accept pre-installed individual but it can also be applied to the other applications above. network and it can be integrated with other individual sensor networks to form an integrated network and B. Network Model maintained by a third party. These sensor networks maintained at a residential locality can be integrated with Internet Base station another network through Internet. This will create an urban infrastructure for solid waste management, pollution Cluster head control, disaster management, etc., for the benefit of citizens. B To this end, we described a model for infrastructure C C monitoring by collecting data from individual wireless sensor networks (WSNs). The rest of the paper is organized as follows: Section II describes related work, C section III describes collaboration based information Sensor field monitoring, section IV contains description of the model s4 and the trust value representation and assumptions, section s1 s2 Sensor node V provide the evaluation of the model and section VI s3 s1 concludes the paper and suggests possible future directions. Wired link Wireless link Figure 1 Hierarchical Wireless Sensor Network II. RELATED WORK The proposed model in Fig. 1 is a hierarchical Giang et al. [11] proposed a scheme to control privacy architecture for integration of sensor networks with exposure by trust evaluation on the basis of previous Internet. transactions and peer recommendation. The authors Wireless sensors ease the deployment1. The sensors developed a methodology to estimate trust value and deployed in a flat (sensor field) are connected to a station depending on this trust, users can have a privacy policy to called Cluster Head (C) stationed in each flat. Each Sensor decide about how much data can be given to others. The Node sends data to cluster head. The cluster head stores solution is for sharing personal data in the computer in a data from all sensors, so that the owner of the flat can ubiquitous environment. decide with whom he/she can share the data. If the flat was The hybrid trust management scheme by Shaik et al. rented, the owner can delete private data from the cluster [12] minimizes resource utilization at sensor nodes with a head and after that the tenant will be the owner of the data. hierarchical distributed WSN, where the group has a trust These cluster heads are connected to a Base Station (B) value. The authors presented a trust model which maintained by maintenance authority and in turn the base calculates trust in three phases at node, cluster head and station is connected to Internet. The cluster head will share base station. certain infrastructure related data like overhead water tank Chen et al. [13] presented a scheme for trust rating level etc. with the base station. The base station will propagation by on demand and trigger methods in WSNs. The authors aggregated the trust rating from other nodes The sensor nodes are installed through a cluster head and the security key with node’s trust value from its own observation. is only known to the particular cluster head. Since the wireless signal can Mitseva et al. [14] presented a privacy protection be received by any cluster head within the range, the data is encrypted and only the corresponding cluster head can decrypt. Unidirectional wireless mechanism with context aware trust establishment for links shown in Fig. 1 are secure links connected to cluster head. © 2010 ACEEE 35 DOI: 01.IJNS.01.03.187
  • 3. ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010 maintain shared data and participate in urban infrastructure A user authorized at level A1 can have access to entire through Internet. data at cluster head level, has privileges to give The data collection mechanism is composed of four authorization for other users and can configure the sensor network. At level A2 data from sensors s2, s3 and s4 can be levels viz. sensor node, cluster head, base station and accessed. At level A3 data from s3 and s4 sensors can be emergency agencies through Internet. Sensor nodes collect accessed. At level A4 data from s4 sensors can be accessed. data from physical activity and send it to cluster head. The The data from s4 sensors is generated in emergencies and is cluster head updates data at the base station periodically. available through base station. Since the owner of Emergency management agencies can access data at base information can authorize others for different levels of station through Internet to deal with emergencies or the authorization, the access control will be with owner. All base station can alert the agency in case of emergencies. cluster heads send data from s3 and s4 sensors to base station. The data from s1 sensors is personal and is Authorized users can access data at the cluster heads and accessible to the owner only. The data from sensors s2, s3 base station. This work attempted to give access to data and s4 can be shared with neighbors. They can access this among trusted parties by finding the trustworthiness using data at their cluster head through a secured link provided reputation. by base station, since each cluster head is connected to base Sensor Nodes (s1-s4) collect data about the physical station. activity like state of bedroom door, light, overhead water The authorization level A2, assigned to different tank level, fire alarm etc. They transmit this data to Cluster cluster heads may be withdrawn if the occupant of a flat does not have the trust on them. In a social community, Head (C). The cluster heads are connected to Base Station trust between two individuals is developed based on their (B). The base station sends emergency data to emergency transactions over time. When a flat owner who is in services which are connected through Internet. The links control of cluster head wants to share information with between sensor nodes and cluster head are unidirectional. friendly neighbors, he/she can trust only few neighbors. The link between cluster head and base station is When these neighbors are changing continuously (new bidirectional. These links are secured and the base station is owners and new tenants) trusted neighbors are to be identified dynamically. For example, if the owner of a flat connected to Internet. gives it for rent, the sensor network collects tenant’s data. This model assumes a multi-owner and multi-user The tenant may not be interested in sharing his/her data network with sensor nodes, which continuously produce with owner's trusted friends, who may not be his/her trusted data. The owners of different cluster heads can categorize friends. This requires calculation of trust about other sensors as s1 to s4. Table I gives the type of data from cluster heads at the cluster head periodically. When faced various sensors. with uncertainty, individuals trust and rely on the previous transactions and opinions of others who have good TABLE I TYPES OF SENSORS transactions with them in the past. Sensor Data of interest Initially when a new owner approaches maintenance s1 State of bed room door, light, etc. (Personal) authority for a flat, they will undertake an agreement which s2 State of living room door, water heater, A/C etc. (Flat is a legally binding document on two parties. This utilities) document will give an initial trust, which is called as s3 Overhead tank water level, power meter reading, etc. (Maintenance utilities) institutional trust, between them. An owner develops a s4 Fire, theft alarm, earth quake detection, etc. (Emergency) reputation for each other owner by making direct observations about other owners in the neighborhood. This The owners of cluster heads, administrator at base reputation is used to help an owner evaluate the station and disaster management teams which are using the trustworthiness of others and make a decision to share data emergency sensors' data will be the users of network. At within the network.   each cluster head, there are four authorization levels A1 to A4 to access different types of data. Table II gives the IV. PROPOSED MODEL authorization levels. These levels will determine to what extent the user can have access to data. In social environment, we trust people depending on past interactions with them. These past interactions will be TABLE II USER AUTHORIZATION LEVELS used to build reputation of a particular person. In the absence of these interactions, we take the opinion of others Level Users A1 Self to build initial trust. In the network model described in A2 Trusted friends Section III.B, the data is stored with the cluster head and it A3 Infrastructure maintenance authority is exchanged with base station and other cluster heads, A4 Emergency services (Fire services, police, disaster depending upon their authorization levels. We have to trust management teams, etc.) the entities behind these cluster heads and authorization levels are to be entrusted to each entity. Since this trust is © 2010 ACEEE 36 DOI: 01.IJNS.01.03.187
  • 4. ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010 needed in between the entities which are dealing with value is one (i.e., Rii = 1 ). All transactions to itself are e authorization, only the network of base station and cluster heads is considered. The terminology used in the successful transactions (i.e., t ii = t ii ). s remaining sections is given below. Fig.2 shows transactions between base station and Base station (B) is the maintenance authority, which will nodes. Thick line indicates transaction and dashed line maintain data coming from the cluster heads pertaining to indicates a request to get opinion. certain sensors and is connected to all cluster heads and the Internet. Node (N) is the cluster head which will collect data B N1 N2 Ni Nj Nn from sensor nodes and forward certain type of sensors’ data to the base station. Neighbor is one of the remaining cluster heads which Transaction Request for opinion is connected to base station with which a cluster head wants to share information or collect opinion. Figure 2. Interactions with nodes to obtain Nj’s reputation Opinion ( O xy ) is the value given by a node x When a node Ni wants to calculate the trust of a particular node Nj it sends a broadcast request to base depending upon the reputation of y. station and all other nodes. These nodes will respond to A. Reputation this request by sending the reputation of Nj, and the total Reputation of a node is the satisfaction of usage of number of transactions with Nj, which are available in their shared data and its reciprocation in sharing data. As part of respective reputation tables. Responding to the request is infrastructure, the nodes are sharing part of the data with treated as positive transaction which will increase the base station. The base station gives reputation ratings reputation of responding node there by encouraging depending on their participation in sharing the data. A node responses. Every time a node interacts with other node it can also share data with another node and it gives updates its reputation table. reputation rating depending on how the other node is using B. Direct Reputation the shared data and whether it is sharing data with it or not. e A node can take reputations from other nodes and can The direct reputation Rij is the ratio of successful and total derive an opinion value considering the reputations and its transactions of node Ni with node Nj. When a node own transactions. requests for information from a node, if other node Let there are n nodes (N1 - Nn) connected to base responds by sending the information it will be treated as station, B. The Reputation of a neighbor Nj at node Ni is successful transaction; no response will be treated as derived from direct reputation of Nj at Ni and observed unsuccessful transaction. When a node Ni is having t ij reputation of Nj collected from other nodes and base station s total transactions and among them t ij is the successful e at Ni. The direct reputation, R ij is an event driven number of transactions with Nj, the direct reputation is given as in (1). reputation of a node Nj as perceived by node Ni when it is s directly transacting with node Nj and Rij ∈ [0,1] . e t ij The Rij = e (1) t ij o observed reputation Rij of a node Nj as perceived by node In a social environment, when we deal with persons, Ni reflects the Nj’s behavior with neighbors in the we form an opinion taking the reputation of that person in community and Rij ∈ [0,1] . o The base station is having the community into account. It may be a positive or negative opinion depending on various inputs we have transactions with all other nodes. The nodes may or may about that person. The definition of opinion, as given by not have transactions with other nodes; t ij is the total and Oxford dictionary, is a belief or judgment about a s particular thing, which is not necessarily based on fact or t ij is the successful number of transactions between nodes knowledge. If reputation is considered to form an opinion, Ni and Nj. more than half of successful transactions be considered as The base station and each node will maintain a positive and less than half be as negative. The personal reputation table consisting of direct reputation of the node and total number of transactions with that node for base opinion Oijp of node Ni about Nj is given as in (2). station and all nodes in the network. The self reputation © 2010 ACEEE 37 DOI: 01.IJNS.01.03.187
  • 5. ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010 ⎪ Oijp = ⎨ ij ( ⎧ R e − 0.5 ) if t ij ≠ 0 (2) nt ∑ n t kj ⎪0 t ij = 0 k = b ,1 ij if wi = if t ij < (6) ⎩ n n ∑ t kj Oijp ∈ [− 0.5,0.5] , a positive value represents positive k = b ,1 Users at cluster heads collect opinions and consider opinion and negative value represents negative opinion. them in establishing trust with neighbors. Depending on this trust they authorize users to different levels, thereby C. Observed Reputation o having the control to which they have to share their data. The observed reputation Rbj is derived from the reputation collected from base station by node Ni about Nj V. MODEL EVALUATION and base station reputation at node Ni. For example, if Ni In the housing infrastructure having hundreds of requests base station to send data about Nj, the base station houses at particular place is quite common, but having e o sends Rbj and t bj values. The reputation Rij is derived thousands of houses in a single project is very rare. For e evaluating our model we have taken one hundred nodes from the direct reputation value Rbj received from base having trasactions upto ten thousand. Opinions were e derived from the reputations and majority opinion is taken station and direct reputation Rib stored at node Ni about for consideratrion for other’s opinion as shown in Fig.3. base station as in (3). Rbj = Rib ⋅ Rb j o e e (3) Opinion ( obj ) of base station about node Nj is given as in (4). ⎧ o( ⎪ R − 0.5 obj = ⎨ bj ) if t bj ≠ 0 (4) ⎪0 ⎩ if t bj = 0 obj ∈ [− 0.5,0.5] , since the opinions collected from base station and other nodes may not match with each other, these are rounded to one decimal place so that The Fig.4 shows majority opinion when the number of ( majority opinion is selected. Let S = obj , o1 j , o 2 j ,.......o nj ) responidng nodes for giving the opinon are varying. The average opinion, which will vary with the values given by be the set of opinions (rounded to one decimal place) from responding nodes, is also shown. The majority opinion is base station and other nodes. The majority of the observed almost constant except one, for sufficient number of opinions Oij is given as Oij = M (S ) , where M is a function o o transactions. to find the mode of given set of opinions S from base station and other nodes. D. Evaluating the Opinion The overall opinion Oij is node Ni’s opinion on Nj and is given as in (5). Oij = wi Oijp + (1 − wi )Oij o (5) Where wi is the weight assigned to personal opinion among personal and other’s opinion at Ni. When a node is having sufficient number of transactions to judge, there is no necessity of taking other’s opinions. If a node is having total transactions more than the average total transactions In this paper, we presented a procedure to evaluate done by other nodes, the node will take only its opinion opinion values. These values are used to establish trust and into account ( wi = 1 ) otherwise other’s opinion is also thereby to give authorization. But the behavior of nodes considered then the weight wi is given as in (6). with bad intentions and colluding with other nodes to get good opinion are hindrance to the trust establishment. © 2010 ACEEE 38 DOI: 01.IJNS.01.03.187
  • 6. ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010 VI. CONCLUSION AND FUTURE DIRECTIONS [5] D. Cuff, M. Hansen, and J. Kang, “Urban sensing: Out of the woods,” Communications of ACM, vol.51, March 2008, pp. With the emergence of widespread use of sensors in an 24-33. urban environment, the need for a proper trust management [6] D. Wright, D. et al., “The illusion of security,” between the collaborative entities and the need of the Communications. of ACM, vol. 51, March 2008, pp. 56-63. privacy control with each collaborative entity is strongly [7] K. Shilton, “Four billion little brothers? Privacy, mobile phones, and ubiquitous data collection,” Communications of felt. Privacy control at the source will enable willing and ACM, vol. 52, November 2009, pp. 48-53. engaged participation of citizens to create urban [8] Google, “Google flu trends,” 2010, infrastructure with reduced cost. This work considered the http://www.google.org/flutrends (2nd August 2010). problem of establishing trust with neighbors in a [9] C. Cornelius, A. Kapadia, D. Kotz, D. Peebles, M. Shin, and sufficiently large residential community by collecting N. Triandopoulos, “AnonySense: Privacy-aware people centric sensing,” Proc. ACM MobiSys’08, 2008, pp.2 11- opinions from others. The data is shared by setting 224. authorization levels to others depending on trust. Trust [10] Cisco, “Cisco Connected Real Estate for healthcare: estimation under malicious behavior of nodes, collusion Changing how hospital real estate is developed, used, and between nodes to get authorization is a problem. Taking managed,” 2009, www.cisco.com/.../healthcare/08CS1312- risk factor into consideration along with trust to exchange HC_Conn_RealEst_20090208.pdf (2nd August 2010), 6 pages. data are the areas to be considered for further study to have [11] P.D. Giang, L.X. Hung, R.A. Shaikh, Y. Zhung, S. Lee, Y.K. a robust trust management for participatory sensor Lee, and H. Lee, “A trust based approach to control privacy networks. exposure in ubiquitous computing environments,” Proc. IEEE Int. Conf. on Pervasive Services, 2007, pp. 149-152. REFERENCES [12] R.A. Shaik, H. Jameel, S. Lee, S. Rajput, and Y.J. Song, “Trust management problem in distributed wireless sensor [1] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. networks,” Proc. 12th IEEE Int. Conf. on Embedded and Real Cayirci, “A survey on sensor networks,” IEEE Commn. Time Computing and Applications, IEEE Computer Society, Mag., vol. 40, August 2002, pp. 102-114. 2006, 4 pages. [2] C. Chong, and S.P. Kumar, “Sensor networks: Evolution, [13] H. Chen, H. Wu, X. Cao, and C. Gao, “Trust propagation opportunities, and challenges,” Proceedings of the IEEE, and aggregation in wireless sensor networks,” Proc. Japan- vol.91, August 2003, pp. 1247-56. China Joint Workshop on Frontier of Computer Science and [3] D. Estrin, R. Govindan, J. Heidemann, and S. Kumar, “Next Technology, IEEE Computer Society, 2007, 8 pages. century challenges: Scalable coordination in sensor [14] A. Mitseva, M. Gerlach, and N.R. Prasad, “Privacy networks,” Proc. ACM Mobicom’99, 1999, pp. 263-270. protection mechanisms for hybrid hierarchical wireless [4] H. Chan, and A. Perrig, “Security and privacy in sensor sensor networks,” Proc. IEEE ISWCS 2007, pp. 332-336. networks,” IEEE Computer, vol. 36, October 2003, pp. 103- 105. © 2010 ACEEE 39 DOI: 01.IJNS.01.03.187