Abstract | ||
---|---|---|
When wireless sensors are deployed to monitor the working or life conditions of people, the data collected and processed by these sensors may reveal privacy of people. The actual content of sensory data should be concealed to preserve the privacy, but the data concealment feature may be abused by compromised sensors to modify or ill-process data without being caught. Hence, reconciling privacy preservation and intrusion detection, which apparently conflict with each other, is important. This paper studies this problem in the context of sensory data aggregation, a fundamental primitive for efficient operation of sensor networks. A scheme is proposed that can detect ill-performed aggregation without knowing the actual content of sensory data, and therefore allow sensory data to be kept concealed. The results show that, the actual content of raw and aggregated sensory data can be well concealed. Meanwhile, most of ill-performed aggregations can be detected; the ill-performed aggregations that can escape from being detected have only negligible impact on the final aggregation results. |
Year | DOI | Venue |
---|---|---|
2011 | 10.1109/INFCOM.2011.5935177 | INFOCOM |
Keywords | Field | DocType |
privacy preservation,intrusion detection,data privacy,sensory data aggregation,wireless sensors,data concealment feature,wireless sensor networks,security of data,sensor network,wireless sensor network,histograms,data collection,data aggregation | Data mining,Histogram,Wireless,Computer science,Computer security,Information privacy,Sensory system,Wireless sensor network,Intrusion detection system,Data aggregator | Conference |
ISSN | ISBN | Citations |
0743-166X | 978-1-4244-9919-9 | 8 |
PageRank | References | Authors |
0.52 | 7 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Chuang Wang | 1 | 56 | 3.14 |
Guiling Wang | 2 | 573 | 34.93 |
Wensheng Zhang | 3 | 1415 | 80.30 |
Taiming Feng | 4 | 107 | 6.32 |