WSN scenario. Our approach allows the sink to
analyze data trustworthiness by exploiting
consistency on cross-layer information, i.e., node
localization and privacy violations.
More specifically, the trustworthiness about the
node position information and the privacy
compliance are used for evaluating data
trustworthiness. In fact node position, being target of
different kind of attacks (e.g., malicious node
displacement, distance enlargement) can be used to
identify malicious behaviour.
Our approach is largely independent from the
adopted routing protocols, the verification
localization algorithm and the used encryption
technique. Besides assessing data trustworthiness we
provide an integrated framework for facing privacy
and secure localization issues at the same time. CLP
definition is supported by means of a UML
conceptual model that defines privacy policies in the
context of WSN. The model provides the basic
concepts involved when dealing with privacy-related
information. At the moment we are carrying out
simulations in order to evaluate the CLP
performance in real settings.
REFERENCES
I. F. Akyildiz, T. Melodia, and K. Chowdhury, “A survey
on wireless multimedia sensor networks,” Elsevier
Computer Networks Journal, March 2007.
A. Coen-Porisini, P. Colombo, S. Sicari, and A.
Trombetta, “A conceptual model for privacy policies,”
in Proc. of SEA 2007, Cambridge (MS), USA.
A. Coen-Porisini, P. Colombo, and S. Sicari, “Dealing
with anonymity in wireless sensor networks,” in In
Proceedings of 25th annual ACM symposium on
Applied Computing (ACM SAC), Sierre, Switzerland,
2010.
A. Coen-Porisini, P. Colombo, and S. Sicari, “Privacy
aware systems: from models to patterns” in Software
Engineering for Secure Systems: Industrial and
Research Perspectives, IGI Global, editor Dr. H.
Mouratidis, 2010
Unified Modeling Language: Infrastructure, Ver. 2.1.2,
OMG, November 2007, formal/2007-11-02.
Unified Modeling Language: Superstructure, Ver. 2.1.2,
OMG, November 2007, formal/2007-11-02.
Directive 95/46/EC of the European Parliament. Official
Journal of the European Communities of 23 November
1995 No L. 281 p. 31.
Q. Ni, A. Trombetta, E. Bertino, and J. Lobo, “Privacy-
aware role based access control,” in Proceedings of
the 12th ACM symposium on Access control models
and technologies, 2007.
H. Zhanga, A. Arorab, Y. Choic, and M. Goudac,
“Reliable bursty convergecast in wireless sensor
networks,” Elsevier Computer Communications, vol.
30, no. 13, pp. 2560–2576, 2007.
OMNeT++ Discrete Event Simulation System. http://www
.omnetpp.org/doc/manual/usman.html, 2005.
M. Gruteser, G. Schelle, A. Jain, R. Han, and D.
Grunwald, “Privacy-aware location sensor networks,”
in In Proceedings of the 9th USENIX Workshop on
Hot Topics in Operating Systems (HotOS IX), 2003.
H. Chan and A. Perrig, “Security and privacy in sensor
networks,” IEEE Computer Magazine, pp. 103–105,
March 2003.
M. G. S. Duri, P. M. X. Liu, R. Perez, M. Singh, and J.
Tang, “Framework for security and privacy in
automotive telematics,” in In Proceedings of 2nd ACM
International Worksphop on Mobile Commerce, 2000.
P. Samarati and L. Sweeney, “Protecting privacy when
disclosing information: k-anonymity and its
enforcement through generalization and suppression,”
Technical Report SRI-CSL-98-04, Computer Science
Laboratory, SRI International, 1998.
M. Gruteser and D. Grunwald, “A methodological
assessment of location privacy risks in wireless
hotspot networks,” in Proceedings of the first
International Conference on Security in Pervasive
Computing, 2003.
A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E.
Culler, “Spins: security protocols for sensor
networks,” Wireless Networking, vol. 8, no. 5, pp.
521–534, 2002.
E. Snekkenes, “Concepts for personal location privacy
policies,” in In Proceedings of 3rd ACM Conf. on
Electronic Commerce, 2001.
D. Molnar and D. Wagner, “Privacy and security in library
rfid: Issues, practices, and architectures,” in In
Proceedings of ACM CCS, 2004.
L. Eschenauer and V. D. Gligor, “A key-management
scheme for distributed sensor networks.” in
Proceedings of 9th ACM Conference on Computer and
Communications Security, 2002.
R. D. Pietro, A. Mei, and L. V. Mancini, “Random key
assignment for secure wireless sensor networks,” in
Proceedings of ACM Workshop on Security of Ad Hoc
and Sensor Networks (SASN), Fairfax-VA, USA,
2003.
R. D. Pietro, C. Soriente, A. Spognardi, and G. Tsudik,
“Collaborative authentication in unattended wsns,” in
Proceedings of 2nd ACM Conference on Wireless
Network Security (WiSec), Zurich, Switzerland, 2009.
S. Capkun and J. Hubaux, “Secure positioning in wireless
networks,” in IEEE Journal on Selected Areas in
Communications, vol. 24, no. 2, pp. 221–232, Feb.
2006.
S. Brands and D. Chaum, “Distance-bounding protocols,”
in Proceedings of Workshop on the Theory and
Application of Cryptographic Techniques, 1994.
SENSORNETS 2012 - International Conference on Sensor Networks
208