skip to main content
article

Obfuscating temporal context of sensor data by coalescing at source

Published:01 April 2007Publication History
Skip Abstract Section

Abstract

Contextual privacy threat arises from divulging the location and time of the triggering events to adversaries. Since, the context of the triggering events serve as useful information to the eavesdropper, data encryption alone renders inadequate for protecting total privacy of a sensing task. Obfuscation of the contextual information is a natural solution to the contextual privacy problem. Since both location and time of a sensed event constitute its context, obfuscation can be performed both spatially and temporally. In [1], the authors employ spatial obfuscation techniques (controlled flooding, probabilistic flooding and fake messaging) by focusing mainly on the location component of the contextual information. Nevertheless, increased message transmissions place an additional burden on the power constrained sensor nodes.

References

  1. P. Kamat, Y. Zhang, W. Trappe and C. Ozturk, "Enhancing source-location privacy in sensor network routing," Proc. 25th Int'l Conference on Distributed Computing Systems (ICDCS 2005), Columbus, Ohio, pp. 599--608, June 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. T. M. Cover and J. A. Thomas, Elements of Information Theory, John Wiley, 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. L. Ekroot and T. M. Cover, "The entropy of a randomly stopped sequence," IEEE Transactions on Information Theory, vol. 37, no. 6, pp. 1641--1644, November 1991.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. S. M. Ross, Stochastic Processes, 2nd Edition, John Wiley, 1996.Google ScholarGoogle Scholar
  5. J. N. Kapur and H. K. Kesavan, Entropy Optimization Principles with Applications, John Wiley, 1992.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Obfuscating temporal context of sensor data by coalescing at source

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image ACM SIGMOBILE Mobile Computing and Communications Review
            ACM SIGMOBILE Mobile Computing and Communications Review  Volume 11, Issue 2
            April 2007
            72 pages
            ISSN:1559-1662
            EISSN:1931-1222
            DOI:10.1145/1282221
            Issue’s Table of Contents

            Copyright © 2007 Authors

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 1 April 2007

            Check for updates

            Qualifiers

            • article

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader