{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:32:59Z","timestamp":1750307579387,"version":"3.41.0"},"reference-count":33,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2010,2,1]],"date-time":"2010-02-01T00:00:00Z","timestamp":1264982400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Sen. Netw."],"published-print":{"date-parts":[[2010,2]]},"abstract":"<jats:p>Existing mechanisms for querying wireless sensor networks leak client interests to the servers performing the queries. The leaks are not only in terms of specific regions of interest but also of client access patterns. In this article we introduce the problem of preserving the privacy of clients querying a wireless sensor network owned by untrusted organizations. We first propose an efficient protocol, SPYC, that ensures full client privacy in settings where the servers providing access to the network are honest-but-curious and whose collaboration does not extend beyond well-defined administrative purposes. Furthermore, we study the same query privacy problem in a setting where servers exhibit malicious behavior or where powerful external attackers have access to sensor network traffic information. In this setting we propose two metrics for quantifying the privacy achieved by a client's query sequence. We then extend SPYC with a suite of practical algorithms, then analyze the privacy and efficiency levels they provide. Our TOSSIM simulations show that the proposed extensions are communication efficient while significantly improving client privacy levels.<\/jats:p>","DOI":"10.1145\/1689239.1689244","type":"journal-article","created":{"date-parts":[[2010,3,2]],"date-time":"2010-03-02T19:20:32Z","timestamp":1267557632000},"page":"1-34","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":29,"title":["Query privacy in wireless sensor networks"],"prefix":"10.1145","volume":"6","author":[{"given":"Bogdan","family":"Carbunar","sequence":"first","affiliation":[{"name":"Motorola Labs, Schaumberg, IL"}]},{"given":"Yang","family":"Yu","sequence":"additional","affiliation":[{"name":"Motorola Labs, Schaumberg, IL"}]},{"given":"Weidong","family":"Shi","sequence":"additional","affiliation":[{"name":"Motorola Labs, Schaumberg, IL"}]},{"given":"Michael","family":"Pearce","sequence":"additional","affiliation":[{"name":"Motorola Labs, Schaumberg, IL"}]},{"given":"Venu","family":"Vasudevan","sequence":"additional","affiliation":[{"name":"Motorola Labs, Schaumberg, IL"}]}],"member":"320","published-online":{"date-parts":[[2010,3,2]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/646251.685989"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080885.1080887"},{"volume-title":"Proceedings of the 43rd Symposium on Foundations of Computer Science (FOCS'02)","author":"Beimel A.","key":"e_1_2_1_3_1","unstructured":"Beimel , A. , Ishai , Y. , Kushilevitz , E. , and Raymond , J . -F. 2002. Breaking the o(n1\/(2k-1)) barrier for information-theoretic private information retrieval . In Proceedings of the 43rd Symposium on Foundations of Computer Science (FOCS'02) . 261--270. Beimel, A., Ishai, Y., Kushilevitz, E., and Raymond, J.-F. 2002. Breaking the o(n1\/(2k-1)) barrier for information-theoretic private information retrieval. In Proceedings of the 43rd Symposium on Foundations of Computer Science (FOCS'02). 261--270."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"volume-title":"Proceedings of the 36th Annual Symposium on Foundations of Computer Science (FOCS'95)","author":"Chor B.","key":"e_1_2_1_5_1","unstructured":"Chor , B. , Goldreich , O. , Kushilevitz , E. , and Sudan , M . 1995. Private information retrieval . In Proceedings of the 36th Annual Symposium on Foundations of Computer Science (FOCS'95) . Chor, B., Goldreich, O., Kushilevitz, E., and Sudan, M. 1995. Private information retrieval. In Proceedings of the 36th Annual Symposium on Foundations of Computer Science (FOCS'95)."},{"volume-title":"Proceedings of the International Conference on Dependable Systems and Networks (DSN'04)","author":"Deng J.","key":"e_1_2_1_6_1","unstructured":"Deng , J. , Han , R. , and Mishra , S . 2004. Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks . In Proceedings of the International Conference on Dependable Systems and Networks (DSN'04) . Deng, J., Han, R., and Mishra, S. 2004. Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks. In Proceedings of the International Conference on Dependable Systems and Networks (DSN'04)."},{"volume-title":"Proceedings of the 13th USENIX Security Symposium.","author":"Dingledine R.","key":"e_1_2_1_7_1","unstructured":"Dingledine , R. , Mathewson , N. , and Syverson , P . 2004. Tor: The second-generation onion router . In Proceedings of the 13th USENIX Security Symposium. Dingledine, R., Mathewson, N., and Syverson, P. 2004. Tor: The second-generation onion router. In Proceedings of the 13th USENIX Security Symposium."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586137"},{"key":"e_1_2_1_9_1","first-page":"72","article-title":"A survey on private information retrieval","volume":"82","author":"Gasarch W.","year":"2004","unstructured":"Gasarch , W. 2004 . A survey on private information retrieval . Bull. EATCS , 82 , 72 -- 107 . Gasarch, W. 2004. A survey on private information retrieval. Bull. EATCS, 82, 72--107.","journal-title":"Bull. EATCS"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066116.1189037"},{"volume-title":"Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM).","author":"He W.","key":"e_1_2_1_11_1","unstructured":"He , W. , Liu , X. , Nguyen , H. , Nahrstedt , K. , and Abdelzaher , T . 2007. PDA: Privacy-preserving data aggregation in wireless sensor networks . In Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM). He, W., Liu, X., Nguyen, H., Nahrstedt, K., and Abdelzaher, T. 2007. PDA: Privacy-preserving data aggregation in wireless sensor networks. In Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM)."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/820264.820485"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315266"},{"volume-title":"Proceedings of the 3rd International Workshop on Scientific Use of Submarine Cables and Related Technologies (SSC).","author":"Howe B. M.","key":"e_1_2_1_14_1","unstructured":"Howe , B. M. , McGinnis , T. , Kirkham , H. , and Massion , G . 2003. Sensor networks for cabled ocean observatories . In Proceedings of the 3rd International Workshop on Scientific Use of Submarine Cables and Related Technologies (SSC). Howe, B. M., McGinnis, T., Kirkham, H., and Massion, G. 2003. Sensor networks for cabled ocean observatories. In Proceedings of the 3rd International Workshop on Scientific Use of Submarine Cables and Related Technologies (SSC)."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/301250.301275"},{"key":"e_1_2_1_16_1","unstructured":"Kaliski B. 2003. TWIRL and RSA key size. http:\/\/www.rsasecurity.com\/rsalabs\/node.asp?id=2004.  Kaliski B. 2003. TWIRL and RSA key size. http:\/\/www.rsasecurity.com\/rsalabs\/node.asp?id=2004."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2005.31"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/570645.570674"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958506"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1127777.1127833"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029102.1029117"},{"volume-title":"Proceedings of the 4th International Symposium on Information Processing in Sensor Networks.","author":"Polastre J.","key":"e_1_2_1_22_1","unstructured":"Polastre , J. , Szewczyk , R. , and Culler , D . 2005. Telos: Enabling ultra-low power wireless research . In Proceedings of the 4th International Symposium on Information Processing in Sensor Networks. Polastre, J., Szewczyk, R., and Culler, D. 2005. Telos: Enabling ultra-low power wireless research. In Proceedings of the 4th International Symposium on Information Processing in Sensor Networks."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1024591915518"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/290163.290168"},{"volume-title":"Proceedings of IEEE INFOCOM.","author":"Shao M.","key":"e_1_2_1_25_1","unstructured":"Shao , M. , Yang , Y. , Zhu , S. , and Cao , G . 2008. Towards statistically strong source anonymity for sensor networks . In Proceedings of IEEE INFOCOM. Shao, M., Yang, Y., Zhu, S., and Cao, G. 2008. Towards statistically strong source anonymity for sensor networks. In Proceedings of IEEE INFOCOM."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2008.168"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/941311.941314"},{"key":"e_1_2_1_28_1","unstructured":"Ti msp430 specification. http:\/\/focus.ti.com\/lit\/ml\/slab034m\/slab034m.pdf.  Ti msp430 specification. http:\/\/focus.ti.com\/lit\/ml\/slab034m\/slab034m.pdf."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/974121.974131"},{"volume-title":"Proceedings of the IEEE Symposium on Security and Privacy.","author":"Wang L.","key":"e_1_2_1_30_1","unstructured":"Wang , L. , Jajodia , S. , and Wijesekera , D . 2004. Securing olap data cubes against privacy breaches . In Proceedings of the IEEE Symposium on Security and Privacy. Wang, L., Jajodia, S., and Wijesekera, D. 2004. Securing olap data cubes against privacy breaches. In Proceedings of the IEEE Symposium on Security and Privacy."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958494"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352533.1352547"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2007.142"}],"container-title":["ACM Transactions on Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1689239.1689244","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1689239.1689244","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:41:13Z","timestamp":1750250473000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1689239.1689244"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,2]]},"references-count":33,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2010,2]]}},"alternative-id":["10.1145\/1689239.1689244"],"URL":"https:\/\/doi.org\/10.1145\/1689239.1689244","relation":{},"ISSN":["1550-4859","1550-4867"],"issn-type":[{"type":"print","value":"1550-4859"},{"type":"electronic","value":"1550-4867"}],"subject":[],"published":{"date-parts":[[2010,2]]},"assertion":[{"value":"2007-10-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2009-06-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2010-03-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}