{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T04:38:56Z","timestamp":1760243936081,"version":"build-2065373602"},"reference-count":31,"publisher":"MDPI AG","issue":"9","license":[{"start":{"date-parts":[[2010,9,8]],"date-time":"2010-09-08T00:00:00Z","timestamp":1283904000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Wireless sensor networks (WSNs) generally have a many-to-one structure so that event information flows from sensors to a unique sink. In recent WSN applications, many-to-many structures evolved due to the need for conveying collected event information to multiple sinks. Privacy preserved data collection models in the literature do not solve the problems of WSN applications in which network has multiple un-trusted sinks with different level of privacy requirements. This study proposes a data collection framework bases on k-anonymity for preventing record disclosure of collected event information in WSNs. Proposed method takes the anonymity requirements of multiple sinks into consideration by providing different levels of privacy for each destination sink. Attributes, which may identify an event owner, are generalized or encrypted in order to meet the different anonymity requirements of sinks at the same anonymized output. If the same output is formed, it can be multicasted to all sinks. The other trivial solution is to produce different anonymized outputs for each sink and send them to related sinks. Multicasting is an energy efficient data sending alternative for some sensor nodes. Since minimization of energy consumption is an important design criteria for WSNs, multicasting the same event information to multiple sinks reduces the energy consumption of overall network.<\/jats:p>","DOI":"10.3390\/s100908375","type":"journal-article","created":{"date-parts":[[2010,9,19]],"date-time":"2010-09-19T09:41:46Z","timestamp":1284889306000},"page":"8375-8397","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Data Collection Framework for Energy Efficient Privacy Preservation in Wireless Sensor Networks Having Many-to-Many Structures"],"prefix":"10.3390","volume":"10","author":[{"given":"Hayretdin","family":"Bahsi","sequence":"first","affiliation":[{"name":"Turkish National Research Institute of Electronics and Cryptology, Gebze, Kocaeli, Turkey"}]},{"given":"Albert","family":"Levi","sequence":"additional","affiliation":[{"name":"Faculty of Engineering and Natural Sciences, Sabanc\u0131 University, Orhanl\u0131 - Tuzla, 34956 Istanbul, Turkey"}]}],"member":"1968","published-online":{"date-parts":[[2010,9,8]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1109\/MC.2003.1236475","article-title":"Security and privacy in sensor networks","volume":"36","author":"Chan","year":"2003","journal-title":"Computer"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Boyle, D, and Newe, T (2007, January 4\u20139). Security protocols for use with wireless sensor networks: A survey of security architectures. Guadeloupe, France.","DOI":"10.1109\/ICWMC.2007.80"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"2314","DOI":"10.1016\/j.comcom.2007.04.009","article-title":"A survey of key management schemes in wireless sensor networks","volume":"30","author":"Xiao","year":"2007","journal-title":"Comput. Commun"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1749603.1749605","article-title":"Privacy-preserving data publishing: A Survey on recent developments","volume":"42","author":"Fung","year":"2009","journal-title":"ACM Comput. Surv"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1142\/S0218488502001648","article-title":"k-anonymity: A model for protecting privacy","volume":"10","author":"Sweeney","year":"2002","journal-title":"Int. J. Uncertain. Fuziness, Knowl.-Based Syst"},{"key":"ref_6","unstructured":"Pfitzmann, A, and Khntopp, M (2009\/2001). Designing Privacy Enhancing Technologies, Springer."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1007\/978-0-387-70992-5_2","article-title":"A general survey of privacy preserving data mining models and algorithms","volume":"34","author":"Aggarwal","year":"2008","journal-title":"Priv. Preserving Data Min. Models Algorithm"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Gkoulalas-Divanis, A, and Verykiosc, VS (2009). An overview of rrivacy preserving data mining. Crossroads, 15.","DOI":"10.1145\/1558897.1558903"},{"key":"ref_9","first-page":"241","article-title":"k-Anonymity based framework for privacy preserving data collection in wireless sensor networks","volume":"18","author":"Bahsi","year":"2010","journal-title":"Turk. J. Electr. Eng. Comput. Sci"},{"key":"ref_10","unstructured":"Andritsos, P, and Tzerpos, V (2003, January 13\u201316). Software clustering based on information loss minimization. Victoria, Canada."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"2826","DOI":"10.1016\/j.comcom.2007.05.024","article-title":"A survey on clustering algorithms for wireless sensor networks","volume":"30","author":"Abbasi","year":"2007","journal-title":"Comput. Commun"},{"key":"ref_12","unstructured":"Carman, DW, Kruus, PS, and Matt, BJ (2000). Constraints and Approaches for Distributed Sensor Network Security, NAI Labs, The Security Research Division Network Associates, Inc. Technical Report 00-010."},{"key":"ref_13","unstructured":"Meyerson, A, and Williams, R (, January June). On the complexity of optimal k-anonymity. Paris, France."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Lefevre, K, Dewitt, DJ, and Ramakrishnan, R (2005, January 14\u201316). Incognito: Efficient full-domain k-anonymity. Baltimore, MD, USA.","DOI":"10.1145\/1066157.1066164"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"1010","DOI":"10.1109\/69.971193","article-title":"Protecting respondents\u2019 identities in microdata release","volume":"13","author":"Samarati","year":"2005","journal-title":"IEEE Trans. Know. Data Eng"},{"key":"ref_16","unstructured":"Aggarwal, G, Feder, T, Kenthapadi, K, Motwani, R, Panigraphy, R, Thomas, D, and Zhu, A Database Theory - ICDT 2005, Springer."},{"key":"ref_17","unstructured":"Sweeney, L (1997, January 10\u201313). Datafly: A System for providing anonymity in medical data. Lake Tahoe, CA, USA."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A, Gehrke, J, Kifer, D, and Venkitasubramaniam, M (2006, January 3\u20137). l-Diversity: Privacy beyond k-anonymity. Atlanta, GA, USA.","DOI":"10.1145\/1217299.1217302"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Truta, TM, and Bindu, V (2006, January 3\u20137). Privacy protection: p-Sensitive k-anonymity property. Atlanta, GA, USA.","DOI":"10.1109\/ICDEW.2006.116"},{"key":"ref_20","first-page":"19","article-title":"Extended p-sensitive k-anonymity","volume":"LI","author":"Campan","year":"2006","journal-title":"Stud Univ BabesBolyai Infor"},{"key":"ref_21","unstructured":"Li, N, Li, T, and Venkatasubramanian, S (, January April). t-Closeness: Privacy beyond k-anonymity and l-diversity. Istanbul, Turkey. Available on line: http:\/\/citeseerx.ist.psu.edu\/viewdoc\/summary?doi=10.1.1.92.587 (accessed on 30 July 2010)."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1007\/BF00206326","article-title":"The dining cryptographers problem: Unconditional sender and receipent untraceability","volume":"1","author":"Chaum","year":"1988","journal-title":"J. Cryptol"},{"key":"ref_23","first-page":"84","article-title":"Untraceable electronic mail, return addresses, and digital pseudonyms","volume":"24","author":"Chaum","year":"1981","journal-title":"Commun. Associations Comput. Mach"},{"key":"ref_24","unstructured":"Gulcu, C, and Tsudik, G (1996, January 22\u201323). Mixing email with BABEL. San Diego, CA, USA."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1145\/293411.293778","article-title":"Anonymous web transactions with crowds","volume":"42","author":"Reiter","year":"1999","journal-title":"Commun. ACM"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Gruteser, M, and Grunwald, D (2003, January 5\u20138). Anonymous usage of location-based services through spatial and temporal cloaking. San Franscisco, CA, USA.","DOI":"10.1145\/1066116.1189037"},{"key":"ref_27","unstructured":"Gruteser, M, Schelle, G, Jain, A, Han, R, and Grundwald, D (2003, January 18\u201321). Privacy-aware location sensor networks. Lihue, HI, USA."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Ozturk, C, Zhang, Y, and Trappe, W (2004, January 25). Source-location privacy in energy-constrained sensor network routing. Washington DC, USA.","DOI":"10.1145\/1029102.1029117"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Jian, Y, Chen, S, Zhang, Z, and Zhang, L (2007, January 6\u201312). Protecting receiver-location privacy in wireless sensor networks. Anchorage, AK, USA.","DOI":"10.1109\/INFCOM.2007.227"},{"key":"ref_30","unstructured":"Wadaa, A, Olariu, S, Wilson, L, Eltoweissy, M, and Jones, K (2004, January 7\u20139). On providing anonymity in wireless sensor networks. Newport Beach, CA, USA."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TMC.2007.1062","article-title":"Protecting location privacy with personalized k-anonymity: Architecture and algorithms","volume":"7","author":"Gedik","year":"2008","journal-title":"IEEE Trans. Mob. Comput"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/10\/9\/8375\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T22:03:20Z","timestamp":1760220200000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/10\/9\/8375"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,9,8]]},"references-count":31,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2010,9]]}},"alternative-id":["s100908375"],"URL":"https:\/\/doi.org\/10.3390\/s100908375","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2010,9,8]]}}}