Achieving k-anonymity privacy protection using generalization and suppression
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
An architecture for privacy-sensitive ubiquitous computing
Proceedings of the 2nd international conference on Mobile systems, applications, and services
Using uncertainty in reputation methods to enforce cooperation in ad-hoc networks
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
Simplification and analysis of transitive trust networks
Web Intelligence and Agent Systems
Privacy-aware location sensor networks
HOTOS'03 Proceedings of the 9th conference on Hot Topics in Operating Systems - Volume 9
Reputation-based framework for high integrity sensor networks
ACM Transactions on Sensor Networks (TOSN)
Anonysense: privacy-aware people-centric sensing
Proceedings of the 6th international conference on Mobile systems, applications, and services
Transactional Confidentiality in Sensor Networks
IEEE Security and Privacy
Anonymous Data Collection in Sensor Networks
MOBIQUITOUS '07 Proceedings of the 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking&Services (MobiQuitous)
A critical approach to privacy research in ubiquitous environments-issues and underlying assumptions
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
Information theoretic framework of trust modeling and evaluation for ad hoc networks
IEEE Journal on Selected Areas in Communications
On trust models and trust evaluation metrics for ad hoc networks
IEEE Journal on Selected Areas in Communications
Trust management systems for wireless sensor networks: Best practices
Computer Communications
Hi-index | 0.00 |
In sensor networks, privacy can be addressed in different levels of the network stack and at different points of the information flow. This paper presents an application level scheme for controlling information disclosure at the points of data capture. The scheme includes a trust model for facilitating in-network privacy decisions. The trust model exploits the pre-deployment knowledge on the network topology and the information flows, and combines aspects from alternative approaches on trust establishment on common evaluation metrics, in order to allow for flexibility in the trust establishment process. The trust assigned to each data requestor is used to determine if the data or only a sample of it will be disclosed, or if the request will be rejected. The scheme allows the use of various mechanisms, including negative surveys, for publishing samples of data to partially trusted requestors. The proposed scheme has been validated through simulation. The results and analysis demonstrate its effectiveness in managing trust relationships and data disclosure operations.