IJWMT Vol. 13, No. 2, 8 Apr. 2023
Cover page and Table of Contents: PDF (size: 509KB)
Full Text (PDF, 509KB), PP.7-22
Views: 0 Downloads: 0
Privacy, network, QoS, machine learning, location, temporal data
Privacy preservation in wireless networks is a multidomain task, including encryption, hashing, secure routing, obfuscation, and third-party data sharing. To design a privacy preservation model for wireless networks, it is recommended that data privacy, location privacy, temporal privacy, node privacy, and route privacy be incorporated. However, incorporating these models into any wireless network is computationally complex. Moreover, it affects the quality of services (QoS) parameters like end-to-end delay, throughput, energy consumption, and packet delivery ratio. Therefore, network designers are expected to use the most optimum privacy models that should minimally affect these QoS metrics. To do this, designers opt for standard privacy models for securing wireless networks without considering their interconnectivity and interface-ability constraints. Due to this, network security increases, but overall, network QoS is reduced. To reduce the probability of such scenarios, this text analyses and reviews various state-of-the-art models for incorporating privacy preservation in wireless networks without compromising their QoS performance. These models are compared on privacy strength, end-to-end delay, energy consumption, and network throughput. The comparison will assist network designers and researchers to select the best models for their given deployments, thereby assisting in privacy improvement while maintaining high QoS performance.Moreover, this text also recommends various methods to work together to improve their performance. This text also recommends various proven machine learning architectures that can be contemplated & explored by networks to enhance their privacy performance. The paper intends to provide a brief survey of different types of Privacy models and their comparison, which can benefit the readers in choosing a privacy model for their use.
Namrata J. Patel, Ashish Jadhav, "A Systematic Review of Privacy Preservation Models in Wireless Networks", International Journal of Wireless and Microwave Technologies(IJWMT), Vol.13, No.2, pp. 7-22, 2023. DOI:10.5815/ijwmt.2023.02.02
[1]Dou, H., Chen, Y., Yang, Y. et al. A secure and efficient privacy-preserving data aggregation algorithm. J Ambient Intell Human Comput (2021). https://doi.org/10.1007/s12652-020-02801-6
[2]Xie, Q., Li, K., Tan, X. et al. A secure and privacy-preserving authentication protocol for wireless sensor networks in smart city. J Wireless Com Network 2021, 119 (2021). https://doi.org/10.1186/s13638-021-02000-7
[3]Renwan Bi, Qianxin Chen, Lei Chen, Jinbo Xiong, Dapeng Wu, "A Privacy-Preserving Personalized Service Framework through Bayesian Game in Social IoT", Wireless Communications and Mobile Computing, vol. 2020, Article ID 8891889, 13 pages, 2020. https://doi.org/10.1155/2020/8891889
[4]Kaissis, G., Makowski, M., Rückert, D., & Braren, R. (2020). Secure, privacy-preserving and federated machine learning in medical imaging. Nature Machine Intelligence, 2, 305-311.
[5]Q. Wang, Y. Zhang, X. Lu, Z. Wang, Z. Qin and K. Ren, "Real-Time and Spatio-Temporal Crowd-Sourced Social Network Data Publishing with Differential Privacy," in IEEE Transactions on Dependable and Secure Computing, vol. 15, no. 4, pp. 591-606, 1 July-Aug. 2018, doi: 10.1109/TDSC.2016.2599873.
[6]C. Niu, Z. Zheng, F. Wu, X. Gao and G. Chen, "Achieving Data Truthfulness and Privacy Preservation in Data Markets," in IEEE Transactions on Knowledge and Data Engineering, vol. 31, no. 1, pp. 105-119, 1 Jan. 2019, doi: 10.1109/TKDE.2018.2822727.
[7]Babu, S.S., Balasubadra, K. Revamping data access privacy preservation method against inside attacks in wireless sensor networks. Cluster Comput 22, 65–75 (2019). https://doi.org/10.1007/s10586-018-1706-1
[8]H. Song, T. Luo, X. Wang and J. Li, "Multiple Sensitive Values-Oriented Personalized Privacy Preservation Based on Randomized Response," in IEEE Transactions on Information Forensics and Security, vol. 15, pp. 2209-2224, 2020, doi: 10.1109/TIFS.2019.2959911.
[9]G. Qiu, D. Guo, Y. Shen, G. Tang and S. Chen, "Mobile Semantic-aware Trajectory for Personalized Location Privacy Preservation," in IEEE Internet of Things Journal, doi: 10.1109/JIOT.2020.3016466.
[10]H. Liu, X. Yao, T. Yang and H. Ning, "Cooperative Privacy Preservation for Wearable Devices in Hybrid Computing-Based Smart Health," in IEEE Internet of Things Journal, vol. 6, no. 2, pp. 1352-1362, April 2019, doi: 10.1109/JIOT.2018.2843561.
[11]J. Ni, K. Zhang, Q. Xia, X. Lin and X. S. Shen, "Enabling Strong Privacy Preservation and Accurate Task Allocation for Mobile Crowdsensing," in IEEE Transactions on Mobile Computing, vol. 19, no. 6, pp. 1317-1331, 1 June 2020, doi: 10.1109/TMC.2019.2908638.
[12]Z. Xu and A. A. Julius, "Robust Temporal Logic Inference for Provably Correct Fault Detection and Privacy Preservation of Switched Systems," in IEEE Systems Journal, vol. 13, no. 3, pp. 3010-3021, Sept. 2019, doi: 10.1109/JSYST.2019.2906160.
[13]Shuai, M., Xiong, L., Wang, C. and Yu, N. (2020), Lightweight and privacy-preserving authentication scheme with the resilience of desynchronisation attacks for WBANs. IET Inf. Secur., 14: 380-390. https://doi.org/10.1049/iet-ifs.2019.0491
[14]Kamil, IA, Ogundoyin, SO. On the security of privacy-preserving authentication scheme with full aggregation in vehicular ad hoc network. Security and Privacy. 2020; 3:e104. https://doi.org/10.1002/spy2.104
[15]Deebak, B.D., Al-Turjman, F. & Nayyar, A. Chaotic-map based authenticated security framework with privacy preservation for remote point-of-care. Multimed Tools Appl 80, 17103–17128 (2021). https://doi.org/10.1007/s11042-020-10134-x
[16]Roy, A.K. and Khan, A.K. (2020), Privacy preservation with RTT-based detection for wireless mesh networks. IET Inf. Secur., 14: 391-400. https://doi.org/10.1049/iet-ifs.2019.0492
[17]S. Chavhan, D. Gupta, C. B. N, A. Khanna and J. J. P. C. Rodrigues, "Agent Pseudonymous Authentication-Based Conditional Privacy Preservation: An Emergent Intelligence Technique," in IEEE Systems Journal, vol. 14, no. 4, pp. 5233-5244, Dec. 2020, doi: 10.1109/JSYST.2020.2994631.
[18]Zhang, L., Chen, M., Liu, D. et al. A ε-sensitive indistinguishable scheme for privacy preserving. Wireless Netw 26, 5013–5033 (2020). https://doi.org/10.1007/s11276-020-02378-0
[19]B. Safia and C. Yacine, "Privacy Preservation in Social Networks Sequential Publishing," 2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA), 2018, pp. 732-739, doi: 10.1109/AINA.2018.00110.
[20]Z. Zhang, H. Zhang, S. He and P. Cheng, "Bilateral Privacy-Preserving Utility Maximization Protocol in Database-Driven Cognitive Radio Networks," in IEEE Transactions on Dependable and Secure Computing, vol. 17, no. 2, pp. 236-247, 1 March-April 2020, doi: 10.1109/TDSC.2017.2781248.
[21]S. M. Errapotu et al., "Bid Privacy Preservation in Matching-Based Multiradio Multichannel Spectrum Trading," in IEEE Transactions on Vehicular Technology, vol. 67, no. 9, pp. 8336-8347, Sept. 2018, doi: 10.1109/TVT.2018.2845798.
[22]Q. Xu, Z. Su, M. Dai and S. Yu, "APIS: Privacy-Preserving Incentive for Sensing Task Allocation in Cloud and Edge-Cooperation Mobile Internet of Things With SDN," in IEEE Internet of Things Journal, vol. 7, no. 7, pp. 5892-5905, July 2020, doi: 10.1109/JIOT.2019.2954380.
[23]Du, Jun & Jiang, Chunxiao & Gelenbe, Erol & Xu, Lei & Li, Jianhua & Ren, Yong. (2018). Distributed Data Privacy Preservation in IoT Applications. IEEE Wireless Communications. 25. 68-76. 10.1109/MWC.2017.1800094.
[24]X. Wang, J. He, P. Cheng and J. Chen, "Privacy Preserving Collaborative Computing: Heterogeneous Privacy Guarantee and Efficient Incentive Mechanism," in IEEE Transactions on Signal Processing, vol. 67, no. 1, pp. 221-233, 1 Jan.1, 2019, doi: 10.1109/TSP.2018.2880722.
[25]Hussain, Siam Umar & Koushanfar, Farinaz. (2016). Privacy preserving localization for smart automotive systems. 1-6. 10.1145/2897937.2898071.
[26]X. Xu, Q. Liu, X. Zhang, J. Zhang, L. Qi and W. Dou, "A Blockchain-Powered Crowdsourcing Method With Privacy Preservation in Mobile Environment," in IEEE Transactions on Computational Social Systems, vol. 6, no. 6, pp. 1407-1419, Dec. 2019, doi: 10.1109/TCSS.2019.2909137.
[27]X. Shi, F. Tong, W. -A. Zhang and L. Yu, "Resilient Privacy-Preserving Distributed Localization Against Dishonest Nodes in Internet of Things," in IEEE Internet of Things Journal, vol. 7, no. 9, pp. 9214-9223, Sept. 2020, doi: 10.1109/JIOT.2020.3004709.
[28]Z. Zhang, S. He, J. Chen and J. Zhang, "REAP: An Efficient Incentive Mechanism for Reconciling Aggregation Accuracy and Individual Privacy in Crowdsensing," in IEEE Transactions on Information Forensics and Security, vol. 13, no. 12, pp. 2995-3007, Dec. 2018, doi: 10.1109/TIFS.2018.2834232.
[29]M. Keshk, B. Turnbull, N. Moustafa, D. Vatsalan and K. R. Choo, "A Privacy-Preserving-Framework-Based Blockchain and Deep Learning for Protecting Smart Power Networks," in IEEE Transactions on Industrial Informatics, vol. 16, no. 8, pp. 5110-5118, Aug. 2020, doi: 10.1109/TII.2019.2957140.
[30]S. Zhu, H. Hu, Y. Li and W. Li, "Hybrid Blockchain Design for Privacy Preserving Crowdsourcing Platform," 2019 IEEE International Conference on Blockchain (Blockchain), 2019, pp. 26-33, doi: 10.1109/Blockchain.2019.00013.
[31]S. Linoy, H. Mahdikhani, S. Ray, R. Lu, N. Stakhanova and A. Ghorbani, "Scalable Privacy-Preserving Query Processing over Ethereum Blockchain," 2019 IEEE International Conference on Blockchain (Blockchain), 2019, pp. 398-404, doi: 10.1109/Blockchain.2019.00061.
[32]Yao, Lin & Chen, Zhenyu & Hu, Haibo & Wu, Guowei & Wu, Bin. (2020). Sensitive attribute privacy preservation of trajectory data publishing based on l-diversity. Distributed and Parallel Databases. 1-27. 10.1007/s10619-020-07318-7.
[33]Shabbir, Maryam & Shabbir, Ayesha & Iwendi, Celestine & Javed, Abdul Rehman & Rizwan, Muhammad & Herencsar, Norbert & Lin, Chun-Wei. (2021). Enhancing Security of Health Information Using Modular Encryption Standard in Mobile Cloud Computing. IEEE Access. PP. 1-1. 10.1109/ACCESS.2021.3049564.
[34]Wang, Xin & Ishii, Hideaki & Linkang, Du & Cheng, Peng & Chen, Jiming. (2019). Privacy-preserving Distributed Machine Learning via Local Randomization and ADMM Perturbation.
[35]Lu, Xiuqing & Pan, Zhenkuan & Xian, Hequn. (2020). An efficient and secure data sharing scheme for mobile devices in cloud computing. Journal of Cloud Computing. 9. 10.1186/s13677-020-00207-5.
[36]Razaullah Khan, Xiaofeng Tao, Adeel Anjum, Haider Sajjad, Saif ur Rehman Malik, Abid Khan, Fatemeh Amiri, "Privacy Preserving for Multiple Sensitive Attributes against Fingerprint Correlation Attack Satisfying c-Diversity", Wireless Communications and Mobile Computing, vol. 2020, Article ID 8416823, 18 pages, 2020. https://doi.org/10.1155/2020/8416823
[37]Yujiao Song, Hao Wang, Xiaochao Wei, Lei Wu, "Efficient Attribute-Based Encryption with Privacy-Preserving Key Generation and Its Application in Industrial Cloud", Security and Communication Networks, vol. 2019, Article ID 3249726, 9 pages, 2019. https://doi.org/10.1155/2019/3249726
[38]G. Zhang, A. Zhang, P. Zhao and J. Sun, "Lightweight Privacy-Preserving Scheme in Wi-Fi Fingerprint-Based Indoor Localization," in IEEE Systems Journal, vol. 14, no. 3, pp. 4638-4647, Sept. 2020, doi: 10.1109/JSYST.2020.2977970.
[39]G. Sun, S. Sun, H. Yu and M. Guizani, "Toward Incentivizing Fog-Based Privacy-Preserving Mobile Crowdsensing in the Internet of Vehicles," in IEEE Internet of Things Journal, vol. 7, no. 5, pp. 4128-4142, May 2020, doi: 10.1109/JIOT.2019.2951410.
[40]C. Zhao, J. Chen, J. He and P. Cheng, "Privacy-Preserving Consensus-Based Energy Management in Smart Grids," in IEEE Transactions on Signal Processing, vol. 66, no. 23, pp. 6162-6176, 1 Dec.1, 2018, doi: 10.1109/TSP.2018.2872817.