Enabling Decentralized Privacy Preserving Data Processing in Sensor Networks
Abstract
The paper summarizes the findings of the Doctoral Thesis [1]. We propose a paradigm shift from traditional privacy-preserving joint computation, which relies on data obfuscation methods, to privacy preservation through anonymity. The main contribution of the thesis is a privacy-preserving protocol based on the Onion Routing concept that allows sensor network nodes to jointly compute an arbitrary function and keeps the participating nodes and their inputs private. We demonstrate the protocol's security and, through simulations, its effectiveness in large sensor networks.References
N. Hrovatin, Omogočanje decentralizirane obdelave
podatkov z varovanjem zasebnosti v senzorskih
omrežjih: doktorska disertacija. PhD thesis, Uni-
verza na Primorskem, Fakulteta za matematiko,
naravoslovje in . . . , 2023.
I. Tomić and J. A. McCann, “A survey of poten-
tial security issues in existing wireless sensor net-
work protocols,” IEEE Internet of Things Journal,
vol. 4, no. 6, pp. 1910–1923, 2017.
A. Sorniotti, L. Gomez, K. Wrona, and L. Odorico,
“Secure and trusted in-network data processing in
wireless sensor networks: a survey,” Journal of In-
formation Assurance and Security, vol. 2, no. 3,
pp. 189–199, 2007.
N. Hrovatin, A. Tošić, M. Mrissa, and J. Vičič, “A
general purpose data and query privacy preserv-
ing protocol for wireless sensor networks,” IEEE
Transactions on Information Forensics and Secu-
rity, 2023.
DOI:
https://doi.org/10.31449/inf.v48i1.5739Downloads
Published
How to Cite
Issue
Section
License
Authors retain copyright in their work. By submitting to and publishing with Informatica, authors grant the publisher (Slovene Society Informatika) the non-exclusive right to publish, reproduce, and distribute the article and to identify itself as the original publisher.
All articles are published under the Creative Commons Attribution license CC BY 3.0. Under this license, others may share and adapt the work for any purpose, provided appropriate credit is given and changes (if any) are indicated.
Authors may deposit and share the submitted version, accepted manuscript, and published version, provided the original publication in Informatica is properly cited.







