Adversaries and Countermeasures in Privacy-Enhanced Urban Sensing Systems

Today's digital society increasingly relies on the interconnection of heterogenous components, encompassing assorted actors, entities, systems, and a variety of (often mobile) computing devices. Revolutionary computing paradigms, such as people-centric urban sensing, have focused on the seamles...

Full description

Saved in:
Bibliographic Details
Published inIEEE systems journal Vol. 7; no. 2; pp. 311 - 322
Main Authors De Cristofaro, E., Di Pietro, R.
Format Journal Article
LanguageEnglish
Published New York IEEE 01.06.2013
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text
ISSN1932-8184
1937-9234
DOI10.1109/JSYST.2012.2221957

Cover

Abstract Today's digital society increasingly relies on the interconnection of heterogenous components, encompassing assorted actors, entities, systems, and a variety of (often mobile) computing devices. Revolutionary computing paradigms, such as people-centric urban sensing, have focused on the seamless collection of meaningful data from a large number of devices. The increasing complexity of deployed urban systems and related infrastructures, along with the growing amount of information collected, prompts a number of challenging security and privacy concerns. In this paper, we explore a number of scenarios where nodes of a urban sensing system are subject to individual queries. In this setting, multiple users and organizations (e.g., infrastructure operators) co-exist, but they may not trust each other to the full extent. As a result, we address the problems of protecting: 1) secrecy of reported data, and 2) confidentiality of query interests from the prying eyes of malicious entities. We introduce a realistic network model and study different adversarial models and strategies, distinguishing between resident and nonresident adversaries, considering both randomly distributed and local attackers. For each of them, we propose a distributed privacy-preserving technique and evaluate its effectiveness via analysis and simulation. Our techniques are tunable, trading off the level of privacy assurance with a small overhead increase, and independent from the complexity of the underlying infrastructures. We additionally provide a relevant improvement of data reliability and availability, while only relying on standard symmetric cryptography. The practicality of our proposals is demonstrated both analytically and experimentally.
AbstractList Today's digital society increasingly relies on the interconnection of heterogenous components, encompassing assorted actors, entities, systems, and a variety of (often mobile) computing devices. Revolutionary computing paradigms, such as people-centric urban sensing, have focused on the seamless collection of meaningful data from a large number of devices. The increasing complexity of deployed urban systems and related infrastructures, along with the growing amount of information collected, prompts a number of challenging security and privacy concerns. In this paper, we explore a number of scenarios where nodes of a urban sensing system are subject to individual queries. In this setting, multiple users and organizations (e.g., infrastructure operators) co-exist, but they may not trust each other to the full extent. As a result, we address the problems of protecting: 1) secrecy of reported data, and 2) confidentiality of query interests from the prying eyes of malicious entities. We introduce a realistic network model and study different adversarial models and strategies, distinguishing between resident and nonresident adversaries, considering both randomly distributed and local attackers. For each of them, we propose a distributed privacy-preserving technique and evaluate its effectiveness via analysis and simulation. Our techniques are tunable, trading off the level of privacy assurance with a small overhead increase, and independent from the complexity of the underlying infrastructures. We additionally provide a relevant improvement of data reliability and availability, while only relying on standard symmetric cryptography. The practicality of our proposals is demonstrated both analytically and experimentally.
Author Di Pietro, R.
De Cristofaro, E.
Author_xml – sequence: 1
  givenname: E.
  surname: De Cristofaro
  fullname: De Cristofaro, E.
  email: edc@parc.com
  organization: Palo Alto Res. Center, Palo Alto, CA, USA
– sequence: 2
  givenname: R.
  surname: Di Pietro
  fullname: Di Pietro, R.
  email: dipietro@mat.uniroma3.it
  organization: Roma Tre Univ., Rome, Italy
BookMark eNqNkU1LAzEURYMoqNU_oJsBN26m5nOSLKX4USkoVBeuhtfMG01pM5rMFPrvnVpx4UJdvfA4J7nhHpLd0AQk5ITRIWPUXtxNn6ePQ04ZH3LOmVV6hxwwK3RuuZC7n2eeG2bkPjlMaU6pMkrbAzK-rFYYE0SPKYNQZaOmCy3GJULqYr_zIXuIfgVunV-FVwgOq-wpziBkUwzJh5dsuk4tLtMR2athkfD4aw7I0_XV4-g2n9zfjEeXk9xJYdrcKWkFADWyFrqe6dnMWUsddaxykiEWUIkKATU3EnhRq1pJgEr1smFSoBiQ8-29b7F57zC15dInh4sFBGy6VLJCM6U41eJvVBSKKUvFf1Ft1AY9-4HOmy6G_s89JfqQBRO6p_iWcrFJKWJdvkW_hLguGS03nZWfnZWbzsqvznrJ_JCcb6H1TWgj-MXv6ulW9Yj4_VbRx9aiEB_45qXF
CODEN ISJEB2
CitedBy_id crossref_primary_10_1109_JIOT_2020_3037115
crossref_primary_10_1109_TVT_2015_2415515
crossref_primary_10_1007_s11280_024_01300_4
crossref_primary_10_1109_MCOM_2014_6871673
crossref_primary_10_1016_j_jss_2015_03_067
crossref_primary_10_1007_s11280_019_00745_2
Cites_doi 10.1109/49.668972
10.1145/1555816.1555823
10.1145/1592761.1592778
10.4108/ICST.PERVASIVEHEALTH2010.8851
10.1109/INFCOM.2005.1497887
10.1007/11947950_57
10.1145/1814433.1814448
10.1145/1734583.1734592
10.1145/1689239.1689244
10.1145/1460412.1460445
10.1109/INFCOM.2010.5462094
10.1145/1620545.1620549
10.1145/293347.293350
10.1145/1217299.1217302
10.1007/978-3-642-15497-3_39
10.1145/345910.345953
10.1109/ICNP.2004.1348111
10.1145/1555816.1555834
10.1145/1592606.1592616
10.1109/INFCOM.2010.5462147
10.1145/358549.358563
10.1016/S1570-8705(03)00008-8
10.1016/j.pmcj.2009.10.005
10.1145/1341731.1341735
10.1145/1182807.1182821
10.1109/MCOM.2002.1024422
10.1145/1814433.1814437
10.1109/COMSNETS.2009.4808850
10.1109/PERCOM.2010.5466993
10.1145/1378600.1378624
10.1142/S0218488502001648
10.1145/1814433.1814442
10.1016/j.comcom.2009.08.012
10.1145/501449.501452
10.1109/ICCCN.2010.5560129
10.1145/1234161.1234179
10.1145/1460412.1460440
10.1007/978-3-540-69170-9_10
10.1007/978-3-642-12654-3_9
10.1145/1460412.1460444
10.1145/1340771.1340777
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Jun 2013
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Jun 2013
DBID 97E
RIA
RIE
AAYXX
CITATION
7SC
7TB
8FD
FR3
JQ2
KR7
L7M
L~C
L~D
DOI 10.1109/JSYST.2012.2221957
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Mechanical & Transportation Engineering Abstracts
Technology Research Database
Engineering Research Database
ProQuest Computer Science Collection
Civil Engineering Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Civil Engineering Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Mechanical & Transportation Engineering Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Engineering Research Database
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList Civil Engineering Abstracts

Civil Engineering Abstracts

Civil Engineering Abstracts
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Xplore
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1937-9234
EndPage 322
ExternalDocumentID 2952415021
10_1109_JSYST_2012_2221957
6365736
Genre orig-research
GroupedDBID 0R~
29I
4.4
5GY
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACIWK
AENEX
AETIX
AGQYO
AGSQL
AHBIQ
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
EBS
EJD
HZ~
IFIPE
IPLJI
JAVBF
LAI
M43
O9-
OCL
RIA
RIE
RNS
AAYXX
CITATION
RIG
7SC
7TB
8FD
FR3
JQ2
KR7
L7M
L~C
L~D
ID FETCH-LOGICAL-c438t-c5493aa084f37fb7bbc990c0c1dc41ee6ad3deae7284a26f5f54aad54388143e3
IEDL.DBID RIE
ISSN 1932-8184
IngestDate Fri Sep 05 07:54:10 EDT 2025
Fri Sep 05 06:38:18 EDT 2025
Fri Sep 05 08:24:06 EDT 2025
Sun Jun 29 16:54:42 EDT 2025
Tue Jul 01 03:14:24 EDT 2025
Thu Apr 24 22:54:48 EDT 2025
Tue Aug 26 16:43:18 EDT 2025
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 2
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c438t-c5493aa084f37fb7bbc990c0c1dc41ee6ad3deae7284a26f5f54aad54388143e3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ObjectType-Article-2
ObjectType-Feature-1
content type line 23
OpenAccessLink https://zenodo.org/record/3433429
PQID 1338146137
PQPubID 23500
PageCount 12
ParticipantIDs ieee_primary_6365736
crossref_primary_10_1109_JSYST_2012_2221957
proquest_miscellaneous_1365159033
proquest_journals_1338146137
proquest_miscellaneous_1365157853
proquest_miscellaneous_1671552073
crossref_citationtrail_10_1109_JSYST_2012_2221957
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2013-06-01
PublicationDateYYYYMMDD 2013-06-01
PublicationDate_xml – month: 06
  year: 2013
  text: 2013-06-01
  day: 01
PublicationDecade 2010
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE systems journal
PublicationTitleAbbrev JSYST
PublicationYear 2013
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
ref12
ref15
ref14
ref53
ortolani (ref35) 2010
ref52
ref55
dua (ref45) 2009
ref54
ref10
ref17
ref16
de cristofaro (ref47) 2011
ref19
ref18
cormen (ref34) 2001
ref50
daeman (ref33) 1999
ref46
de cristofaro (ref48) 2012
ref42
ref41
ref44
ref43
(ref11) 2010
ref8
ref7
paulos (ref4) 2007
ref9
santanche (ref3) 2006
ref6
ref5
ref37
ref36
ref31
bagula (ref49) 2011
ref32
burke (ref2) 2006
ref1
de cristofaro (ref51) 2009
ref39
ref38
ref24
ref23
huang (ref40) 2010; 33
ref26
ref25
ref20
ref22
dingledine (ref30) 2004
ref28
ref27
ref29
sion (ref21) 2007
References_xml – ident: ref52
  doi: 10.1109/49.668972
– ident: ref8
  doi: 10.1145/1555816.1555823
– ident: ref36
  doi: 10.1145/1592761.1592778
– ident: ref13
  doi: 10.4108/ICST.PERVASIVEHEALTH2010.8851
– ident: ref26
  doi: 10.1109/INFCOM.2005.1497887
– ident: ref25
  doi: 10.1007/11947950_57
– ident: ref12
  doi: 10.1145/1814433.1814448
– ident: ref46
  doi: 10.1145/1734583.1734592
– ident: ref54
  doi: 10.1145/1689239.1689244
– ident: ref10
  doi: 10.1145/1460412.1460445
– ident: ref55
  doi: 10.1109/INFCOM.2010.5462094
– ident: ref7
  doi: 10.1145/1620545.1620549
– ident: ref20
  doi: 10.1145/293347.293350
– start-page: 1
  year: 2009
  ident: ref51
  article-title: Privacy-preserving querying in wireless sensor networks
  publication-title: Proc ICCCN
– ident: ref42
  doi: 10.1145/1217299.1217302
– ident: ref32
  doi: 10.1007/978-3-642-15497-3_39
– year: 2006
  ident: ref3
  article-title: Senseweb: Browsing the physical world in real time
  publication-title: Proc IPSN
– year: 2011
  ident: ref49
  publication-title: Wireless Sensors for AllLow Cost Open Solutions for Environmental Monitoring
– start-page: 117
  year: 2006
  ident: ref2
  article-title: Participatory sensing
  publication-title: Proc World Sensor Web Workshop
– year: 2007
  ident: ref21
  article-title: On the computational practicality of private information retrieval
  publication-title: Proc NDSS
– ident: ref27
  doi: 10.1145/345910.345953
– ident: ref24
  doi: 10.1109/ICNP.2004.1348111
– ident: ref9
  doi: 10.1145/1555816.1555834
– ident: ref43
  doi: 10.1145/1592606.1592616
– ident: ref22
  doi: 10.1109/INFCOM.2010.5462147
– year: 2009
  ident: ref45
  article-title: Toward trustworthy participatory sensing
  publication-title: Proc HotSec
– year: 1999
  ident: ref33
  article-title: AES proposal: Rijndael
  publication-title: Proc 1st AES Conf
– ident: ref41
  doi: 10.1145/358549.358563
– ident: ref29
  doi: 10.1016/S1570-8705(03)00008-8
– ident: ref15
  doi: 10.1016/j.pmcj.2009.10.005
– year: 2007
  ident: ref4
  article-title: Sensing atmosphere
  publication-title: Proc SenSys Workshops
– start-page: 303
  year: 2004
  ident: ref30
  article-title: TOR: The second-generation onion router
  publication-title: Proc Usenix Security
– ident: ref31
  doi: 10.1145/1341731.1341735
– ident: ref5
  doi: 10.1145/1182807.1182821
– ident: ref50
  doi: 10.1109/MCOM.2002.1024422
– ident: ref16
  doi: 10.1145/1814433.1814437
– ident: ref37
  doi: 10.1109/COMSNETS.2009.4808850
– ident: ref18
  doi: 10.1109/PERCOM.2010.5466993
– ident: ref39
  doi: 10.1145/1378600.1378624
– year: 2001
  ident: ref34
  publication-title: Introduction to Algorithms
– ident: ref53
  doi: 10.1142/S0218488502001648
– ident: ref17
  doi: 10.1145/1814433.1814442
– volume: 33
  start-page: 1266
  year: 2010
  ident: ref40
  article-title: Preserving privacy in participatory sensing systems
  publication-title: Comput Commun
  doi: 10.1016/j.comcom.2009.08.012
– ident: ref28
  doi: 10.1145/501449.501452
– ident: ref38
  doi: 10.1109/ICCCN.2010.5560129
– start-page: 218
  year: 2012
  ident: ref48
  article-title: Query privacy in urban sensing systems
  publication-title: Proc ICDCN
– start-page: 23
  year: 2011
  ident: ref47
  article-title: PEPSI: Privacy-enhanced participatory sensing infrastructure
  publication-title: Proc WiSec
– ident: ref1
  doi: 10.1145/1234161.1234179
– ident: ref44
  doi: 10.1145/1460412.1460440
– ident: ref14
  doi: 10.1007/978-3-540-69170-9_10
– ident: ref19
  doi: 10.1007/978-3-642-12654-3_9
– start-page: 20
  year: 2010
  ident: ref35
  article-title: Event handoff unobservability in WSN
  publication-title: Proc iNetSec
– year: 2010
  ident: ref11
  publication-title: Quake-Catcher Network
– ident: ref6
  doi: 10.1145/1460412.1460444
– ident: ref23
  doi: 10.1145/1340771.1340777
SSID ssj0058579
Score 2.0148628
Snippet Today's digital society increasingly relies on the interconnection of heterogenous components, encompassing assorted actors, entities, systems, and a variety...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 311
SubjectTerms Adversarial models
complex systems
Complexity
Computation
Cryptography
Data privacy
Detection
Devices
Infrastructure
Privacy
Proposals
Queries
querying
security
Sensors
Silicon
Smart phones
Studies
urban sensing
wireless communications
Wireless sensor networks
Title Adversaries and Countermeasures in Privacy-Enhanced Urban Sensing Systems
URI https://ieeexplore.ieee.org/document/6365736
https://www.proquest.com/docview/1338146137
https://www.proquest.com/docview/1365157853
https://www.proquest.com/docview/1365159033
https://www.proquest.com/docview/1671552073
Volume 7
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT9wwEB4BJ3oor1ZdHpWRemu9JHHiJEeEQHSlRZWWlegp8isFgbxoH0jw65lxkhVqEfQWJePI8tgzn-2ZbwC-idQZRNUpJyxAp1U110oLrpLEGmvwbaDMH17I83E6uMquVuDHMhfGOReCz1yfHsNdvp2YBR2VHUkhs1zIVVjFadbkanVWF1Fv4NUjPMLRCaVdgkxUHg1Gv0eXFMWV9NEbxiW5ohdOKFRV-ccUB_9ytgHDrmdNWMltfzHXffP0F2nj_3Z9Ez62QJMdNzNjC1ac34YPL-gHd-BnqMY8C7tlprxllKBOpro5N5yxG89-TW8elHnkp_46xAqw8VQrz0YU9-7_sJbw_BOMz04vT855W1qBm1QUc25wWyiUioq0Fnmtc60NuiUTmdiaNHZOKiusUy5H76USWWd1liplM2xcIMJy4jOs-Yl3X4BZxCh5YeNClcTdJbQs8b-FJWZ5I6XuQdyNdWVa3nEqf3FXhf1HVFZBPxXpp2r104Pvyzb3DevGm9I7NOBLyXase7DfqbRqF-asoi05lTIX2Opw-RmXFN2TKO8mC5Kh-vA5Apn3ZMpIvCUjcyK4QyO6-3oP92A9aapr8Cjeh7X5dOEOEOPM9dcwuZ8B0gz3YA
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lb9QwEB6VcgAOvApioYCRuIG3Sew4yRFVrbalWyHtrlROkV8pFciL9oHU_npmnGRVFVS4Rck4sjz2zGd75huA90J6i6hacsICdFrVcKON4DrLnHUW30bK_PGpGs3k8Vl-tgUfN7kw3vsYfOaH9Bjv8t3crumobE8JlRdC3YG76Pdl3mZr9XYXcW9k1iNEwtENyT5FJqn2jidfJ1OK48qG6A_TipzRNTcU66r8YYyjhzl8BOO-b21gyffhemWG9uoGbeP_dv4xPOygJvvUzo0nsOXDU3hwjYBwB45iPeZl3C8zHRyjFHUy1u3J4ZJdBPZlcfFL20t-EL7FaAE2Wxgd2IQi38M56yjPn8Hs8GC6P-JdcQVupShX3OLGUGidlLIRRWMKYyw6JpvY1FmZeq-0E85rX6D_0plq8iaXWrscG5eIsbx4DtthHvwLYA5RSlG6tNQVsXcJoyr8b-mIW94qZQaQ9mNd2455nApg_KjjDiSp6qifmvRTd_oZwIdNm58t78at0js04BvJbqwHsNurtO6W5rKmTTkVMxfY6t3mMy4quinRwc_XJEMV4guEMv-SqRJxm4wqiOIOzejLv_fwLdwbTccn9cnR6edXcD9ra23wJN2F7dVi7V8j4lmZN3Gi_wboE_qt
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Adversaries+and+Countermeasures+in+Privacy-Enhanced+Urban+Sensing+Systems&rft.jtitle=IEEE+systems+journal&rft.au=De+Cristofaro%2C+Emiliano&rft.au=Di+Pietro%2C+Roberto&rft.date=2013-06-01&rft.issn=1932-8184&rft.eissn=1937-9234&rft.volume=7&rft.issue=2&rft.spage=311&rft.epage=322&rft_id=info:doi/10.1109%2FJSYST.2012.2221957&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1932-8184&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1932-8184&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1932-8184&client=summon