A Secured Dynamic Location Monitoring System in WSN
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 3
Abstract
Wireless sensor network is broadly spreading network of the communication field. Wireless sensor network is having sensor nodes as sensing devices which sense physical or environmental conditions and a sink node is the node by which whole gathered information is transferred to the base station. Right from the defense services to the public services, wireless sensor network plays an important role. Heterogeneousness, distributed processing, low bandwidth communication, large scale coordination and secured location monitoring are the basic problems arriving in WSN. The surveillance system is one of the most important service provided with this wireless sensor network. But the problem of location security is still arriving during monitoring a person location. We propose a system which provides nearly precise location as well as maintaining location privacy to overcome this security problem. Here in this paper we propose a single algorithm which gives only the nearby location of monitoring person rather than precise location to prevent the location privacy. The scheme of spatial cloaking with the use of dummies is applying here. The concept of k-anonymity is also applied here which is mean that a person is indistinguishable from k numbers of people. For monitoring a location continuously here uses dynamic data, so the location wherever a monitoring person goes will be continuously traced. Less number of operations and by the use of single algorithm the time required is less and the output is appropriate. The result shows that our system is more reliable to monitor a location with preserving privacy.
Authors and Affiliations
Shrikant P. Dhawale, Archana R. Raut
Construction of Covert Channel Using Data Hiding Mechanism In Ipv4
Covert channel is a way of abstracting the information and hiding the information, in such a way that the reader should not analyse the hidden information and transmit the data to the destination. The covert techniqu...
Network Coding Equivalent Content Distribution (NCECD) Scheme in P2P Networks
Anonymizing networks such as Tor allow users to access internet services privately by using a series of routers to hide the client’s IP address from the server. The success of such networks that However has been limit...
A Digital Harmonic Rejection Mixer with Analog Harmonic Pre-suppression
A harmonic rejection mixer (HRM) employing analog harmonic pre-suppression and subsequent digital domain harmonic suppression is proposed and investigated. The analog harmonic pre-suppression relaxes the dynamic rang...
An Effective Approach Of Compressing Encrypted Images
In this paper proposing a novel scheme of scalable coding for encrypted images. In the encryption phase, the original pixel values are masked by a modulo- 256 addition with nonrandom numbers that are derived from a s...
Secret Sharing of Convergent Keys to Third Party Concept of Dekey
Data de-duplication is a method for eliminating redundant data copies and has been widely used in cloud storage provider to reduce the storage space and bandwidth. The arising challenge is to perform secure de-duplic...