A Secured Dynamic Location Monitoring System in WSN
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 3
Abstract
Wireless sensor network is broadly spreading network of the communication field. Wireless sensor network is having sensor nodes as sensing devices which sense physical or environmental conditions and a sink node is the node by which whole gathered information is transferred to the base station. Right from the defense services to the public services, wireless sensor network plays an important role. Heterogeneousness, distributed processing, low bandwidth communication, large scale coordination and secured location monitoring are the basic problems arriving in WSN. The surveillance system is one of the most important service provided with this wireless sensor network. But the problem of location security is still arriving during monitoring a person location. We propose a system which provides nearly precise location as well as maintaining location privacy to overcome this security problem. Here in this paper we propose a single algorithm which gives only the nearby location of monitoring person rather than precise location to prevent the location privacy. The scheme of spatial cloaking with the use of dummies is applying here. The concept of k-anonymity is also applied here which is mean that a person is indistinguishable from k numbers of people. For monitoring a location continuously here uses dynamic data, so the location wherever a monitoring person goes will be continuously traced. Less number of operations and by the use of single algorithm the time required is less and the output is appropriate. The result shows that our system is more reliable to monitor a location with preserving privacy.
Authors and Affiliations
Shrikant P. Dhawale, Archana R. Raut
Energy Efficient Group Key Management For Secure Data Processing In Ad hoc Networks
The key management is the course of action of maintaining the secret key between the sender and receiver. By means of this key the sender can encrypt the data which is broadcasted to the receiver and send it with the...
Design a pattern generator with low switching activity to test complex combinational logic with high test coverage
In circuit large number of combinational logic used so logic depth is large, so it is impossible to test every fault with other techniques because it’s take more time. In order to increase speed of an algorithm for te...
Key Frame Extraction and Shot Change Detection for compressing Color Video
Progress intechnology is rapidly increasing now-a-days. The number of user are increasing but the resources are limited. So this project is to effectively and efficiently use the limited and expensive resource, soas...
A Hybrid Approach to Detect and Recognize Texts in Images
Text data present in images serves important information which is helpful for different applications. Locating text in case of variation in style, color, as well as complex image background makes text reading from imag...
Butterfly Design for RADIX-4K DIF FFT
VLSI and Digital Signal Processing are the two emerging technologies in the present world. Design of high performance, low area and low power VLSI circuits are needed for the DSP applications. This paper is dealing w...