Efficient and Effective Techniques for Source and Sink Location Privacy in WSN.

Abstract

While many protocols for sensor network security provide confidentiality for the content of messages contextual information usually remains exposes. Such information can be critical to the mission of the sensor network such as the location of a target object in a monitoring application and it is often Important to protect this information as well as message content. There has been several recent studies on providing location privacy in sensor networks. We first argues that a strong adversary model the global eavesdropper is often realistic in practice and can defeat existing techniques. We formalize the location privacy issues under this strong adversary model and show how much communication overhead is needed for achieving a given level of privacy. We also proposes two techniques that prevent the leakage of location information: periodic collection and source simulation. In periodic collection provides a high levels of location privacy while source simulation provides trade-offs between privacy communication cost and latency.

Authors and Affiliations

G. Aruna Rekha, CH. TG Ramya

Keywords

Related Articles

Analysis of Principal Line-Based Alignment Refinement for Palmprint Recognition

Palmprint has proved to be one of themost unique andstable biometric characteristics.Image alignment is an important step in various biometric authentication systems. Most of the existing palmprint recognition algori...

Secured Bluetooth Authentication Using Artificial Neural Networks

Authentication in wireless networking is a mechanism to proof identities and avoid masking. The use of wireless devices and technology has made rapid growth in the market. In all such devices, user authentication is...

High Speed Implementation Of Fused Floating Point Add-Subtract Unit

Most universally useful processors (GPP) and application particular processors (ASP) utilize the coasting guide number-crunching due toward its wide and exact number framework. In any case, the coasting point operatio...

Annotation Wrapper for Annotating The Search Result Records Retrieved From Any Given Web Database

An annotation wrapper for the search site is automatically created and can be used to interpret new result pages from the similar web database. The data units arrived from the fundamental database are generally encod...

A New Approach On Incremntal Affinity Propagation Clustering Technique Based On Preference

Many of the clustering algorithms were intended for discovering patterns in static data. Nowadays, more and more data e.g., blogs, Web pages, video surveillance, etc., are come into view in dynamic manner, known as d...

Download PDF file
  • EP ID EP27717
  • DOI -
  • Views 285
  • Downloads 4

How To Cite

G. Aruna Rekha, CH. TG Ramya (2013). Efficient and Effective Techniques for Source and Sink Location Privacy in WSN.. International Journal of Research in Computer and Communication Technology, 2(10), -. https://europub.co.uk/articles/-A-27717