Efficient and Effective Techniques for Source and Sink Location Privacy in WSN.
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 10
Abstract
While many protocols for sensor network security provide confidentiality for the content of messages contextual information usually remains exposes. Such information can be critical to the mission of the sensor network such as the location of a target object in a monitoring application and it is often Important to protect this information as well as message content. There has been several recent studies on providing location privacy in sensor networks. We first argues that a strong adversary model the global eavesdropper is often realistic in practice and can defeat existing techniques. We formalize the location privacy issues under this strong adversary model and show how much communication overhead is needed for achieving a given level of privacy. We also proposes two techniques that prevent the leakage of location information: periodic collection and source simulation. In periodic collection provides a high levels of location privacy while source simulation provides trade-offs between privacy communication cost and latency.
Authors and Affiliations
G. Aruna Rekha, CH. TG Ramya
Power Optimization In Digital Circuits Using Scan-Based BIST
Technology provides smaller, faster and lower energy devices which allow more powerful and compact circuit- ry. Thermal and shot-noise estimations alone suggest that the fault rate of an individual Nano scale device...
LOAD Balancer Strategy Based On Cloud Computing
At present cloud computing is one of the utmost platform which delivers storage of data in very lower cost and accessible for all time over the internet. But it has more serious issue like security, load management a...
A Novel Approach for Reducing Routing Overhead In Mobile Ad hoc Network
The Mobile Adhoc Networks(MANET) are the examples of infrastructure less networks and are having frequent occurrence of route discoveries. In MANET, the routing has been performed with the help of neighbouring infor...
Verification of Metadata by Encryption for Data Storage Security in Cloud
Cloud Computing provides the way to share distributed resources and services that belong to different organizations or sites. Since Cloud Computing share distributed resources via network in the open environment thus...
Efficient Anonymity Profile Comparison Techniques To Filter Unwanted Messages From OSN User Walls
Social networking creates digital communication technologieshone tools for make bigger the social ring of people.It has by nowturned intoasignificant integral part of our dailylives;allow us to contact our friends an...