Efficient and Effective Techniques for Source and Sink Location Privacy in WSN.

Abstract

While many protocols for sensor network security provide confidentiality for the content of messages contextual information usually remains exposes. Such information can be critical to the mission of the sensor network such as the location of a target object in a monitoring application and it is often Important to protect this information as well as message content. There has been several recent studies on providing location privacy in sensor networks. We first argues that a strong adversary model the global eavesdropper is often realistic in practice and can defeat existing techniques. We formalize the location privacy issues under this strong adversary model and show how much communication overhead is needed for achieving a given level of privacy. We also proposes two techniques that prevent the leakage of location information: periodic collection and source simulation. In periodic collection provides a high levels of location privacy while source simulation provides trade-offs between privacy communication cost and latency.

Authors and Affiliations

G. Aruna Rekha, CH. TG Ramya

Keywords

Related Articles

Energy Efficiency For MIMO-OFDM Using Iterative Water Filling Algorithm

Energy proficiency will be getting to be progressively critical for remote correspondence frameworks so as with minimize carbon foot shaped impression of remote networks and on expansion those battery term from claim...

A Public Auditing Framework for Cloud Storage Security

Commoditization of computing resources has become a reality with cloud computing which is a new computing model. Users are no longer required to invest on procuring computing resources. Instead they use resources pro...

Enhanced Sparse Coding Technique For Top Image List

Image reranking is successful for enhancing the execution of a content based picture seek. Be that as it may, existing reranking algorithms are constrained for two principle reasons: 1) the literary meta-information...

Low-Complexity Turbo Decoder Architecture for Energy-Efficient Wireless Sensor Networks

Turbo codes have recently been considered for energy-constrained wireless communication applications, mainly because of low transmission energy consumption. In this project, we decompose the low complexity turbo deco...

Design of Dadda Algorithm based Floating Point Multiplier

In this paper area efficient floating point multiplier is developed using Dadda Algorithm . For improving the speed of mantissa multiplication Dadda multiplier is used by replacing Carry Save Multiplier. The use of pr...

Download PDF file
  • EP ID EP27717
  • DOI -
  • Views 278
  • Downloads 4

How To Cite

G. Aruna Rekha, CH. TG Ramya (2013). Efficient and Effective Techniques for Source and Sink Location Privacy in WSN.. International Journal of Research in Computer and Communication Technology, 2(10), -. https://europub.co.uk/articles/-A-27717