Efficient and Effective Techniques for Source and Sink Location Privacy in WSN.
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 10
Abstract
While many protocols for sensor network security provide confidentiality for the content of messages contextual information usually remains exposes. Such information can be critical to the mission of the sensor network such as the location of a target object in a monitoring application and it is often Important to protect this information as well as message content. There has been several recent studies on providing location privacy in sensor networks. We first argues that a strong adversary model the global eavesdropper is often realistic in practice and can defeat existing techniques. We formalize the location privacy issues under this strong adversary model and show how much communication overhead is needed for achieving a given level of privacy. We also proposes two techniques that prevent the leakage of location information: periodic collection and source simulation. In periodic collection provides a high levels of location privacy while source simulation provides trade-offs between privacy communication cost and latency.
Authors and Affiliations
G. Aruna Rekha, CH. TG Ramya
Analyzing Mel Frequency Cepstral Coefficient for Recognition of Isolated English Word using DTW Matching
In this paper we proposed Mel-frequency cepstrum coefficients feature extraction and Dynamic Time Warping matching algorithm for speech recognition. Feature vector (Mel-frequency cepstrum coefficients) obtained from...
Cooperative Caching in Wireless P2P Networks: Design, Implementation and Evaluation
In this paper proposing cooperative cache can improve the system performance in wireless P2P networks such as ad hoc networks and mesh networks. However, all these studies are at a very high level, leaving many design...
e-Governance initiatives in the State of Punjab
e-Governance refers to the delivery of services provided by the government through the means of ICTs (Information and Communication Technologies). The NeGP (National e-Governance Plan) is initiated by the Government...
Optimized Word Sense Disambiguation in Hindi using Genetic Algorithm
Word Sense Disambiguation (WSD) is a problem of computationally determining which “sense” of a word is activated by the use of the word in particular context. Genetic Algorithm is used to figure out the appropriate m...
Quality of Services in 4G networks
Due to the difference between the access technologies and the disparity of application's QoS requirements, there is a significant need to make available a unified approach that integrates all useful access networks....