Efficient and Effective Techniques for Source and Sink Location Privacy in WSN.
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 10
Abstract
While many protocols for sensor network security provide confidentiality for the content of messages contextual information usually remains exposes. Such information can be critical to the mission of the sensor network such as the location of a target object in a monitoring application and it is often Important to protect this information as well as message content. There has been several recent studies on providing location privacy in sensor networks. We first argues that a strong adversary model the global eavesdropper is often realistic in practice and can defeat existing techniques. We formalize the location privacy issues under this strong adversary model and show how much communication overhead is needed for achieving a given level of privacy. We also proposes two techniques that prevent the leakage of location information: periodic collection and source simulation. In periodic collection provides a high levels of location privacy while source simulation provides trade-offs between privacy communication cost and latency.
Authors and Affiliations
G. Aruna Rekha, CH. TG Ramya
Effective Load Balancing Technique And Memory Management In Cloud
Cloud computing applications are developed using Map Reduce programming. Cloud computing distributed file system nodes perform functionality like computing as well as storage in this a file is partitioned into a numb...
ARM9 Based Real Time Embedded Network Video Capture And SMS Alerting system
In This paper, Network video capture system using friendly ARM9 board support package (BSP) S3C2440 is presented. This application system captures video, shares among networked systems and also alerts the controlling...
Multiple View Point on Cluster Analysis
The clustering methods have to assume some cluster relationship among the data objects that they are applies on. Similarity between a pair of objects can be defines either explicitly or implicitly. In this paper we i...
A Novel Approach for Text Dependent Speaker Recognition
In recent times, person authentication in security systems using biometric technologies has grown rapidly. The voice is a signal of infinite information. Digital signal processes such as Feature Extraction and Feature...
Windows, Linux and Mac Operating system Booting Process: a Comparative Study
This paper presents a comparative study of Booting Paradigm of Windows, Linux and Mac, the three popular operating systems. Booting process is the essential and first step perform by the OS after this process executio...