Efficient and Effective Techniques for Source and Sink Location Privacy in WSN.
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 10
Abstract
While many protocols for sensor network security provide confidentiality for the content of messages contextual information usually remains exposes. Such information can be critical to the mission of the sensor network such as the location of a target object in a monitoring application and it is often Important to protect this information as well as message content. There has been several recent studies on providing location privacy in sensor networks. We first argues that a strong adversary model the global eavesdropper is often realistic in practice and can defeat existing techniques. We formalize the location privacy issues under this strong adversary model and show how much communication overhead is needed for achieving a given level of privacy. We also proposes two techniques that prevent the leakage of location information: periodic collection and source simulation. In periodic collection provides a high levels of location privacy while source simulation provides trade-offs between privacy communication cost and latency.
Authors and Affiliations
G. Aruna Rekha, CH. TG Ramya
Analysis of Principal Line-Based Alignment Refinement for Palmprint Recognition
Palmprint has proved to be one of themost unique andstable biometric characteristics.Image alignment is an important step in various biometric authentication systems. Most of the existing palmprint recognition algori...
Secured Bluetooth Authentication Using Artificial Neural Networks
Authentication in wireless networking is a mechanism to proof identities and avoid masking. The use of wireless devices and technology has made rapid growth in the market. In all such devices, user authentication is...
High Speed Implementation Of Fused Floating Point Add-Subtract Unit
Most universally useful processors (GPP) and application particular processors (ASP) utilize the coasting guide number-crunching due toward its wide and exact number framework. In any case, the coasting point operatio...
Annotation Wrapper for Annotating The Search Result Records Retrieved From Any Given Web Database
An annotation wrapper for the search site is automatically created and can be used to interpret new result pages from the similar web database. The data units arrived from the fundamental database are generally encod...
A New Approach On Incremntal Affinity Propagation Clustering Technique Based On Preference
Many of the clustering algorithms were intended for discovering patterns in static data. Nowadays, more and more data e.g., blogs, Web pages, video surveillance, etc., are come into view in dynamic manner, known as d...