Location Monitoring algorithms for Wireless Sensor Networks
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2012, Vol 1, Issue 6
Abstract
In this work we propose a privacy-preserving location monitoring system for wireless sensor networks. Here we design two in network location anonymization algorithms, namely, resource- and quality-aware algorithms, that aim to enable the system to provide high quality location monitoring services for system users, while preserving personal location privacy. Both algorithms rely on the well established k-anonymity privacy concept The resource-aware algorithm aims to minimize communication and computational cost, while the quality-aware algorithm aims to maximize the accuracy of the aggregate locations by minimizing their monitored areas. To utilize the aggregate location information to provide location monitoring services, we use a spatial histogram approach that estimates the distribution of the monitored persons based on the gathered aggregate location information. Then the estimated distribution is used to provide location monitoring services through answering range queries. We evaluate our system through simulated experiments. The results show that our system provides high quality location monitoring services as compare to others.
Authors and Affiliations
Vissamsetti Poorna Surya Vinay Kumar, Kakara Ravi Kumar
Detect Sinking Ship in Wireless Sensor Networks By Using Dcd
A cut is nothing but a part of wireless sensor networks which is splited into different connection components because of some node failures in the network. This paper proposes a new algorithm to detect these cuts by...
Detection and management of SPIT calls in VoiceOver-IP Services
Voice over IP (VoIP) technology has become a key role in the development for providing telephony services at a lower cost with a higher flexibility. VoIP services are faced with several security issues and threats such...
Data Stream Mining using Reinforcement Learning: A Survey
Large numbers of real world applications are producing continuous and large data streams for further analysis. Data stream mining is allowing users to extracts knowledge in the form of patterns or model from the cont...
A Comprehensive Review of Cluster-Based Energy Efficient Routing Protocols in Wireless Sensor Networks
Wireless sensor networks(WSNs) consists of large number of multifunctional sensor nodes. Routing protocols developed for other adhoc networks cannot be applied directly in WSN because of the energy constraint of the s...
Survey on Suspicious URL Detection Schemes in Twitter Stream
Twitter is a micro-blogging and online social networking service that enables its users to send and read "tweets”. Tweets are text messages limited to 140 characters. Twitter is prone to a lot of malicious tweets whi...