Minimizing energy utilization and source anonymity in wireless Sensor Networks
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 11
Abstract
Monitoring networks consist of energy unnatural nodes that are expected to function over an extended period of time making energy competent monitoring a chief feature for unattended networks. In such situation nodes are designed to transmit information only when a appropriate event is detected i.e. event-triggered transmission. As a result given the location of an event-triggered node the location of a real event reported by the node can be approximated within the node’s sensing range. The places of the combat vehicle at different time intervals can be exposed to an opponent observing nodes transmissions. There are three limitations that can be connected with an event detected and reported by a sensor node as the description of the event, the time of the event and the location of the event. When sensor networks are organized in untrustworthy environments protecting the privacy of the three parameters that can be attributed to an event triggered transmission turn out to be an important security feature in the design of wireless sensor networks.
Authors and Affiliations
N. Eswara Reddy, D. Vijay
Embedded Based Novel Track Methodology of Physiological Parameters Using Wi-Fi
In this work, a portable real-time wireless health monitoring system is developed. The system is used for remote monitoring of patients, temperature, heart rate, oxygen saturation in blood i.e. pulse oximetry and PH...
Advanced Home Security System.
Domestic security recently has started making a significant mark in the life of people throughout the globe. And hence more and more advanced systems are developed each day to enhance domestic security. But most of t...
Locating Equivalent Servants over P2P Networks
While peer-to-peer networks are mainly used to locate unique resources across the Internet, new interesting deployment scenarios are emerging. Particularly, some applications (e.g., VoIP) are proposing the creation...
Providing Data Confidentiality of Outsourced Data In Cloud
Cloud means collection of storage servers maintained by the cloud service provider which minimizes investment cost for individual users and organizations. It provides on-demand self service, resource pooling, rapid e...
Providing Privacy For Sensitive Data In Relational Database With Imprecision Bounds
The perception of privacy-preservation for receptive data can necessitate the enforcement of privacy policies or the fortification against uniqueness revelation by rewarding some privacy requirements. In this paper w...