A K-Anonymity Privacy-Preserving Location Monitoring System for Wireless Sensor Networks with Nymble Secure System

Abstract

 Anonymizing wireless sensor networks allow users to access services privately by using a series of routers to hide the client’s IP address from the server. As a result, administrators block all known exit nodes of anonymizing networks, denying anonymous access to misbehaving. To address this problem, servers can “blacklist” misbehaving users, thereby blocking users without compromising their anonymity. Monitoring personal locations with a potentially untrusted server poses privacy threats to the monitoredindividuals, a privacy-preserving location monitoring system for wireless sensor networks is adopted. Two innetwork location anonymization algorithms are considered, namely, resource and quality-aware algorithms, that aim to enable the system to provide high-quality location monitoring services for system users, while preserving personal location privacy. Both algorithms rely on the well established k-anonymity privacy concept, that is, a person is indistinguishable among k persons, to enable trusted sensor nodes to provide the aggregate location information of monitored persons. Each aggregate location is in a form of a monitored area A along with the number of monitored persons residing in A, where A contains at least k persons. The resource-aware algorithm aims to minimize communication and computational cost, while the quality-aware algorithm aims to maximize the accuracy of the aggregate locations by minimizing their monitored areas. To utilize the aggregate location information and to provide location monitoring services, a spatial histogram approach is used that estimates the distribution of the monitored persons based on the gathered aggregate location information. Then, the estimated distribution is used to provide location monitoring services through answering range queries.

Authors and Affiliations

Gayathri M 1 ,Bharathi M 2

Keywords

Related Articles

Precision-Aware and Quantization of Lifting Based DWT Hardware Architecture

This paper presents precision-aware approaches and associated hardware implementations for performing the DWT. By implementing BP architecture and also presents DS design methodologies. These methods enable use of an opt...

A Brief Survey on Encryption Schemes in Cloud Environments

For the last two years cloud computing is a important in the IT industry. In cloud computing data owners and service providers are not in the same trusted domain so the Service providers should not be a trusted one and t...

Secure Keyword Based Search in Cloud Computing: A Review

An effective search that give the better suggestion to the user so that the user can get better choices for the services is also a challenge for cloud computing. Several methods have been given to solve the problem of ef...

 A Knowledge discovery Approach in Shopping Complex Database (ASCD)

 Data mining and Knowledge Discovery (KD) has been widely accepted as a key technology for enterprises to improve their abilities in data analysis, decision support and the automatic extraction of knowledge from dat...

New Online Modules Model of Software Copy Protection in Serial-Based Method

One of the most significant concerns of software corporations is protect their products against unauthorized copying. Since now the researchers proposed some copy protection models that all of them have weakness to prote...

Download PDF file
  • EP ID EP114811
  • DOI -
  • Views 80
  • Downloads 0

How To Cite

Gayathri M 1, Bharathi M 2 (2012).  A K-Anonymity Privacy-Preserving Location Monitoring System for Wireless Sensor Networks with Nymble Secure System. International Journal of Computer & organization Trends(IJCOT), 2(2), 45-52. https://europub.co.uk/articles/-A-114811