Resource & Quality Awareness Algorithm for Location Based Wireless Sensor Networks
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 10
Abstract
Location monitoring refers to the system where the wireless sensor network odes counts the number of sensors which are capable of detecting the objects present in their sensing areas. Third party always monitor the personal location which is becoming a privacy threat. To over come this we have proposed a method by using a series of routers to hide the client’s IP address from the server. We propose a privacy-preserving location monitoring system for wireless sensor networks. In our system, we design two in-network location anonymization algorithms, namely, Cloaked Area Determination Algorithm and quality enhanced histogram algorithm that will help the system to enable and provide high-quality location monitoring services for system users, while preserving personal location privacy. The Cloaked Area determination algorithm aims to minimize communication and computational cost, A quality enhanced histogram approach is used that estimates the distribution of the monitored persons based on the gathered aggregate location information. Then, the estimated distribution is used to provide location monitoring services through answering range queries.
Authors and Affiliations
G Ramesh, B. V. Reddy
A Review of Resource Allocation and Task scheduling for Computational Grids based on Meta-heuristic Function
The current scenario of grid computing faced a problem of job failure and increase of execution time of jobs. The failure of job degraded the performance of grid computing. The failure and increase execution time dep...
A Mixture Cloud Approach For Safe Official Deduplications.
Cloud computing technology is widely used so that the data can be outsourced on cloud can accessed easily. Different members can share that data through different virtual machines but present on single physical machin...
A Survey of Signcryption Its Type and Techniques
Signcryption is a combinational method of performing signatures of the encrypted data so that the data can be made secure and authenticated during the access of the data. Since there are various techniques are implem...
A System to Minimize The Storing And Managing Secret Keys Expense Using KAC
Emerging new computing technology cloud offering storage services. But now focus of data sharing with others in secure and efficient manner. For this the new expandable public-key cryptosystems which derives fixed-si...
Multi-interface Ad-hoc Wireless Network with AODV
Wireless technologies, such as IEEE 802.11, that are used for ad hoc networks provides mobile node with multiple interfaces and multiple channels to make efficient use of network capacity. This paper studies multiple...