TECHNIQUES TO PRESERVE DATA ACCESS PRIVACY OF USERS IN WSN :A SURVEY

Abstract

Sensor nodes in wireless sensor network are densely deployed to monitor the physical world. In distributed access control user can directly access data from sensor nodes. While accessing data from sensor nodes user details can be caught by sensor nodes. It adversely affects the user privacy. A user does not want the wireless sensor network to associate his details while he accessing data from sensor nodes. The mechanisms that considering the privacy of user is so limited. DP2AC, Priccess are the two mechanisms that protect the privacy of the user. These two approaches consider different techniques to preserve privacy of user access control.

Authors and Affiliations

Merin Jacob , Sijo Cherian

Keywords

Related Articles

Rules Reduction Using Decision Matrix

The rules are the prescribed standards on the basis of which decisions are made for specific purpose. The rule is a statement that establishes a principle or standard, and serves as a norm for guiding or mandating action...

Image Encryption and Decryption Using Selective Block Encryption Technique

In the recent world, the need of information security has became a necessity with the progress in data exchange and communication by electronic system. Because of the growth of multimedia application, security becomes an...

Comparative study about Digital Image Watermarking Using DCT and robustness testing of technique

In the today’s world of rapidly growing internet services (Commercial and educational), security always comes in picture even at low level. Same way in the field of Information Technology and Computer Science and Enginee...

Survey Report on Software Cost Estimation using Use Case Point Method

Software estimation is an important activity in software project management. Many software projects fail because of the inaccurate and untimely estimation of cost. Estimation in the early stages of the software life cycl...

Evaluation of Classifiers to Enhance Model Selection

The various tasks like classification, clustering and association rule deriving are performed in the data-mining for the pattern extraction. The performance evaluation measures make each task distinct and meaningful. The...

Download PDF file
  • EP ID EP156784
  • DOI -
  • Views 116
  • Downloads 0

How To Cite

Merin Jacob, Sijo Cherian (2013). TECHNIQUES TO PRESERVE DATA ACCESS PRIVACY OF USERS IN WSN :A SURVEY. International Journal of Computer Science & Engineering Technology, 4(7), 925-928. https://europub.co.uk/articles/-A-156784