Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper
#2
While many protocols for sensor network security provide confidentiality for message content, contextual information generally remains exposed. Such contextual information can be exploited by an adversary to derive sensitive information such as the location of supervised objects and data sinks in the field. Attacks on these components can significantly undermine any network application. Existing techniques defend the leaking of location information from a limited adversary who can only observe network traffic in a small region. However, a stronger adversary, the spy of the world, is realistic and can defeat these existing techniques. This document first formalises the privacy issues of location on sensor networks under this strong adversary model and calculates a lower limit on the communication overhead required to reach a given level of site privacy. The paper proposes two techniques for providing location privacy to monitored objects (source privacy), and two techniques for providing location privacy to the data sinks (privacy of the sink location). These techniques provide interchanges between privacy, communication cost, and latency. Through analysis and simulation, demonstrate that the proposed techniques are efficient and effective for the source and privacy of sinks in sensor networks.

 A network of wireless sensors (WSN) usually comprises a large number of inexpensive sensors, self-organised as an ad hoc network to interact and study the physical world. Sensor networks can be used in applications where it is difficult or impossible to configure wired networks. Examples include target tracking, habitat monitoring, and military surveillance. These applications are subject to a variety of security problems in hostile environments. Most efforts to date in sensor network security have focused on providing classic security services such as confidentiality, authentication, integrity and availability. While these are critical requirements in many applications, they are not enough. The communication patterns of the sensors can, by themselves, expose a large amount of contextual information. For example, the delivery of sensor data to the base station may reveal the location of some critical events in the field, revealing valuable information. In hostile environments, it is particularly important to ensure the privacy of the location; Lack of location-based information protection can completely undermine network applications.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: protecting against sql injection, implementation of a cloud based scheme for protecting source location privacy against hotspot locating attack, protecting information and sensitive data, what is protecting location privacy in sensor network against a global eavesdropper ppt based on this topic, cloud based scheme for protecting source location privacy against hotspot locating attacks cs project report, global eavesdropper, protecting location privacy against a global evaesdropper,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
RE: Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper - by jaseela123d - 15-02-2017, 11:00 AM

Possibly Related Threads...
Thread Author Replies Views Last Post
  Opportunistic Routing in Multi-radio Multi-channel Multi-hop Wireless Networks seminar class 4 3,582 17-10-2017, 02:48 PM
Last Post: jaseela123d
  Privacy- and Integrity-Preserving Range Queries in Sensor Networks 1 867 15-02-2017, 04:10 PM
Last Post: jaseela123d
  Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper 1 804 15-02-2017, 11:01 AM
Last Post: jaseela123d
  SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-He 1 909 14-02-2017, 03:49 PM
Last Post: jaseela123d
  A New Cell-Counting-Based Attack against Tor 1 726 14-02-2017, 11:26 AM
Last Post: ijasti
  projects on computer networks? shakir_ali 2 1,599 25-01-2016, 02:26 PM
Last Post: seminar report asees
  DYNAMIC SEARCH ALGORITHM IN UNSTRUCTURED PEER-TO-PEER NETWORKS--PARALLEL AND DISTRIBU electronics seminars 9 7,380 14-07-2015, 02:25 PM
Last Post: seminar report asees
  Revisiting Dynamic Query Protocols in Unstructured Peer-to-Peer Networks Projects9 2 1,330 14-07-2015, 02:11 PM
Last Post: seminar report asees
  Privacy Preservation in Data Mining sajidpk123 3 2,975 13-11-2014, 10:48 PM
Last Post: jaseela123d
  Fast Data Collection in Tree-Based Wireless Sensor Networks Projects9 9 4,006 12-03-2014, 06:30 PM
Last Post: computer topic

Forum Jump: