{"title":"A framework of location privacy and minimum average communication under the global eaves dropper","authors":"S. Sivashankari, M. Raseen","doi":"10.1109/ICCTET.2013.6675994","DOIUrl":null,"url":null,"abstract":"In wireless sensor network, the location privacy issues in sensor networks under this strong adversary model and computes a lower bound on the communication overhead needed for achieving a given level of location privacy. It uses two techniques to provide location privacy to monitored objects (source-location privacy)periodic collection and source simulationand two techniques to provide location privacy to data sinks (sink-location privacy)sink simulation and backbone flooding. These techniques provide trade-offs between privacy, communication cost, and latency. Security is critical for many sensor networks. Due to the limited capabilities of sensor nodes, providing security and privacy to a sensor network is a challenging task. In this project, couple-based detection scheme to early detect the node compromise attack in the first stage is discussed. Early detection of node compromise attack can lead to a more effective defense against the node compromise attack. Through analysis and simulation, that the techniques are efficient and effective for source and sink-location privacy in sensor networks.","PeriodicalId":242568,"journal":{"name":"2013 International Conference on Current Trends in Engineering and Technology (ICCTET)","volume":"208 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 International Conference on Current Trends in Engineering and Technology (ICCTET)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCTET.2013.6675994","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
In wireless sensor network, the location privacy issues in sensor networks under this strong adversary model and computes a lower bound on the communication overhead needed for achieving a given level of location privacy. It uses two techniques to provide location privacy to monitored objects (source-location privacy)periodic collection and source simulationand two techniques to provide location privacy to data sinks (sink-location privacy)sink simulation and backbone flooding. These techniques provide trade-offs between privacy, communication cost, and latency. Security is critical for many sensor networks. Due to the limited capabilities of sensor nodes, providing security and privacy to a sensor network is a challenging task. In this project, couple-based detection scheme to early detect the node compromise attack in the first stage is discussed. Early detection of node compromise attack can lead to a more effective defense against the node compromise attack. Through analysis and simulation, that the techniques are efficient and effective for source and sink-location privacy in sensor networks.