全球屋檐下的位置隐私和最小平均通信框架

S. Sivashankari, M. Raseen
{"title":"全球屋檐下的位置隐私和最小平均通信框架","authors":"S. Sivashankari, M. Raseen","doi":"10.1109/ICCTET.2013.6675994","DOIUrl":null,"url":null,"abstract":"In wireless sensor network, the location privacy issues in sensor networks under this strong adversary model and computes a lower bound on the communication overhead needed for achieving a given level of location privacy. It uses two techniques to provide location privacy to monitored objects (source-location privacy)periodic collection and source simulationand two techniques to provide location privacy to data sinks (sink-location privacy)sink simulation and backbone flooding. These techniques provide trade-offs between privacy, communication cost, and latency. Security is critical for many sensor networks. Due to the limited capabilities of sensor nodes, providing security and privacy to a sensor network is a challenging task. In this project, couple-based detection scheme to early detect the node compromise attack in the first stage is discussed. Early detection of node compromise attack can lead to a more effective defense against the node compromise attack. Through analysis and simulation, that the techniques are efficient and effective for source and sink-location privacy in sensor networks.","PeriodicalId":242568,"journal":{"name":"2013 International Conference on Current Trends in Engineering and Technology (ICCTET)","volume":"208 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"A framework of location privacy and minimum average communication under the global eaves dropper\",\"authors\":\"S. Sivashankari, M. Raseen\",\"doi\":\"10.1109/ICCTET.2013.6675994\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In wireless sensor network, the location privacy issues in sensor networks under this strong adversary model and computes a lower bound on the communication overhead needed for achieving a given level of location privacy. It uses two techniques to provide location privacy to monitored objects (source-location privacy)periodic collection and source simulationand two techniques to provide location privacy to data sinks (sink-location privacy)sink simulation and backbone flooding. These techniques provide trade-offs between privacy, communication cost, and latency. Security is critical for many sensor networks. Due to the limited capabilities of sensor nodes, providing security and privacy to a sensor network is a challenging task. In this project, couple-based detection scheme to early detect the node compromise attack in the first stage is discussed. Early detection of node compromise attack can lead to a more effective defense against the node compromise attack. Through analysis and simulation, that the techniques are efficient and effective for source and sink-location privacy in sensor networks.\",\"PeriodicalId\":242568,\"journal\":{\"name\":\"2013 International Conference on Current Trends in Engineering and Technology (ICCTET)\",\"volume\":\"208 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-07-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 International Conference on Current Trends in Engineering and Technology (ICCTET)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCTET.2013.6675994\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 International Conference on Current Trends in Engineering and Technology (ICCTET)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCTET.2013.6675994","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

在无线传感器网络中,在该强对手模型下研究传感器网络中的位置隐私问题,并计算了实现给定位置隐私级别所需的通信开销的下界。它使用两种技术为被监视对象提供位置隐私(源-位置隐私)周期性收集和源模拟,并使用两种技术为数据汇提供位置隐私(汇-位置隐私)汇模拟和骨干泛洪。这些技术在隐私、通信成本和延迟之间提供了折衷。对于许多传感器网络来说,安全是至关重要的。由于传感器节点的能力有限,为传感器网络提供安全和隐私是一项具有挑战性的任务。本课题讨论了一种基于耦合的检测方案,在第一阶段对节点泄露攻击进行早期检测。及早发现节点妥协攻击,可以更有效地防御节点妥协攻击。通过分析和仿真,验证了该技术对传感器网络源和汇位置隐私保护的有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A framework of location privacy and minimum average communication under the global eaves dropper
In wireless sensor network, the location privacy issues in sensor networks under this strong adversary model and computes a lower bound on the communication overhead needed for achieving a given level of location privacy. It uses two techniques to provide location privacy to monitored objects (source-location privacy)periodic collection and source simulationand two techniques to provide location privacy to data sinks (sink-location privacy)sink simulation and backbone flooding. These techniques provide trade-offs between privacy, communication cost, and latency. Security is critical for many sensor networks. Due to the limited capabilities of sensor nodes, providing security and privacy to a sensor network is a challenging task. In this project, couple-based detection scheme to early detect the node compromise attack in the first stage is discussed. Early detection of node compromise attack can lead to a more effective defense against the node compromise attack. Through analysis and simulation, that the techniques are efficient and effective for source and sink-location privacy in sensor networks.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信