<p> Location privacy has been one of the greatest threats in wireless systems. The utilization of k-anonymity in Wireless Sensor Networks (WSNs) protects the location privacy. This characteristic feature enables the server to receive aggregate k-anonymized locations of internally connected sensor nodes. These k-anonymized locations are comprised of, a minimum of k persons. Nevertheless, an intruder model is used to high point the readiness of privacy risks in overlapping aggregate locations because an adversary can deduce the overlapping areas contained in an area with less than k persons whose requirement violates k-anonymity privacy. Hence, a reciprocal protocol (REAL) is used for establishing location privacy in Wireless Sensor Networks (WSNs). </p><p> The sensor nodes organize a group of non-overlapping areas and k-anonymized locations into sensing areas. To overcome the privacy threats in REAL, a process state transition is designed with a time delay mechanism that provides accuracy of the messages received and a locking mechanism is designed to enhance reciprocity property. The generation of an error-free query reply and securing location privacy and decreasing computational and communication costs is achieved by the experimental analysis of the REAL protocol .</p>
Identifer | oai:union.ndltd.org:PROQUEST/oai:pqdtoai.proquest.com:10118890 |
Date | 15 July 2016 |
Creators | Mohan, Rakshitha |
Publisher | California State University, Long Beach |
Source Sets | ProQuest.com |
Language | English |
Detected Language | English |
Type | thesis |
Page generated in 0.0015 seconds