Return to search

Location privacy in wireless sensor network using reciprocal protocol

<p> Location privacy has been one of the greatest threats in wireless systems. The utilization of k-anonymity in Wireless Sensor Networks (WSNs) protects the location privacy. This characteristic feature enables the server to receive aggregate k-anonymized locations of internally connected sensor nodes. These k-anonymized locations are comprised of, a minimum of k persons. Nevertheless, an intruder model is used to high point the readiness of privacy risks in overlapping aggregate locations because an adversary can deduce the overlapping areas contained in an area with less than k persons whose requirement violates k-anonymity privacy. Hence, a reciprocal protocol (REAL) is used for establishing location privacy in Wireless Sensor Networks (WSNs). </p><p> The sensor nodes organize a group of non-overlapping areas and k-anonymized locations into sensing areas. To overcome the privacy threats in REAL, a process state transition is designed with a time delay mechanism that provides accuracy of the messages received and a locking mechanism is designed to enhance reciprocity property. The generation of an error-free query reply and securing location privacy and decreasing computational and communication costs is achieved by the experimental analysis of the REAL protocol .</p>

Identiferoai:union.ndltd.org:PROQUEST/oai:pqdtoai.proquest.com:10118890
Date15 July 2016
CreatorsMohan, Rakshitha
PublisherCalifornia State University, Long Beach
Source SetsProQuest.com
LanguageEnglish
Detected LanguageEnglish
Typethesis

Page generated in 0.0026 seconds