Enhancing Sink-Location Privacy in Wireless Sensor Networks through k-Anonymity
نویسندگان
چکیده
منابع مشابه
Sink Location Service Based on Fano Plane in Wireless Sensor Networks
Sink location is considered as a basic service in geographic routing in wireless sensor networks. Obtaining the location of sink node by source node using an efficient method with low complexity has always been a challenging issue in research. In this paper, a sink location algorithm based on Fano plane is proposed. The research challenge is how to ensure the intersection of two SLQ (Location Q...
متن کاملK-Anonymity based Privacy-Preserving location Monitoring Services for Wireless Sensor Networks
Wireless sensor technologies gave rise to many new applications widely used by general citizens as well as military operations. Numerous cases of these applications are based on the information of personal locations. Observations of these locations with untrusted server cause privacy threats to the individuals being monitored. To deal with such a privacy break, the concept of aggregate location...
متن کاملSink Location Privacy Protection in Wireless Sensor Network
Wireless Sensor Network (WSN) is a broad network consisting of a number of sensor nodes in it. WSN is used mainly for monitoring and data aggregation purpose. A best plan of opponent may attack the sink node which is the aggregation point for the whole network. So, first there comes a need to secure the sink node from adversary. There are previous work are done by providing location privacy to ...
متن کاملLocation Privacy Issues in Wireless Sensor Networks
We discuss location privacy issues in wireless sensor networks. We consider sensor nodes with more responsible roles and the need to protect locations of such nodes. Available countermeasures against various types of traffic analysis attacks are examined and their problems are identified. We do not propose new traffic analysis resistance technique. Instead, we draw attention to blanks in curren...
متن کاملLocation Privacy in Wireless Sensor Networks
The insecure atmospheres makes easy for an adversary to eavesdrop the network in a wireless sensor network. An eclectic collection of protocols are available for providing content privacy but the contextual information remains unprotected. So an adversary can use this contextual information to carry out attack on source node or the sink node in sensor network. The current approaches for locatio...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Distributed Sensor Networks
سال: 2012
ISSN: 1550-1477,1550-1477
DOI: 10.1155/2012/648058