SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
International Refereed Journal of Engineering and Science (IRJES)
ISSN (Online) 2319-183X, (Print) 2319-1821
Volume 2, Issue 3(March 2013), PP.01-06
www.irjes.com
www.irjes.com 1 | Page
Improving High Quality Privacy Preserving Location Monitoring
System For Wireless Sensor Networks
1 . Ms. Badi Alekhya.,
1
Assistant Professor, T.J.S Engineering College, Department of Computer Science and Engineering
Abstract: - . Message authentication is an important objective of information security in modern wireless net-
works. This objective is met by providing the receiver of the message an assurance of the sender’s identity. Digi-
tal tools have been developed using cryptography. A major limitations of all cryptographic methods for message
authentication lies in their uses of algorithms with fixed symmetric or public keys.This project presents a syn-
chronized random key generation for each node which depends on the position. So there is no need any exact
location data to transfer. Key generation protocol is used here. Key generation protocol depends on the global
Positioning method. Pseudo random number creation depends upon the position and the initial value of linear
feedback shift register. So each and every second create a new key. So the level of privacy information security
is too high and power consumption is very low.
1. INTRODUCTION
THE advance in wireless sensor technologies has resulted in many new applications for military and or
civilian purposes. Many cases of these applications rely on the information of personal locations, for example,
surveillance and location systems. These location-dependent systems are realized by using either identity sen-
sors or counting sensors. For identity sensors, for example, Bat and Cricket, each individual has to carry a signal
sender/receiver unit with a globally unique identifier. With identity sensors, the system can pinpoint the exact
location of each monitored person. On the other hand, counting sensors, for example, photoelectric sensors, [4],
and thermal sensors [5], are deployed to report the number of persons located in their sensing areas to a server.
Fig. 1 gives an example of a privacy breach in a location of the monitoring system with counting sensors. There
are the11 counting sensor nodes installed in nine rooms R1 to R9, and two hallways C1 and C2 (Fig. 1a). The
nonzero number of persons detected by each sensor node is depicted as a number in parentheses. Figs. 1b and 1c
give the numbers reported by the same set of sensor nodes at two consecutive time insistanstancesti+1 and ti+2,
respectively. If R3 is Alice’s office room, an adversary knows that Alice is in room R3 at time ti. Then, the ad-
versary knows that Alice left R3 at time ti+1 and went to C2by knowing the number of persons detected by the
sensor nodes in R3 and C2. Likewise, the adversary can infer that Alice left C2 at time ti+2 and went to R7.
Such knowledge leakage may lead to several privacy threats. For example, knowing that a person has visited
certain clinical rooms may lead to knowing her health records. Also, knowing that a person has visited a certain
bar or restaurant in a mall building may reveal confidential personal information.
Fig1. A location monitoring system using counting sensors. (a) At time ti. (b) At time ti+1. (c) At time ti+2.
2. RELATED WORK
Straightforward approaches for preserving users’ location privacy include enforcing privacy policies to
restrict the use of collected location information and anonymizing the stored data before any disclosure. How-
Improving High Quality Privacy Preserving Location Monitoring System For Wireless Sensor
www.irjes.com 2 | Page
ever, these approaches fail to prevent internal data thefts or inadvertent disclosure. Recently, location anonymi-
zation techniques have been widely used to anonymize personal location infomation before any server to gathers
the location information, in order to preserve personal location privacy in location-based services. These tech-
niques are based on one of the three concepts.
1)False locations.
Instead of reporting the monitored object’s exact location, the object reports n different locations,
where only one of them is the object’s actual location while the rest are false locations
2) Spatial cloaking.
The spatial cloaking technique blurs a user’s location into a cloaked spatial area that satisfy the user’s
specified privacy requirements
3) Space transformation
This technique transforms the location information of queries and data into another space, where the
spatial relationship among the query and data are encoded .Among these three privacy concepts, only the spatial
cloaking technique can be applied to our problem. The main reasons for this are that 1) the false location tech-
niques cannot provide high-quality monitoring services due to a large amount of false location information, 2)
the space transformation techniques cannot provide privacy preserving monitoring services as it reveals the
monitored object’s exact location information to the query issuer.
The spatial cloaking techniques can provide aggregate location information to the server and balance a
trade off between privacy protection and the quality of services by tuning the specified privacy requirements, for
example, k anonymity and minimum area privacy requirements. Thus, we adopt the spatial cloaking technique
to preserve the monitored object’s location privacy in our location monitoring system.
3.ALGORITHMS
LOCATION ANONYMIZATION ALGORITHMS
In this section, we present our in-network resource and quality-aware location anonymization algo-
rithms, that is.periodically executed by the sensor nodes to report their k-anonymous aggregate locations to the
server for every reporting period.
3.1 The Resource-Aware Algorithm
Algorithm 1.
Resource-aware location anonymization
1: function RESOURCEAWARE (Integer k, Sensor m,
List R)
2: PeerList <-{0}
// Step 1: The broadcast step
3: Send a message with m’s identity m.ID, sensing area
m.Area, and object count m.Count to m’s neighbour peers
4: if Receive a message from a peer p, i.e., (p.ID, p.Area, p.count) then
5: Add the message to PeerList
6: if m has found an adequate number of objects then
7: Send a notification message to m’s neighbours
8: end if
9: if Some m’s neighbour has not found an adequate number of objects then
10: Forward the message to m’s neighbours
11: end if
12: end if
// Step 2: The cloaked area step
13: S<-{m}
14: Compute a score for each peer in PeerList
15: Repeatedly select the peer with the highest score from
PeerList to S until the total number of objects in S is at least k
16: Area a minimum bounding rectangle of the senor
nodes in S
17: N the total number of objects in S
// Step 3: The validation step
18: if No containment relationship with Area and R 2 R then
Improving High Quality Privacy Preserving Location Monitoring System For Wireless Sensor
www.irjes.com 3 | Page
19: Send (Area,N) to the peers within Area and the server
20: else if m’s sensing area is contained by some R 2 R then
21: Randomly select a R0 2 R such that R0:Area contains m’s sensing area
22: Send R0 to the peers within R0:Area and the server
23: else
24: Send Area with a cloaked N to the peers within Area and the server
25: end if
3.2 Quality-aware location anonymization
algorithm
1: function QUALITYAWARE (Integer k, Sensor m,
Set init_solution, List R)
2: current_min_cloaked_area init_solution
// Step 1: The search space step
3: Determine a search space S based on init_solution
4: Collect the information of the peers located in S
// Step 2: The minimal cloaked area step
5: Add each peer located in S to C½1_ as an item
6: Add m to each item set in C½1_ as the first item
7: for i ¼ 1; i _ 4; i ++ do
8: for each item set X ¼ fa1; . . . ; aiþ1g in C½i_ do
9: if Area(MBR(X))
< Area(current_min_cloaked_area) then
10: if N(MBR(X)) >=k then
11: current_min_cloaked_area<-{x}
12: Remove X from C½i_
13: end if
14: else
15: Remove X from C½i_
16: end if
17: end for
18: if i < 4 then
19: for each item set pair X ¼ fx1; . . . ; xiþ1g,
Y ¼ fy1; . . . ; yiþ1g in C½i_ do
20: if x1 ¼ y1; . . . ; xi ¼ yi and xiþ1 6¼ yiþ1 then
21: Add an item set fx1; . . . ; xiþ1; yiþ1g
to C½i þ 1_
22: end if
23: end for
24: end if
25: end for
26: Area a minimum bounding rectangle of
current_min_cloaked_area
27: N the total number of objects in
current_min_cloaked_area
// Step 3: The validation step
28: Lines 18 to 25 in Algorithm 1
Improving High Quality Privacy Preserving Location Monitoring System For Wireless Sensor
www.irjes.com 4 | Page
4. System Architecture
fig2.System Architecture
Sensor nodes:
Each sensor node is responsible for determining the number of objects in its sensing area,blurring its
sensing area into a cloaked area A, which includes at least k objects, and reporting A with the number of objects
located in A as aggregate location information to the server. We do not have any assumption about then network
topology, as our system only requires a communication path from each sensor node to the server through a dis-
tributed tree [10]. Each sensor node is also aware of its location and sensing area.
Server:
The server is responsible for collecting the aggregate locations reported from the sensor nodes, using a
spatial histogram to estimate the distribution of the monitored objects, and answering range queries based on the
estimated object distribution. Furthermore, the administrator can change the anonymized level k of the system at
anytime by disseminating a message with a new value of k to all the sensor nodes.
System users:
Authenticated administrators and users can issue range queries to our system through either the server
or the sensor nodes, as depicted in Fig. 2. The server uses the spatial histogram to answer their queries.
Privacy model:
In our system, the sensor nodes constitute a trusted zone, where they behave as defined in our algo-
rithm and communicate with each other through a secure network channel to avoid internal network attacks, for
example, eavesdropping, traffic analysis, and malicious nodes. Since establishing such a secure network channel
has been studied in the literature the discussion of how to get this network channel is beyond the scope of this
paper. However, the solutions that have been used in previous works can be applied to our system. Our system
also provides anonymous communication between the sensor nodes and the server by employing existing
anonymous communication techniques. Thus given an aggregate location R, the server only knows that the
sender of R is one of the sensor nodes within R.Furthermore,only authenticated administrators can change the k-
anonymity level and the spatial histogram size. In emergency cases, the administrators can set the k-anonymity
level to a small value to get more accurate aggregate locations from the sensor nodes, or even set it to zero to
disable our algorithm to get the original readings from the sensor nodes, in order to get the best services from
the system. Since the server and the system user are outside the trusted zone, they are untrusted.We now discuss
the privacy threat in existing location monitoring systems. In an identity-sensor location monitoring system,
since each sensor node reports the exact location information of each monitored object to the server, the adver-
sary can pinpoint each object’s exact location. On the other hand, in a counting-sensor location monitoring sys-
tem, each sensor node reports the number of objects in its sensing area to the server. The adversary can map the
monitored areas of the sensor nodes to the system layout. If the object count of a monitored area is very small or
equal to one, the adversary can infer the identity of the monitored objects based on the mapped monitored area,
Performance Metrics
We evaluate our system in terms of five performance metrics.
1. Attack model error. This metric measures the resilience of our system to the attacker model by the relative
error between the estimated number of objects b N in a sensor node’s sensing area and the actual one N. The
error is measured as |N-N|/N. When N=0, we consider N^ as the error.
2. Communication cost. We measure the communication cost of our location anonymization algorithms in
terms of the average number of bytes sent by each sensor node per reporting period. This metric also indicates
the network traffic and the power consumption of the sensor nodes.
3. Cloaked area size. This metric measures the quality of the aggregate locations reported by the sensor
nodes.The smaller the cloaked area,the better the accuracy of the aggregate location.
Improving High Quality Privacy Preserving Location Monitoring System For Wireless Sensor
www.irjes.com 5 | Page
4. Computational cost. We measure the computational cost of our location anonymization al gorithms in terms
of the average number of the MBR computations that are needed to determine a resource or quality-aware
cloaked area. We compare our algorithms with a basic approach that computes the MBR for each combination
of the peers in the required search space to find the minimal cloaked area. The basic approach does not employ
any optimization techniques proposed for our quality-aware algorithm.
5. Query error. This metric measures the utility of our system, in terms of the relative error between the query
of the answer M^, which is the estimated number of objects within the query region based on a spatial histo-
gram, and the actual answer M,respectively.The error is measured as |M^-M|/M When M = 0, we consider M^
as the error.
Fig Attacker model error. (a) Anonymity levels. (b) Number of objects
Effect of the Number of Objects
Fig. depicts the performance of our system with respect to the increasing the number of objects from 2,000 to
10,000. Fig. shows that when the number of objects increases, the communication cost of the resource-aware
algorithm is only slightly affected, but the quality-aware algorithm significantly reduces the communication
cost. The broadcast step of the resource-aware algorithm effectively allows each sensor node to find an adequate
number of objects to blur its sensing area. When there are more objects, the sensor node finds smaller cloaked
areas that satisfy the k-anonymity privacy requirement, as given in Fig. b. Thus, the required search space of a
minimal cloaked area computed by the quality aware algorithm becomes smaller; hence, the communication
cost of gathering the information of the peers in such a smaller required search space reduces. Likewise, since
there are fewer peers in the smaller required search space as the number of objects increases, finding the mini-
mal cloaked area incurs less MBR computation (Fig. c). Since our algorithms generate smaller cloaked areas
when there are more users, the spatial histogram can gather more accurate aggregate locations to estimate the
object distribution; therefore, the query answer error reduces (Fig. d). The result also shows that the quality-
aware algorithm always provides better quality services than the resource-aware algorithm.
Fi Anonymity levels. (a) Communications cost. (b) Cloaked area size. (c) Computational cost. (d) Estima-
tion error
CONCLUSION
In this paper, we propose a privacy-preserving location monitoring system for wireless sensor net-
works. We design two in-network location anonymization algorithms, namely, resource and quality-aware algo-
rithms, which preserve personal location privacy, while enabling the system to provide allocation monitoring
services. Both algorithms rely on this of well-established k-anonymity privacy concept that requires a person is
indistinguishable among k persons. In our system, sensor nodes execute our location anonymization algorithms
to provide k-anonymous aggregate locations, in which each aggregate location is a cloaked area A with the
number of monitored objects, N, located in A, where N>= k, for the system. The resource-aware algorithm aims
to minimize communication and computational cost, while the quality-aware algorithm aims to minimize the
size of cloaked areas in order to generate more accurate aggregate locations. To provide location monitoring
services based on the aggregate location information, we propose a spatial histogram approach that analyzes the
aggregate locations reported from the sensor nodes to estimate the distribution of the monitored objects. The
estimated distribution is used to provide location monitoring services through answering range queries. We
evaluate our system through simulated experiments. The results show that our system provides high-quality lo-
Improving High Quality Privacy Preserving Location Monitoring System For Wireless Sensor
www.irjes.com 6 | Page
cation monitoring services (the accuracy of the resource-aware algorithm is about 75 percent and the accuracy
of the quality-aware algorithm is about 90 percent), while preserving the monitored object’s location privacy.
REFERENCES
[1] C. Bettini, S. Mascots, X.S. Wang, and S.Jajodia, “Anonymity in Location-Based Services: Towards a General Framework,”
Proc.Int’l Conf. Mobile Data Management (MDM), 2007.
[2] B. Gedik and L. Liu, “Protecting Location Privacy with Personalized K-Anonymity: Architecture and Algorithms,” IEEE Trans.
Mobile Computing, vol. 7, no. 1, pp. 1-18, Jan. 2008.
[3] G. Ghinita, P. Kalnis, and S. Skiadopoulos, “PRIV_E: Anonymous Location-Based Queries in Distributed Mobile Systems,”
Proc. Int’l Conf. World Wide Web (WWW), 2007.
[4] H. Kido, Y. Yanagisawa, and T. Satoh, “An Anonymous Communication Technique Using Dummies for Location-Based Ser-
vices,” Proc. Int’l Conf. Pervasive Services (ICPS), 2005.
[5] M. Gruteser, G. Schelle, A. Jain, R. Han, and D. Grunwald, “Privacy-Aware Location Sensor Networks,” Proc. Ninth Conf. Hot
Topics in Operating Systems (HotOS), 2003.
6] A. Harter, A. Hopper, P. Steggles, A. Ward, and P. Webster, “The Anatomy of a Context-Aware Application,” Proc. ACM Mob
Co
[7] J. Kong and X. Hong, “ANODR: Anonymous on Demand Routing with Untraceable Routes for Mobile Ad-Hoc Networks,”
Proc.ACMMobiHoc,2003.

Contenu connexe

Tendances

Behavioral Malware Detection in Dtn Using Intrusion Detection System
	Behavioral Malware Detection in Dtn Using Intrusion Detection System	Behavioral Malware Detection in Dtn Using Intrusion Detection System
Behavioral Malware Detection in Dtn Using Intrusion Detection Systemtheijes
 
Frame counting: achieve accurate and real-time link estimation for low power ...
Frame counting: achieve accurate and real-time link estimation for low power ...Frame counting: achieve accurate and real-time link estimation for low power ...
Frame counting: achieve accurate and real-time link estimation for low power ...Daibo Liu
 
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET Journal
 
Detection of fire through Camera
Detection of fire through CameraDetection of fire through Camera
Detection of fire through CameraShivam Singhal
 
Internet of things - 3/4. Solving the problems
Internet of things - 3/4. Solving the problemsInternet of things - 3/4. Solving the problems
Internet of things - 3/4. Solving the problemsSumanth Bhat
 
Detecting proximity events in sensor networks
Detecting proximity events in sensor networksDetecting proximity events in sensor networks
Detecting proximity events in sensor networksBalaSuresh AsaiThambi
 
Report for lab 5 2017(1)
Report for lab 5 2017(1)Report for lab 5 2017(1)
Report for lab 5 2017(1)trayyoo
 
REDUCING THE MONITORING REGISTER FOR THE DETECTION OF ANOMALIES IN SOFTWARE D...
REDUCING THE MONITORING REGISTER FOR THE DETECTION OF ANOMALIES IN SOFTWARE D...REDUCING THE MONITORING REGISTER FOR THE DETECTION OF ANOMALIES IN SOFTWARE D...
REDUCING THE MONITORING REGISTER FOR THE DETECTION OF ANOMALIES IN SOFTWARE D...csandit
 
NS2 Network Simulation Example Research Assistance
NS2 Network Simulation Example Research AssistanceNS2 Network Simulation Example Research Assistance
NS2 Network Simulation Example Research AssistanceNetwork Simulation Tools
 
Data Integrity Techniques: Aviation Best Practices for CRC & Checksum Error D...
Data Integrity Techniques: Aviation Best Practices for CRC & Checksum Error D...Data Integrity Techniques: Aviation Best Practices for CRC & Checksum Error D...
Data Integrity Techniques: Aviation Best Practices for CRC & Checksum Error D...Philip Koopman
 
ENSEIRB - Advanced Project
ENSEIRB - Advanced ProjectENSEIRB - Advanced Project
ENSEIRB - Advanced ProjectArnaud Lempereur
 
Verifiable Round-Robin Scheme for Smart Homes (CODASPY 2019)
Verifiable Round-Robin Scheme for Smart Homes (CODASPY 2019)Verifiable Round-Robin Scheme for Smart Homes (CODASPY 2019)
Verifiable Round-Robin Scheme for Smart Homes (CODASPY 2019)Shantanu Sharma
 
Data mining final report
Data mining final reportData mining final report
Data mining final reportKedar Kumar
 
Performance evaluation of hypercube interconnectionm
Performance evaluation of hypercube interconnectionmPerformance evaluation of hypercube interconnectionm
Performance evaluation of hypercube interconnectionmAnjali Agrawal
 
IRJET- Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...
IRJET-  	  Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...IRJET-  	  Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...
IRJET- Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...IRJET Journal
 
Intrusion Detection in Wireless Sensor Networks
Intrusion Detection in Wireless Sensor NetworksIntrusion Detection in Wireless Sensor Networks
Intrusion Detection in Wireless Sensor NetworksJaiprakash Nagar
 

Tendances (18)

Behavioral Malware Detection in Dtn Using Intrusion Detection System
	Behavioral Malware Detection in Dtn Using Intrusion Detection System	Behavioral Malware Detection in Dtn Using Intrusion Detection System
Behavioral Malware Detection in Dtn Using Intrusion Detection System
 
Frame counting: achieve accurate and real-time link estimation for low power ...
Frame counting: achieve accurate and real-time link estimation for low power ...Frame counting: achieve accurate and real-time link estimation for low power ...
Frame counting: achieve accurate and real-time link estimation for low power ...
 
Lightweight Address Hopping forDefending the IPv6 IoT
Lightweight Address Hopping forDefending the IPv6 IoTLightweight Address Hopping forDefending the IPv6 IoT
Lightweight Address Hopping forDefending the IPv6 IoT
 
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
 
Detection of fire through Camera
Detection of fire through CameraDetection of fire through Camera
Detection of fire through Camera
 
Internet of things - 3/4. Solving the problems
Internet of things - 3/4. Solving the problemsInternet of things - 3/4. Solving the problems
Internet of things - 3/4. Solving the problems
 
Detecting proximity events in sensor networks
Detecting proximity events in sensor networksDetecting proximity events in sensor networks
Detecting proximity events in sensor networks
 
Triggering transmission
Triggering transmissionTriggering transmission
Triggering transmission
 
Report for lab 5 2017(1)
Report for lab 5 2017(1)Report for lab 5 2017(1)
Report for lab 5 2017(1)
 
REDUCING THE MONITORING REGISTER FOR THE DETECTION OF ANOMALIES IN SOFTWARE D...
REDUCING THE MONITORING REGISTER FOR THE DETECTION OF ANOMALIES IN SOFTWARE D...REDUCING THE MONITORING REGISTER FOR THE DETECTION OF ANOMALIES IN SOFTWARE D...
REDUCING THE MONITORING REGISTER FOR THE DETECTION OF ANOMALIES IN SOFTWARE D...
 
NS2 Network Simulation Example Research Assistance
NS2 Network Simulation Example Research AssistanceNS2 Network Simulation Example Research Assistance
NS2 Network Simulation Example Research Assistance
 
Data Integrity Techniques: Aviation Best Practices for CRC & Checksum Error D...
Data Integrity Techniques: Aviation Best Practices for CRC & Checksum Error D...Data Integrity Techniques: Aviation Best Practices for CRC & Checksum Error D...
Data Integrity Techniques: Aviation Best Practices for CRC & Checksum Error D...
 
ENSEIRB - Advanced Project
ENSEIRB - Advanced ProjectENSEIRB - Advanced Project
ENSEIRB - Advanced Project
 
Verifiable Round-Robin Scheme for Smart Homes (CODASPY 2019)
Verifiable Round-Robin Scheme for Smart Homes (CODASPY 2019)Verifiable Round-Robin Scheme for Smart Homes (CODASPY 2019)
Verifiable Round-Robin Scheme for Smart Homes (CODASPY 2019)
 
Data mining final report
Data mining final reportData mining final report
Data mining final report
 
Performance evaluation of hypercube interconnectionm
Performance evaluation of hypercube interconnectionmPerformance evaluation of hypercube interconnectionm
Performance evaluation of hypercube interconnectionm
 
IRJET- Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...
IRJET-  	  Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...IRJET-  	  Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...
IRJET- Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...
 
Intrusion Detection in Wireless Sensor Networks
Intrusion Detection in Wireless Sensor NetworksIntrusion Detection in Wireless Sensor Networks
Intrusion Detection in Wireless Sensor Networks
 

Similaire à International Refereed Journal of Engineering and Science (IRJES)

An Aggregate Location Monitoring System Of Privacy Preserving In Authenticati...
An Aggregate Location Monitoring System Of Privacy Preserving In Authenticati...An Aggregate Location Monitoring System Of Privacy Preserving In Authenticati...
An Aggregate Location Monitoring System Of Privacy Preserving In Authenticati...Acad
 
A Novel Solitude Conserving Location Monitoring Approach for Wireless Sensor ...
A Novel Solitude Conserving Location Monitoring Approach for Wireless Sensor ...A Novel Solitude Conserving Location Monitoring Approach for Wireless Sensor ...
A Novel Solitude Conserving Location Monitoring Approach for Wireless Sensor ...IJERA Editor
 
IOT-WSN: SURVEY ON POSITIONING TECHNIQUES
IOT-WSN: SURVEY ON POSITIONING TECHNIQUESIOT-WSN: SURVEY ON POSITIONING TECHNIQUES
IOT-WSN: SURVEY ON POSITIONING TECHNIQUESijassn
 
Node Legitimacy Based False Data Filtering Scheme in Wireless Sensor Networks
Node Legitimacy Based False Data Filtering Scheme in Wireless Sensor NetworksNode Legitimacy Based False Data Filtering Scheme in Wireless Sensor Networks
Node Legitimacy Based False Data Filtering Scheme in Wireless Sensor NetworksEswar Publications
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networksresearcherchennai
 
Virtual 2 d positioning system by using wireless sensors in indoor environment
Virtual 2 d positioning system by using wireless sensors in indoor environmentVirtual 2 d positioning system by using wireless sensors in indoor environment
Virtual 2 d positioning system by using wireless sensors in indoor environmentijwmn
 
Minimization of Localization Error using Connectivity based Geometrical Metho...
Minimization of Localization Error using Connectivity based Geometrical Metho...Minimization of Localization Error using Connectivity based Geometrical Metho...
Minimization of Localization Error using Connectivity based Geometrical Metho...Dr. Amarjeet Singh
 
IRJET- Clustering the Real Time Moving Object Adjacent Tracking
IRJET-  	  Clustering the Real Time Moving Object Adjacent TrackingIRJET-  	  Clustering the Real Time Moving Object Adjacent Tracking
IRJET- Clustering the Real Time Moving Object Adjacent TrackingIRJET Journal
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...cscpconf
 
Automatic Object Detection and Target using Ultrasonic Sensor
Automatic Object Detection and Target using Ultrasonic SensorAutomatic Object Detection and Target using Ultrasonic Sensor
Automatic Object Detection and Target using Ultrasonic SensorIRJET Journal
 
Mobile and Web Applications for Sensing Hazardous Room Temperature using Wire...
Mobile and Web Applications for Sensing Hazardous Room Temperature using Wire...Mobile and Web Applications for Sensing Hazardous Room Temperature using Wire...
Mobile and Web Applications for Sensing Hazardous Room Temperature using Wire...Mysa Vijay
 
A NEW SECURE LOCALIZATION APPROACH OF WIRELESS SENSOR NODES INTHE PRESENCE OF...
A NEW SECURE LOCALIZATION APPROACH OF WIRELESS SENSOR NODES INTHE PRESENCE OF...A NEW SECURE LOCALIZATION APPROACH OF WIRELESS SENSOR NODES INTHE PRESENCE OF...
A NEW SECURE LOCALIZATION APPROACH OF WIRELESS SENSOR NODES INTHE PRESENCE OF...ijcseit
 
A new secure localization approach of wireless sensor nodes in the presence o...
A new secure localization approach of wireless sensor nodes in the presence o...A new secure localization approach of wireless sensor nodes in the presence o...
A new secure localization approach of wireless sensor nodes in the presence o...ijcseit
 

Similaire à International Refereed Journal of Engineering and Science (IRJES) (20)

An Aggregate Location Monitoring System Of Privacy Preserving In Authenticati...
An Aggregate Location Monitoring System Of Privacy Preserving In Authenticati...An Aggregate Location Monitoring System Of Privacy Preserving In Authenticati...
An Aggregate Location Monitoring System Of Privacy Preserving In Authenticati...
 
A Novel Solitude Conserving Location Monitoring Approach for Wireless Sensor ...
A Novel Solitude Conserving Location Monitoring Approach for Wireless Sensor ...A Novel Solitude Conserving Location Monitoring Approach for Wireless Sensor ...
A Novel Solitude Conserving Location Monitoring Approach for Wireless Sensor ...
 
E010412433
E010412433E010412433
E010412433
 
Gs3612141219
Gs3612141219Gs3612141219
Gs3612141219
 
50120140506007 2
50120140506007 250120140506007 2
50120140506007 2
 
IOT-WSN: SURVEY ON POSITIONING TECHNIQUES
IOT-WSN: SURVEY ON POSITIONING TECHNIQUESIOT-WSN: SURVEY ON POSITIONING TECHNIQUES
IOT-WSN: SURVEY ON POSITIONING TECHNIQUES
 
Rfid based localization
Rfid based localizationRfid based localization
Rfid based localization
 
Node Legitimacy Based False Data Filtering Scheme in Wireless Sensor Networks
Node Legitimacy Based False Data Filtering Scheme in Wireless Sensor NetworksNode Legitimacy Based False Data Filtering Scheme in Wireless Sensor Networks
Node Legitimacy Based False Data Filtering Scheme in Wireless Sensor Networks
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
 
Virtual 2 d positioning system by using wireless sensors in indoor environment
Virtual 2 d positioning system by using wireless sensors in indoor environmentVirtual 2 d positioning system by using wireless sensors in indoor environment
Virtual 2 d positioning system by using wireless sensors in indoor environment
 
Indoor Localization in Wireless Sensor Networks
Indoor Localization in Wireless Sensor NetworksIndoor Localization in Wireless Sensor Networks
Indoor Localization in Wireless Sensor Networks
 
Minimization of Localization Error using Connectivity based Geometrical Metho...
Minimization of Localization Error using Connectivity based Geometrical Metho...Minimization of Localization Error using Connectivity based Geometrical Metho...
Minimization of Localization Error using Connectivity based Geometrical Metho...
 
IRJET- Clustering the Real Time Moving Object Adjacent Tracking
IRJET-  	  Clustering the Real Time Moving Object Adjacent TrackingIRJET-  	  Clustering the Real Time Moving Object Adjacent Tracking
IRJET- Clustering the Real Time Moving Object Adjacent Tracking
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
 
Automatic Object Detection and Target using Ultrasonic Sensor
Automatic Object Detection and Target using Ultrasonic SensorAutomatic Object Detection and Target using Ultrasonic Sensor
Automatic Object Detection and Target using Ultrasonic Sensor
 
Mobile and Web Applications for Sensing Hazardous Room Temperature using Wire...
Mobile and Web Applications for Sensing Hazardous Room Temperature using Wire...Mobile and Web Applications for Sensing Hazardous Room Temperature using Wire...
Mobile and Web Applications for Sensing Hazardous Room Temperature using Wire...
 
Sensor net
Sensor netSensor net
Sensor net
 
A NEW SECURE LOCALIZATION APPROACH OF WIRELESS SENSOR NODES INTHE PRESENCE OF...
A NEW SECURE LOCALIZATION APPROACH OF WIRELESS SENSOR NODES INTHE PRESENCE OF...A NEW SECURE LOCALIZATION APPROACH OF WIRELESS SENSOR NODES INTHE PRESENCE OF...
A NEW SECURE LOCALIZATION APPROACH OF WIRELESS SENSOR NODES INTHE PRESENCE OF...
 
A new secure localization approach of wireless sensor nodes in the presence o...
A new secure localization approach of wireless sensor nodes in the presence o...A new secure localization approach of wireless sensor nodes in the presence o...
A new secure localization approach of wireless sensor nodes in the presence o...
 
N0704075079
N0704075079N0704075079
N0704075079
 

Plus de irjes

Automatic Safety Door Lock System for Car
Automatic Safety Door Lock System for CarAutomatic Safety Door Lock System for Car
Automatic Safety Door Lock System for Carirjes
 
Squared Multi-hole Extrusion Process: Experimentation & Optimization
Squared Multi-hole Extrusion Process: Experimentation & OptimizationSquared Multi-hole Extrusion Process: Experimentation & Optimization
Squared Multi-hole Extrusion Process: Experimentation & Optimizationirjes
 
Analysis of Agile and Multi-Agent Based Process Scheduling Model
Analysis of Agile and Multi-Agent Based Process Scheduling ModelAnalysis of Agile and Multi-Agent Based Process Scheduling Model
Analysis of Agile and Multi-Agent Based Process Scheduling Modelirjes
 
Effects of Cutting Tool Parameters on Surface Roughness
Effects of Cutting Tool Parameters on Surface RoughnessEffects of Cutting Tool Parameters on Surface Roughness
Effects of Cutting Tool Parameters on Surface Roughnessirjes
 
Possible limits of accuracy in measurement of fundamental physical constants
Possible limits of accuracy in measurement of fundamental physical constantsPossible limits of accuracy in measurement of fundamental physical constants
Possible limits of accuracy in measurement of fundamental physical constantsirjes
 
Performance Comparison of Energy Detection Based Spectrum Sensing for Cogniti...
Performance Comparison of Energy Detection Based Spectrum Sensing for Cogniti...Performance Comparison of Energy Detection Based Spectrum Sensing for Cogniti...
Performance Comparison of Energy Detection Based Spectrum Sensing for Cogniti...irjes
 
Comparative Study of Pre-Engineered and Conventional Steel Frames for Differe...
Comparative Study of Pre-Engineered and Conventional Steel Frames for Differe...Comparative Study of Pre-Engineered and Conventional Steel Frames for Differe...
Comparative Study of Pre-Engineered and Conventional Steel Frames for Differe...irjes
 
Flip bifurcation and chaos control in discrete-time Prey-predator model
Flip bifurcation and chaos control in discrete-time Prey-predator model Flip bifurcation and chaos control in discrete-time Prey-predator model
Flip bifurcation and chaos control in discrete-time Prey-predator model irjes
 
Energy Awareness and the Role of “Critical Mass” In Smart Cities
Energy Awareness and the Role of “Critical Mass” In Smart CitiesEnergy Awareness and the Role of “Critical Mass” In Smart Cities
Energy Awareness and the Role of “Critical Mass” In Smart Citiesirjes
 
A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...
A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...
A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...irjes
 
The Effect of Orientation of Vortex Generators on Aerodynamic Drag Reduction ...
The Effect of Orientation of Vortex Generators on Aerodynamic Drag Reduction ...The Effect of Orientation of Vortex Generators on Aerodynamic Drag Reduction ...
The Effect of Orientation of Vortex Generators on Aerodynamic Drag Reduction ...irjes
 
An Assessment of The Relationship Between The Availability of Financial Resou...
An Assessment of The Relationship Between The Availability of Financial Resou...An Assessment of The Relationship Between The Availability of Financial Resou...
An Assessment of The Relationship Between The Availability of Financial Resou...irjes
 
The Choice of Antenatal Care and Delivery Place in Surabaya (Based on Prefere...
The Choice of Antenatal Care and Delivery Place in Surabaya (Based on Prefere...The Choice of Antenatal Care and Delivery Place in Surabaya (Based on Prefere...
The Choice of Antenatal Care and Delivery Place in Surabaya (Based on Prefere...irjes
 
Prediction of the daily global solar irradiance received on a horizontal surf...
Prediction of the daily global solar irradiance received on a horizontal surf...Prediction of the daily global solar irradiance received on a horizontal surf...
Prediction of the daily global solar irradiance received on a horizontal surf...irjes
 
HARMONIC ANALYSIS ASSOCIATED WITH A GENERALIZED BESSEL-STRUVE OPERATOR ON THE...
HARMONIC ANALYSIS ASSOCIATED WITH A GENERALIZED BESSEL-STRUVE OPERATOR ON THE...HARMONIC ANALYSIS ASSOCIATED WITH A GENERALIZED BESSEL-STRUVE OPERATOR ON THE...
HARMONIC ANALYSIS ASSOCIATED WITH A GENERALIZED BESSEL-STRUVE OPERATOR ON THE...irjes
 
The Role of Community Participation in Planning Processes of Emerging Urban C...
The Role of Community Participation in Planning Processes of Emerging Urban C...The Role of Community Participation in Planning Processes of Emerging Urban C...
The Role of Community Participation in Planning Processes of Emerging Urban C...irjes
 
Understanding the Concept of Strategic Intent
Understanding the Concept of Strategic IntentUnderstanding the Concept of Strategic Intent
Understanding the Concept of Strategic Intentirjes
 
The (R, Q) Control of A Mixture Inventory Model with Backorders and Lost Sale...
The (R, Q) Control of A Mixture Inventory Model with Backorders and Lost Sale...The (R, Q) Control of A Mixture Inventory Model with Backorders and Lost Sale...
The (R, Q) Control of A Mixture Inventory Model with Backorders and Lost Sale...irjes
 
Relation Between Stress And Menstrual Cycle At 18-21 Years Of Age
Relation Between Stress And Menstrual Cycle At 18-21 Years Of AgeRelation Between Stress And Menstrual Cycle At 18-21 Years Of Age
Relation Between Stress And Menstrual Cycle At 18-21 Years Of Ageirjes
 
Wave Transmission on Submerged Breakwater with Interlocking D-Block Armor
Wave Transmission on Submerged Breakwater with Interlocking D-Block ArmorWave Transmission on Submerged Breakwater with Interlocking D-Block Armor
Wave Transmission on Submerged Breakwater with Interlocking D-Block Armorirjes
 

Plus de irjes (20)

Automatic Safety Door Lock System for Car
Automatic Safety Door Lock System for CarAutomatic Safety Door Lock System for Car
Automatic Safety Door Lock System for Car
 
Squared Multi-hole Extrusion Process: Experimentation & Optimization
Squared Multi-hole Extrusion Process: Experimentation & OptimizationSquared Multi-hole Extrusion Process: Experimentation & Optimization
Squared Multi-hole Extrusion Process: Experimentation & Optimization
 
Analysis of Agile and Multi-Agent Based Process Scheduling Model
Analysis of Agile and Multi-Agent Based Process Scheduling ModelAnalysis of Agile and Multi-Agent Based Process Scheduling Model
Analysis of Agile and Multi-Agent Based Process Scheduling Model
 
Effects of Cutting Tool Parameters on Surface Roughness
Effects of Cutting Tool Parameters on Surface RoughnessEffects of Cutting Tool Parameters on Surface Roughness
Effects of Cutting Tool Parameters on Surface Roughness
 
Possible limits of accuracy in measurement of fundamental physical constants
Possible limits of accuracy in measurement of fundamental physical constantsPossible limits of accuracy in measurement of fundamental physical constants
Possible limits of accuracy in measurement of fundamental physical constants
 
Performance Comparison of Energy Detection Based Spectrum Sensing for Cogniti...
Performance Comparison of Energy Detection Based Spectrum Sensing for Cogniti...Performance Comparison of Energy Detection Based Spectrum Sensing for Cogniti...
Performance Comparison of Energy Detection Based Spectrum Sensing for Cogniti...
 
Comparative Study of Pre-Engineered and Conventional Steel Frames for Differe...
Comparative Study of Pre-Engineered and Conventional Steel Frames for Differe...Comparative Study of Pre-Engineered and Conventional Steel Frames for Differe...
Comparative Study of Pre-Engineered and Conventional Steel Frames for Differe...
 
Flip bifurcation and chaos control in discrete-time Prey-predator model
Flip bifurcation and chaos control in discrete-time Prey-predator model Flip bifurcation and chaos control in discrete-time Prey-predator model
Flip bifurcation and chaos control in discrete-time Prey-predator model
 
Energy Awareness and the Role of “Critical Mass” In Smart Cities
Energy Awareness and the Role of “Critical Mass” In Smart CitiesEnergy Awareness and the Role of “Critical Mass” In Smart Cities
Energy Awareness and the Role of “Critical Mass” In Smart Cities
 
A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...
A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...
A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...
 
The Effect of Orientation of Vortex Generators on Aerodynamic Drag Reduction ...
The Effect of Orientation of Vortex Generators on Aerodynamic Drag Reduction ...The Effect of Orientation of Vortex Generators on Aerodynamic Drag Reduction ...
The Effect of Orientation of Vortex Generators on Aerodynamic Drag Reduction ...
 
An Assessment of The Relationship Between The Availability of Financial Resou...
An Assessment of The Relationship Between The Availability of Financial Resou...An Assessment of The Relationship Between The Availability of Financial Resou...
An Assessment of The Relationship Between The Availability of Financial Resou...
 
The Choice of Antenatal Care and Delivery Place in Surabaya (Based on Prefere...
The Choice of Antenatal Care and Delivery Place in Surabaya (Based on Prefere...The Choice of Antenatal Care and Delivery Place in Surabaya (Based on Prefere...
The Choice of Antenatal Care and Delivery Place in Surabaya (Based on Prefere...
 
Prediction of the daily global solar irradiance received on a horizontal surf...
Prediction of the daily global solar irradiance received on a horizontal surf...Prediction of the daily global solar irradiance received on a horizontal surf...
Prediction of the daily global solar irradiance received on a horizontal surf...
 
HARMONIC ANALYSIS ASSOCIATED WITH A GENERALIZED BESSEL-STRUVE OPERATOR ON THE...
HARMONIC ANALYSIS ASSOCIATED WITH A GENERALIZED BESSEL-STRUVE OPERATOR ON THE...HARMONIC ANALYSIS ASSOCIATED WITH A GENERALIZED BESSEL-STRUVE OPERATOR ON THE...
HARMONIC ANALYSIS ASSOCIATED WITH A GENERALIZED BESSEL-STRUVE OPERATOR ON THE...
 
The Role of Community Participation in Planning Processes of Emerging Urban C...
The Role of Community Participation in Planning Processes of Emerging Urban C...The Role of Community Participation in Planning Processes of Emerging Urban C...
The Role of Community Participation in Planning Processes of Emerging Urban C...
 
Understanding the Concept of Strategic Intent
Understanding the Concept of Strategic IntentUnderstanding the Concept of Strategic Intent
Understanding the Concept of Strategic Intent
 
The (R, Q) Control of A Mixture Inventory Model with Backorders and Lost Sale...
The (R, Q) Control of A Mixture Inventory Model with Backorders and Lost Sale...The (R, Q) Control of A Mixture Inventory Model with Backorders and Lost Sale...
The (R, Q) Control of A Mixture Inventory Model with Backorders and Lost Sale...
 
Relation Between Stress And Menstrual Cycle At 18-21 Years Of Age
Relation Between Stress And Menstrual Cycle At 18-21 Years Of AgeRelation Between Stress And Menstrual Cycle At 18-21 Years Of Age
Relation Between Stress And Menstrual Cycle At 18-21 Years Of Age
 
Wave Transmission on Submerged Breakwater with Interlocking D-Block Armor
Wave Transmission on Submerged Breakwater with Interlocking D-Block ArmorWave Transmission on Submerged Breakwater with Interlocking D-Block Armor
Wave Transmission on Submerged Breakwater with Interlocking D-Block Armor
 

Dernier

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Dernier (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

International Refereed Journal of Engineering and Science (IRJES)

  • 1. International Refereed Journal of Engineering and Science (IRJES) ISSN (Online) 2319-183X, (Print) 2319-1821 Volume 2, Issue 3(March 2013), PP.01-06 www.irjes.com www.irjes.com 1 | Page Improving High Quality Privacy Preserving Location Monitoring System For Wireless Sensor Networks 1 . Ms. Badi Alekhya., 1 Assistant Professor, T.J.S Engineering College, Department of Computer Science and Engineering Abstract: - . Message authentication is an important objective of information security in modern wireless net- works. This objective is met by providing the receiver of the message an assurance of the sender’s identity. Digi- tal tools have been developed using cryptography. A major limitations of all cryptographic methods for message authentication lies in their uses of algorithms with fixed symmetric or public keys.This project presents a syn- chronized random key generation for each node which depends on the position. So there is no need any exact location data to transfer. Key generation protocol is used here. Key generation protocol depends on the global Positioning method. Pseudo random number creation depends upon the position and the initial value of linear feedback shift register. So each and every second create a new key. So the level of privacy information security is too high and power consumption is very low. 1. INTRODUCTION THE advance in wireless sensor technologies has resulted in many new applications for military and or civilian purposes. Many cases of these applications rely on the information of personal locations, for example, surveillance and location systems. These location-dependent systems are realized by using either identity sen- sors or counting sensors. For identity sensors, for example, Bat and Cricket, each individual has to carry a signal sender/receiver unit with a globally unique identifier. With identity sensors, the system can pinpoint the exact location of each monitored person. On the other hand, counting sensors, for example, photoelectric sensors, [4], and thermal sensors [5], are deployed to report the number of persons located in their sensing areas to a server. Fig. 1 gives an example of a privacy breach in a location of the monitoring system with counting sensors. There are the11 counting sensor nodes installed in nine rooms R1 to R9, and two hallways C1 and C2 (Fig. 1a). The nonzero number of persons detected by each sensor node is depicted as a number in parentheses. Figs. 1b and 1c give the numbers reported by the same set of sensor nodes at two consecutive time insistanstancesti+1 and ti+2, respectively. If R3 is Alice’s office room, an adversary knows that Alice is in room R3 at time ti. Then, the ad- versary knows that Alice left R3 at time ti+1 and went to C2by knowing the number of persons detected by the sensor nodes in R3 and C2. Likewise, the adversary can infer that Alice left C2 at time ti+2 and went to R7. Such knowledge leakage may lead to several privacy threats. For example, knowing that a person has visited certain clinical rooms may lead to knowing her health records. Also, knowing that a person has visited a certain bar or restaurant in a mall building may reveal confidential personal information. Fig1. A location monitoring system using counting sensors. (a) At time ti. (b) At time ti+1. (c) At time ti+2. 2. RELATED WORK Straightforward approaches for preserving users’ location privacy include enforcing privacy policies to restrict the use of collected location information and anonymizing the stored data before any disclosure. How-
  • 2. Improving High Quality Privacy Preserving Location Monitoring System For Wireless Sensor www.irjes.com 2 | Page ever, these approaches fail to prevent internal data thefts or inadvertent disclosure. Recently, location anonymi- zation techniques have been widely used to anonymize personal location infomation before any server to gathers the location information, in order to preserve personal location privacy in location-based services. These tech- niques are based on one of the three concepts. 1)False locations. Instead of reporting the monitored object’s exact location, the object reports n different locations, where only one of them is the object’s actual location while the rest are false locations 2) Spatial cloaking. The spatial cloaking technique blurs a user’s location into a cloaked spatial area that satisfy the user’s specified privacy requirements 3) Space transformation This technique transforms the location information of queries and data into another space, where the spatial relationship among the query and data are encoded .Among these three privacy concepts, only the spatial cloaking technique can be applied to our problem. The main reasons for this are that 1) the false location tech- niques cannot provide high-quality monitoring services due to a large amount of false location information, 2) the space transformation techniques cannot provide privacy preserving monitoring services as it reveals the monitored object’s exact location information to the query issuer. The spatial cloaking techniques can provide aggregate location information to the server and balance a trade off between privacy protection and the quality of services by tuning the specified privacy requirements, for example, k anonymity and minimum area privacy requirements. Thus, we adopt the spatial cloaking technique to preserve the monitored object’s location privacy in our location monitoring system. 3.ALGORITHMS LOCATION ANONYMIZATION ALGORITHMS In this section, we present our in-network resource and quality-aware location anonymization algo- rithms, that is.periodically executed by the sensor nodes to report their k-anonymous aggregate locations to the server for every reporting period. 3.1 The Resource-Aware Algorithm Algorithm 1. Resource-aware location anonymization 1: function RESOURCEAWARE (Integer k, Sensor m, List R) 2: PeerList <-{0} // Step 1: The broadcast step 3: Send a message with m’s identity m.ID, sensing area m.Area, and object count m.Count to m’s neighbour peers 4: if Receive a message from a peer p, i.e., (p.ID, p.Area, p.count) then 5: Add the message to PeerList 6: if m has found an adequate number of objects then 7: Send a notification message to m’s neighbours 8: end if 9: if Some m’s neighbour has not found an adequate number of objects then 10: Forward the message to m’s neighbours 11: end if 12: end if // Step 2: The cloaked area step 13: S<-{m} 14: Compute a score for each peer in PeerList 15: Repeatedly select the peer with the highest score from PeerList to S until the total number of objects in S is at least k 16: Area a minimum bounding rectangle of the senor nodes in S 17: N the total number of objects in S // Step 3: The validation step 18: if No containment relationship with Area and R 2 R then
  • 3. Improving High Quality Privacy Preserving Location Monitoring System For Wireless Sensor www.irjes.com 3 | Page 19: Send (Area,N) to the peers within Area and the server 20: else if m’s sensing area is contained by some R 2 R then 21: Randomly select a R0 2 R such that R0:Area contains m’s sensing area 22: Send R0 to the peers within R0:Area and the server 23: else 24: Send Area with a cloaked N to the peers within Area and the server 25: end if 3.2 Quality-aware location anonymization algorithm 1: function QUALITYAWARE (Integer k, Sensor m, Set init_solution, List R) 2: current_min_cloaked_area init_solution // Step 1: The search space step 3: Determine a search space S based on init_solution 4: Collect the information of the peers located in S // Step 2: The minimal cloaked area step 5: Add each peer located in S to C½1_ as an item 6: Add m to each item set in C½1_ as the first item 7: for i ¼ 1; i _ 4; i ++ do 8: for each item set X ¼ fa1; . . . ; aiþ1g in C½i_ do 9: if Area(MBR(X)) < Area(current_min_cloaked_area) then 10: if N(MBR(X)) >=k then 11: current_min_cloaked_area<-{x} 12: Remove X from C½i_ 13: end if 14: else 15: Remove X from C½i_ 16: end if 17: end for 18: if i < 4 then 19: for each item set pair X ¼ fx1; . . . ; xiþ1g, Y ¼ fy1; . . . ; yiþ1g in C½i_ do 20: if x1 ¼ y1; . . . ; xi ¼ yi and xiþ1 6¼ yiþ1 then 21: Add an item set fx1; . . . ; xiþ1; yiþ1g to C½i þ 1_ 22: end if 23: end for 24: end if 25: end for 26: Area a minimum bounding rectangle of current_min_cloaked_area 27: N the total number of objects in current_min_cloaked_area // Step 3: The validation step 28: Lines 18 to 25 in Algorithm 1
  • 4. Improving High Quality Privacy Preserving Location Monitoring System For Wireless Sensor www.irjes.com 4 | Page 4. System Architecture fig2.System Architecture Sensor nodes: Each sensor node is responsible for determining the number of objects in its sensing area,blurring its sensing area into a cloaked area A, which includes at least k objects, and reporting A with the number of objects located in A as aggregate location information to the server. We do not have any assumption about then network topology, as our system only requires a communication path from each sensor node to the server through a dis- tributed tree [10]. Each sensor node is also aware of its location and sensing area. Server: The server is responsible for collecting the aggregate locations reported from the sensor nodes, using a spatial histogram to estimate the distribution of the monitored objects, and answering range queries based on the estimated object distribution. Furthermore, the administrator can change the anonymized level k of the system at anytime by disseminating a message with a new value of k to all the sensor nodes. System users: Authenticated administrators and users can issue range queries to our system through either the server or the sensor nodes, as depicted in Fig. 2. The server uses the spatial histogram to answer their queries. Privacy model: In our system, the sensor nodes constitute a trusted zone, where they behave as defined in our algo- rithm and communicate with each other through a secure network channel to avoid internal network attacks, for example, eavesdropping, traffic analysis, and malicious nodes. Since establishing such a secure network channel has been studied in the literature the discussion of how to get this network channel is beyond the scope of this paper. However, the solutions that have been used in previous works can be applied to our system. Our system also provides anonymous communication between the sensor nodes and the server by employing existing anonymous communication techniques. Thus given an aggregate location R, the server only knows that the sender of R is one of the sensor nodes within R.Furthermore,only authenticated administrators can change the k- anonymity level and the spatial histogram size. In emergency cases, the administrators can set the k-anonymity level to a small value to get more accurate aggregate locations from the sensor nodes, or even set it to zero to disable our algorithm to get the original readings from the sensor nodes, in order to get the best services from the system. Since the server and the system user are outside the trusted zone, they are untrusted.We now discuss the privacy threat in existing location monitoring systems. In an identity-sensor location monitoring system, since each sensor node reports the exact location information of each monitored object to the server, the adver- sary can pinpoint each object’s exact location. On the other hand, in a counting-sensor location monitoring sys- tem, each sensor node reports the number of objects in its sensing area to the server. The adversary can map the monitored areas of the sensor nodes to the system layout. If the object count of a monitored area is very small or equal to one, the adversary can infer the identity of the monitored objects based on the mapped monitored area, Performance Metrics We evaluate our system in terms of five performance metrics. 1. Attack model error. This metric measures the resilience of our system to the attacker model by the relative error between the estimated number of objects b N in a sensor node’s sensing area and the actual one N. The error is measured as |N-N|/N. When N=0, we consider N^ as the error. 2. Communication cost. We measure the communication cost of our location anonymization algorithms in terms of the average number of bytes sent by each sensor node per reporting period. This metric also indicates the network traffic and the power consumption of the sensor nodes. 3. Cloaked area size. This metric measures the quality of the aggregate locations reported by the sensor nodes.The smaller the cloaked area,the better the accuracy of the aggregate location.
  • 5. Improving High Quality Privacy Preserving Location Monitoring System For Wireless Sensor www.irjes.com 5 | Page 4. Computational cost. We measure the computational cost of our location anonymization al gorithms in terms of the average number of the MBR computations that are needed to determine a resource or quality-aware cloaked area. We compare our algorithms with a basic approach that computes the MBR for each combination of the peers in the required search space to find the minimal cloaked area. The basic approach does not employ any optimization techniques proposed for our quality-aware algorithm. 5. Query error. This metric measures the utility of our system, in terms of the relative error between the query of the answer M^, which is the estimated number of objects within the query region based on a spatial histo- gram, and the actual answer M,respectively.The error is measured as |M^-M|/M When M = 0, we consider M^ as the error. Fig Attacker model error. (a) Anonymity levels. (b) Number of objects Effect of the Number of Objects Fig. depicts the performance of our system with respect to the increasing the number of objects from 2,000 to 10,000. Fig. shows that when the number of objects increases, the communication cost of the resource-aware algorithm is only slightly affected, but the quality-aware algorithm significantly reduces the communication cost. The broadcast step of the resource-aware algorithm effectively allows each sensor node to find an adequate number of objects to blur its sensing area. When there are more objects, the sensor node finds smaller cloaked areas that satisfy the k-anonymity privacy requirement, as given in Fig. b. Thus, the required search space of a minimal cloaked area computed by the quality aware algorithm becomes smaller; hence, the communication cost of gathering the information of the peers in such a smaller required search space reduces. Likewise, since there are fewer peers in the smaller required search space as the number of objects increases, finding the mini- mal cloaked area incurs less MBR computation (Fig. c). Since our algorithms generate smaller cloaked areas when there are more users, the spatial histogram can gather more accurate aggregate locations to estimate the object distribution; therefore, the query answer error reduces (Fig. d). The result also shows that the quality- aware algorithm always provides better quality services than the resource-aware algorithm. Fi Anonymity levels. (a) Communications cost. (b) Cloaked area size. (c) Computational cost. (d) Estima- tion error CONCLUSION In this paper, we propose a privacy-preserving location monitoring system for wireless sensor net- works. We design two in-network location anonymization algorithms, namely, resource and quality-aware algo- rithms, which preserve personal location privacy, while enabling the system to provide allocation monitoring services. Both algorithms rely on this of well-established k-anonymity privacy concept that requires a person is indistinguishable among k persons. In our system, sensor nodes execute our location anonymization algorithms to provide k-anonymous aggregate locations, in which each aggregate location is a cloaked area A with the number of monitored objects, N, located in A, where N>= k, for the system. The resource-aware algorithm aims to minimize communication and computational cost, while the quality-aware algorithm aims to minimize the size of cloaked areas in order to generate more accurate aggregate locations. To provide location monitoring services based on the aggregate location information, we propose a spatial histogram approach that analyzes the aggregate locations reported from the sensor nodes to estimate the distribution of the monitored objects. The estimated distribution is used to provide location monitoring services through answering range queries. We evaluate our system through simulated experiments. The results show that our system provides high-quality lo-
  • 6. Improving High Quality Privacy Preserving Location Monitoring System For Wireless Sensor www.irjes.com 6 | Page cation monitoring services (the accuracy of the resource-aware algorithm is about 75 percent and the accuracy of the quality-aware algorithm is about 90 percent), while preserving the monitored object’s location privacy. REFERENCES [1] C. Bettini, S. Mascots, X.S. Wang, and S.Jajodia, “Anonymity in Location-Based Services: Towards a General Framework,” Proc.Int’l Conf. Mobile Data Management (MDM), 2007. [2] B. Gedik and L. Liu, “Protecting Location Privacy with Personalized K-Anonymity: Architecture and Algorithms,” IEEE Trans. Mobile Computing, vol. 7, no. 1, pp. 1-18, Jan. 2008. [3] G. Ghinita, P. Kalnis, and S. Skiadopoulos, “PRIV_E: Anonymous Location-Based Queries in Distributed Mobile Systems,” Proc. Int’l Conf. World Wide Web (WWW), 2007. [4] H. Kido, Y. Yanagisawa, and T. Satoh, “An Anonymous Communication Technique Using Dummies for Location-Based Ser- vices,” Proc. Int’l Conf. Pervasive Services (ICPS), 2005. [5] M. Gruteser, G. Schelle, A. Jain, R. Han, and D. Grunwald, “Privacy-Aware Location Sensor Networks,” Proc. Ninth Conf. Hot Topics in Operating Systems (HotOS), 2003. 6] A. Harter, A. Hopper, P. Steggles, A. Ward, and P. Webster, “The Anatomy of a Context-Aware Application,” Proc. ACM Mob Co [7] J. Kong and X. Hong, “ANODR: Anonymous on Demand Routing with Untraceable Routes for Mobile Ad-Hoc Networks,” Proc.ACMMobiHoc,2003.