scispace - formally typeset
Book ChapterDOI

Source Node Position Confidentiality (SNPC) Conserving Position Monitoring System for Wireless Networks

Reads0
Chats0
TLDR
A novel scheme for preserving confidentiality of the source node position in wireless network is presented to maximize the accuracy of the aggregate position information, to minimize the communication and computational cost and to offer source nodes position confidentiality by achieving numerous aspects of security, anonymity, traceability, revocation, data unlinkability and with the help of fake data resources.
Abstract
Position Monitoring System (PMS) is one of the applications of wireless networking that aims for monitoring and tracking objects’ current position in the wireless area. For example, in order to keep an eye on the movement of an enemy in military applications the position monitoring system in wireless network can be set up. Battlefield surveillance is the classic example of this category in which the soldier needs protection from attackers. Consequently the issue is: how to conceal the position of the wireless node from the attacker? In this paper, we present a novel scheme for preserving confidentiality of the source node position in wireless network. The main objective behind presenting this scheme is to maximize the accuracy of the aggregate position information, to minimize the communication and computational cost and to offer source node position confidentiality by achieving numerous aspects of security, anonymity, traceability, revocation, data unlinkability and with the help of fake data resources. At the end, the experimental work and simulation results depicts the effectiveness of the proposed scheme.

read more

Citations
More filters
Journal ArticleDOI

Enforcing Position-Based Confidentiality With Machine Learning Paradigm Through Mobile Edge Computing in Real-Time Industrial Informatics

TL;DR: A method for conserving position confidentiality of roaming PBSs users using machine learning techniques is proposed and it is confirmed that the proposed method achieved above 90% of the position confidentiality in PBSs.
Journal ArticleDOI

Search space-based multi-objective optimization evolutionary algorithm

TL;DR: The proposed SSMOEA algorithm is good and competitive in comparison to the existing EMO algorithms from the viewpoint of finding a scattered and estimated solution set in multi-objective optimization problems and can achieve a good trade-off between search space convergence and search space diversity in the appropriate experimental setup.
Journal ArticleDOI

PCCA: Position Confidentiality Conserving Algorithm for Content-Protection in e-Governance Services and Applications

TL;DR: PCCA, a novel position confidentiality conserving algorithm for content protection in e-Governance is proposed by means of rule-based approach from computational intelligence and users current position information and evaluation demonstrates that PCCA can efficiently conserve roaming users position confidentiality while accomplishing better performance, guaranteed position confidentiality, and better quality of service in e.Governance.
Journal ArticleDOI

Base Station Positioning in Wireless Sensor Network to aid Cluster Head Selection Process

TL;DR: This paper proposes an (SAPSO) Self-Adaptive Particle Swarm Optimization algorithm to solve the base station positioning problem and demonstrates that the proposed SAPSO algorithm performs better than the other conventional algorithms.
Journal ArticleDOI

Source node position confidentiality aspects in wireless networks: an extended review

TL;DR: A detailed survey of source node position confidentiality SNPC is presented and the core techniques used for provision of SNPC and the limitations of the mechanisms stated in literature are addressed.
References
More filters
Book ChapterDOI

Anonymity, unobservability, and pseudeonymity — a proposal for terminology

TL;DR: In this article, the authors propose a set of terminology which is both expressive and precise, and define anonymity, unlinkability, unobservability, and pseudonymity (pseudonyms and digital pseudonyms, and their attributes).
Proceedings ArticleDOI

Enhancing Source-Location Privacy in Sensor Network Routing

TL;DR: This paper provides a formal model for the source-location privacy problem in sensor networks and examines the privacy characteristics of different sensor routing protocols, and devised new techniques to enhance source- location privacy that augment these routing protocols.
Proceedings ArticleDOI

Source-location privacy in energy-constrained sensor network routing

TL;DR: This paper focuses on protecting the source's location by introducing suitable modifications to sensor routing protocols to make it difficult for an adversary to backtrack to the origin of the sensor communication.
BookDOI

Designing Privacy Enhancing Technologies

TL;DR: In this article, the authors propose a set of terminology which is both expressive and precise, and define anonymity, unlinkability, unobservability, and pseudonymity (pseudonyms and digital pseudonyms, and their attributes) based on the nomenclature of early papers in the field.
Journal ArticleDOI

A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks

TL;DR: The system designs two in-network location anonymization algorithms, namely, resource and quality-aware algorithms, that aim to enable the system to provide high-quality location monitoring services for system users, while preserving personal location privacy.
Related Papers (5)