A Secured Dynamic Location Monitoring System in WSN
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 3
Abstract
Wireless sensor network is broadly spreading network of the communication field. Wireless sensor network is having sensor nodes as sensing devices which sense physical or environmental conditions and a sink node is the node by which whole gathered information is transferred to the base station. Right from the defense services to the public services, wireless sensor network plays an important role. Heterogeneousness, distributed processing, low bandwidth communication, large scale coordination and secured location monitoring are the basic problems arriving in WSN. The surveillance system is one of the most important service provided with this wireless sensor network. But the problem of location security is still arriving during monitoring a person location. We propose a system which provides nearly precise location as well as maintaining location privacy to overcome this security problem. Here in this paper we propose a single algorithm which gives only the nearby location of monitoring person rather than precise location to prevent the location privacy. The scheme of spatial cloaking with the use of dummies is applying here. The concept of k-anonymity is also applied here which is mean that a person is indistinguishable from k numbers of people. For monitoring a location continuously here uses dynamic data, so the location wherever a monitoring person goes will be continuously traced. Less number of operations and by the use of single algorithm the time required is less and the output is appropriate. The result shows that our system is more reliable to monitor a location with preserving privacy.
Authors and Affiliations
Shrikant P. Dhawale, Archana R. Raut
Design of Parallel Advanced Encryption Standard (AES) Algorithm
The Advanced Encryption Standard (AES) is today’s key data encryption standard for protecting data, but the implementation of high-speed AES encryption engine needs a large number of hardware resources. In this paper...
Comparative Study of Fractional Order Derivative Based Image Enhancement Techniques
In this paper, image enhancement based on fractional gradient is proposed. The Taylor’s Series is used to obtain a generalized expression for this Fractional order derivative. The Image is differentiated in both x and...
Real-Time 3D Game Using Sixth Sense and Haptic Technology: A Review
This paper is about design of an efficient Game focusing more on combination of Technologies. The purpose of this is to integrate various technologies and develop 3D Game which will enhance game capabilities in Gamin...
Construction of Covert Channel Using Data Hiding Mechanism In Ipv4
Covert channel is a way of abstracting the information and hiding the information, in such a way that the reader should not analyse the hidden information and transmit the data to the destination. The covert techniqu...
A Rule Based Approach For Malayalam-English Translation
This paper presents an approach for translating simple Malayalam sentences to English. As the Malayalam language is morphologically rich, free word order and highly agglutinative it is very difficult to process the sent...