A K-Anonymity Privacy-Preserving Location Monitoring System for Wireless Sensor Networks with Nymble Secure System

Abstract

 Anonymizing wireless sensor networks allow users to access services privately by using a series of routers to hide the client’s IP address from the server. As a result, administrators block all known exit nodes of anonymizing networks, denying anonymous access to misbehaving. To address this problem, servers can “blacklist” misbehaving users, thereby blocking users without compromising their anonymity. Monitoring personal locations with a potentially untrusted server poses privacy threats to the monitoredindividuals, a privacy-preserving location monitoring system for wireless sensor networks is adopted. Two innetwork location anonymization algorithms are considered, namely, resource and quality-aware algorithms, that aim to enable the system to provide high-quality location monitoring services for system users, while preserving personal location privacy. Both algorithms rely on the well established k-anonymity privacy concept, that is, a person is indistinguishable among k persons, to enable trusted sensor nodes to provide the aggregate location information of monitored persons. Each aggregate location is in a form of a monitored area A along with the number of monitored persons residing in A, where A contains at least k persons. The resource-aware algorithm aims to minimize communication and computational cost, while the quality-aware algorithm aims to maximize the accuracy of the aggregate locations by minimizing their monitored areas. To utilize the aggregate location information and to provide location monitoring services, a spatial histogram approach is used that estimates the distribution of the monitored persons based on the gathered aggregate location information. Then, the estimated distribution is used to provide location monitoring services through answering range queries.

Authors and Affiliations

Gayathri M 1 ,Bharathi M 2

Keywords

Related Articles

Fractal Image Compression Techniques

Image compression is an essential technology in multimedia and digital communication fields. Fractal image compression is a potential image compression scheme due to its potential high compression ratio, fast decompressi...

 Congestion Control in Wireless Sensor Network-A  Survey

 Wireless Sensor network is the network of sensors. The sensors are the nothing but the small devices which have the sensing ability, storage capacity and also the energy or the power storage. The function of the se...

 Asymptotic Security Key Generation and Distribution Algorithm

 Service-oriented Architectures (SOA) facilitate the dynamic and seamless integration of services offered by different service providers which in addition can be located in different trust domains. Especially for bu...

 Mathematical Analysis of the Control of the Spread of Infectious Disease in a Prey-Predator Ecosystem

 We present a model for the mathematical analysis of the control of the spread of an infectious disease in a predator-prey ecosystem. In this work, we present a compartmental mathematical model expressed by a sy...

Challenges of Mobile Cloud Computing

This article summarized the concept of Mobile cloud computing, pointed out many problems about Mobile cloud computing, and proposed the solving methods.

Download PDF file
  • EP ID EP114811
  • DOI -
  • Views 111
  • Downloads 0

How To Cite

Gayathri M 1, Bharathi M 2 (2012).  A K-Anonymity Privacy-Preserving Location Monitoring System for Wireless Sensor Networks with Nymble Secure System. International Journal of Computer & organization Trends(IJCOT), 2(2), 45-52. https://europub.co.uk./articles/-A-114811