27,019 research outputs found

    A Review of Privacy Preserving Techniques inWireless Sensor Network

    Get PDF
    This paper represents a review of privacy preserving techniques in wireless sensor network. Wireless sensor networks are not secure. To preserve privacy of wireless sensor network various techniques are discovered. A lot of work has been done to address challenges faced to preserve privacy of wireless sensor network. In this paper we represent a research on privacy preserving techniques used in location privacy, data privacy and network privacy. This paper should provide help for further research in privacy preservation in wireless sensor network. Keywords: Context privacy, data privacy, source location privac

    A Review of Privacy Preserving Techniques in Wireless Sensor Network

    Get PDF
    This paper represents a review of privacy preserving techniques in wireless sensor network. Wireless sensor networks are not secure. To preserve privacy of wireless sensor network various techniques are discovered. A lot of work has been done to address challenges faced to preserve privacy of wireless sensor network. In this paper we represent a research on privacy preserving techniques used in location privacy, data privacy and network privacy. This paper should provide help for further research in privacy preservation in wireless sensor network. Keywords: Context privacy, data privacy, source location privac

    Location based services in wireless ad hoc networks

    Get PDF
    In this dissertation, we investigate location based services in wireless ad hoc networks from four different aspects - i) location privacy in wireless sensor networks (privacy), ii) end-to-end secure communication in randomly deployed wireless sensor networks (security), iii) quality versus latency trade-off in content retrieval under ad hoc node mobility (performance) and iv) location clustering based Sybil attack detection in vehicular ad hoc networks (trust). The first contribution of this dissertation is in addressing location privacy in wireless sensor networks. We propose a non-cooperative sensor localization algorithm showing how an external entity can stealthily invade into the location privacy of sensors in a network. We then design a location privacy preserving tracking algorithm for defending against such adversarial localization attacks. Next we investigate secure end-to-end communication in randomly deployed wireless sensor networks. Here, due to lack of control on sensors\u27 locations post deployment, pre-fixing pairwise keys between sensors is not feasible especially under larger scale random deployments. Towards this premise, we propose differentiated key pre-distribution for secure end-to-end secure communication, and show how it improves existing routing algorithms. Our next contribution is in addressing quality versus latency trade-off in content retrieval under ad hoc node mobility. We propose a two-tiered architecture for efficient content retrieval in such environment. Finally we investigate Sybil attack detection in vehicular ad hoc networks. A Sybil attacker can create and use multiple counterfeit identities risking trust of a vehicular ad hoc network, and then easily escape the location of the attack avoiding detection. We propose a location based clustering of nodes leveraging vehicle platoon dispersion for detection of Sybil attacks in vehicular ad hoc networks --Abstract, page iii

    Maintaining trajectory privacy in mobile wireless sensor networks

    Get PDF
    Mobile wireless sensor networks (MWSN) is a subdomain of wireless sensor networks in which sensors and/or sinks are mobile. In this study, we propose a scheme for providing trajectory privacy of mobile sink nodes. The proposed scheme is based on random distribution of data packets. Moreover, sensor nodes do not use location information of the mobile sink or its trajectory. We performed simulation based and analytical performance evaluations for the proposed scheme. The results show that a network with up to 99% data delivery rate can be obtained by appropriate configuration while maintaining a fair level of trajectory privacy of the mobile sink node

    Security and Privacy in Heterogeneous Wireless and Mobile Networks: Challenges and Solutions

    Get PDF
    abstract: The rapid advances in wireless communications and networking have given rise to a number of emerging heterogeneous wireless and mobile networks along with novel networking paradigms, including wireless sensor networks, mobile crowdsourcing, and mobile social networking. While offering promising solutions to a wide range of new applications, their widespread adoption and large-scale deployment are often hindered by people's concerns about the security, user privacy, or both. In this dissertation, we aim to address a number of challenging security and privacy issues in heterogeneous wireless and mobile networks in an attempt to foster their widespread adoption. Our contributions are mainly fivefold. First, we introduce a novel secure and loss-resilient code dissemination scheme for wireless sensor networks deployed in hostile and harsh environments. Second, we devise a novel scheme to enable mobile users to detect any inauthentic or unsound location-based top-k query result returned by an untrusted location-based service providers. Third, we develop a novel verifiable privacy-preserving aggregation scheme for people-centric mobile sensing systems. Fourth, we present a suite of privacy-preserving profile matching protocols for proximity-based mobile social networking, which can support a wide range of matching metrics with different privacy levels. Last, we present a secure combination scheme for crowdsourcing-based cooperative spectrum sensing systems that can enable robust primary user detection even when malicious cognitive radio users constitute the majority.Dissertation/ThesisPh.D. Electrical Engineering 201

    Seculation Routing With Fortification Wireless Networks

    Get PDF
    Wireless sensor networks having so many problems a number of solutios enough? security issues, discusses some existing solutions, and suggests possible research directions like key establishment secrecy,authentication,privacy,denial-of-service attacks ,secure routing  and node capture attacks. Sensor devices are limited in their energy, computation, and communication capabilities Sensor nodes are often deployed in open areas, thus allowing physical attack Sensor networks closely interact with their physical environments and with people, posing new security problems. So In this paper address all the problems of wireless senor networks .In this paper we control back bone flooding attacks and give the location privacy These techniques provide trade-offs between privacy, communication cost, and latency.Through analysis and simulation, we demonstrate that the proposed techniques are efficient and effective for source and sink location privacy in sensor networks

    Maintaining trajectory privacy in mobile wireless sensor networks

    Get PDF
    Sensors are tiny, resource-limited devices that are deployed in different areas to gather information for specific purposes. Wireless sensor networks consist of sensors with limited communication range and one or more sink nodes that are responsible for collecting the produced data by the sensors. Mobile wireless sensor networks is a subdomain of wireless sensor networks in which sensors and/or sinks are mobile. Trajectory privacy of the sink node is one of the security issues that are emerged with mobile wireless sensor networks. In this thesis, we propose a scheme for the trajectory privacy of mobile sink nodes. The proposed scheme is based on random distribution of data packets. In this scheme, sensor nodes do not use and need location information of the mobile sink or its trajectory. We performed simulation based and analytical performance evaluations for the proposed scheme. The results show that a network with up to 99% data delivery rate can be obtained by appropriate configuration of the scheme parameters while maintaining the trajectory privacy of the mobile sink node. In addition to that, the proposed scheme has economical resource usage since it does not involve any kind of cryptographic mechanism

    An Enhanced Source Location Privacy based on Data Dissemination in Wireless Sensor Networks (DeLP)

    Get PDF
    open access articleWireless Sensor Network is a network of large number of nodes with limited power and computational capabilities. It has the potential of event monitoring in unattended locations where there is a chance of unauthorized access. The work that is presented here identifies and addresses the problem of eavesdropping in the exposed environment of the sensor network, which makes it easy for the adversary to trace the packets to find the originator source node, hence compromising the contextual privacy. Our scheme provides an enhanced three-level security system for source location privacy. The base station is at the center of square grid of four quadrants and it is surrounded by a ring of flooding nodes, which act as a first step in confusing the adversary. The fake node is deployed in the opposite quadrant of actual source and start reporting base station. The selection of phantom node using our algorithm in another quadrant provides the third level of confusion. The results show that Dissemination in Wireless Sensor Networks (DeLP) has reduced the energy utilization by 50% percent, increased the safety period by 26%, while providing a six times more packet delivery ratio along with a further 15% decrease in the packet delivery delay as compared to the tree-based scheme. It also provides 334% more safety period than the phantom routing, while it lags behind in other parameters due to the simplicity of phantom scheme. This work illustrates the privacy protection of the source node and the designed procedure may be useful in designing more robust algorithms for location privac

    WSN Location Privacy Scheme Enhancement through Epidemical Information Dissemination

    Get PDF
    Wireless Sensor Networks (WSNs) are commonly used for animal tracking. Over the years, a significant number of studies have been presented for monitoring moving targets through WSN. At the same time, the location / position information of each target should be available only to authorized entities, e.g., Animal Protection Centers, thus, the position should be kept private. The iHIDE is a location privacy mechanism that uses a non-geographical based routing scheme for packet delivery over WSN. In this paper, we elaborate on that scheme by introducing a routing plan construction algorithm. Furthermore, we enhance iHIDE by adopting the use of epidemical data dissemination as an enforcing privacy technique. Finally, we evaluate through simulations the scheme against other commonly used location privacy overlays in terms of network overhead and safety period
    • …
    corecore