3 research outputs found

    An Enhanced Communication Protocol for Location Privacy in WSN

    Get PDF
    Wireless sensor network (WSN) is built of many sensor nodes. The sensors can sense a phenomenon, which will be represented in a form of data and sent to an aggregator for further processing. WSN is used in many applications, such as object tracking and security monitoring. The objects in many situations need physical and location protection. In addition to the source location privacy, sink location privacy should be provided. Providing an efficient location privacy solution would be challenging due to the open nature of the WSN. Anonymity is a key solution for location privacy. We present a network model that is protected against local, multilocal, and global adversaries that can launch sophisticated passive and active attacks against the WSN.http://dx.doi.org/10.1155/2015/69709

    Fortified Anonymous Communication Protocol for Location Privacy in WSN: A Modular Approach

    Get PDF
    Wireless sensor network (WSN) consists of many hosts called sensors. These sensors can sense a phenomenon (motion, temperature, humidity, average, max, min, etc.) and represent what they sense in a form of data. There are many applications for WSNs including object tracking and monitoring where in most of the cases these objects need protection. In these applications, data privacy itself might not be as important as the privacy of source location. In addition to the source location privacy, sink location privacy should also be provided. Providing an efficient end-to-end privacy solution would be a challenging task to achieve due to the open nature of the WSN. The key schemes needed for end-to-end location privacy are anonymity, observability, capture likelihood, and safety period. We extend this work to allow for countermeasures against multi-local and global adversaries. We present a network model protected against a sophisticated threat model: passive /active and local/multi-local/global attacks. This work provides a solution for end-to-end anonymity and location privacy as well. We will introduce a framework called fortified anonymous communication (FAC) protocol for WSN.http://dx.doi.org/10.3390/s15030582

    Sleep-Enabled Roadside Units for Motorway Vehicular Networks

    Get PDF
    In this paper, we introduce a number of generic sleep mechanisms for energy saving at the vehicular roadside units (RSUs). Since random sleep cycles (sleep cycles type-I) were already introduced before, we term the introduced mechanisms sleep cycles (type-II, III, IV, V, VI). Each sleep cycles type arranges the service and sleep sequences distinctively to yield various levels of energy savings and average packet delay. A generic analytic model for the roadside unit (RSU) with such sleep cycles is proposed using G/G/1/K G-vacation queuing, where real vehicular traffic profiles and packet size measurements are utilised. The performance evaluation reveals that with one of the proposed sleep cycles (type-IV), the RSU achieves 68% energy savings and 7.3 ms average packet delay over the day, resulting in respective improvements of 10% and 28% compared to the existing random sleep cycles. These improvements have been achieved under a very conservative operating delay bound for audio conferencing applications. However, modern compression and codecs, due to their leniency on Quality of Service (QoS), would potentially enable higher energy savings through the proposed sleep cycles
    corecore