Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








4,568 Hits in 2.6 sec

Privacy preservation for WSN: A Survey

Prakhar Gupta, Meenu Chawla
2012 International Journal of Computer Applications  
This paper presents a review of privacy-preserving techniques for wireless sensor networks (WSN).  ...  Some interesting open challenges for future research have also been introduced. This paper should provide some fruitful help for further research in privacy preservation for WSN.  ...  ) Huge No extra delay No extra power consume Injects a dummy packet for uniform sending rate Excellent (For base station privacy) No extra over- head No extra delay Fair but decreases  ... 
doi:10.5120/7326-0159 fatcat:cpowbksth5bkxk4i4emu67dpfa

Privacy preservation in wireless sensor networks: A state-of-the-art survey

Na Li, Nan Zhang, Sajal K. Das, Bhavani Thuraisingham
2009 Ad hoc networks  
This paper provides a state-of-theart survey of privacy-preserving techniques for WSNs.  ...  We also discuss a number of important open challenges for future research. Our hope is that this paper sheds some light on a fruitful direction of future research for privacy preservation in WSNs.  ...  For the first class privacy, a straight forward approach to defend against internal adversaries is to apply end-to-end encryption between the data source and the base station.  ... 
doi:10.1016/j.adhoc.2009.04.009 fatcat:v2daasfks5dijhqnledvfjdcgy

Rate-Privacy in Wireless Sensor Networks [article]

H. Shafiei, A. Khonsari, H. Derakhshi, P. Mousavi
2013 arXiv   pre-print
Our discussion reveals that the concept indeed is of a great importance for the privacy preservation of such networks. As a result, we propose a buffering scheme to protect the rate from adversaries.  ...  This paper introduces the concept of rate privacy in the context of wireless sensor networks.  ...  Motivated by the shortcomings of the approaches described above, we present a rate-privacy preservation scheme as follows.  ... 
arXiv:1302.1506v1 fatcat:ztlmy7qqlnfpvgeeyqrpgy4at4

Privacy Preservation using 2-Degree Anonymity with Trust Circle in Ubiquitous Network for Service Communications

Swarnali Hazra, S.K.Setua
2020 IEEE Access  
In this paper, privacy preservation is explored with two levels of anonymization by a 2-degree anonymity approach through trust circle of one service entity in service communication.  ...  It raises numerous privacy and security issues for consumers.  ...  Many privacy preservation approaches are proposed for different environments. The cryptographic approach is one of the traditional privacy preservation techniques.  ... 
doi:10.1109/access.2020.2971239 fatcat:fwinofqj5fbn3bgcsdz5itxn34

IDP: A Privacy Provisioning Framework for TIP Attributes in Trusted Third Party-based Location-based Services Systems

Muhammad Usman Ashraf, Kamal M., Rida Qayyum, Hina Ejaz
2020 International Journal of Advanced Computer Science and Applications  
Hence, the aim to provide a promising roadmap to research and development communities for the right selection of privacy approach has achieved by conducting a comparative survey of the TTP based approaches  ...  Leading to these privacy attributes, the current study addressed the privacy challenge by proposing a new privacy protection model named "Improved Dummy Position" (IDP) that protects TIP (Time, Identity  ...  Kamal m Jambi for technical and financial support in this research.  ... 
doi:10.14569/ijacsa.2020.0110773 fatcat:adq2jv6rlzgkppbcp52rwue3ru

Protecting Location Privacy in Wireless Sensor Networks against a Local Eavesdropper A Survey

Chinnu George, Dhinakaran Nathaniel
2012 International Journal of Computer Applications  
So an analysis of the existing techniques against a local eavesdropper is being presented. This paper should be helpful for the research in privacy preservation in WSN in the future work.  ...  This paper presents the review of the existing privacy techniques in wireless sensor networks (WSN). There are two main categories of privacy preservation in WSN.  ...  In the next section a introduction to the existing approaches is given. Section 3 presents the privacy preservation techniques with respect to context privacy.  ... 
doi:10.5120/8888-2889 fatcat:eopsxnlglzfaxat35o3hmtplze

A Privacy-Preserving Trajectory Publishing Method Based on Multi-Dimensional Sub-Trajectory Similarities

Hua Shen, Yu Wang, Mingwu Zhang
2023 Sensors  
Finally, our approach generates k−1 dummy trajectories that are indistinguishable from real trajectories, effectively achieving k-anonymity for a given trajectory.  ...  privacy-preserved trajectory publishing.  ...  [42] primarily constrained the geographic location of trajectories and introduced a privacy-preserving method for measuring distance-based trajectory similarity.  ... 
doi:10.3390/s23249652 pmid:38139504 pmcid:PMC10747896 fatcat:54sosv7ac5e7jhurdu6t6kco6i

Route Extrapolation for Source and Destination Camouflage in Wireless Ad Hoc Networks [article]

M. Razvi Doomun, K.M. Sunjiv Soyjaudah
2012 arXiv   pre-print
In wireless ad hoc networks, protecting source and destination nodes location privacy is a challenging task due to malicious traffic analysis and privacy attacks.  ...  We demonstrate that the privacy level achieved with EXTROUT is higher and more effective against a global attacker, when compared to fake source destination nodes privacy scheme.  ...  Compared to other techniques in the literature, the EXTROUT preserves the privacy for uplink and downlink traffic of nodes. A.  ... 
arXiv:1208.5569v1 fatcat:ekaqwsiokrc5jcyzuced4hb7he

Optimal Privacy-Preserving Probabilistic Routing for Wireless Networks

Jing Yang Koh, Derek Leong, Gareth W. Peters, Ido Nevat, Wai-Choong Wong
2017 IEEE Transactions on Information Forensics and Security  
In this paper, we explicitly examine the privacy-utility trade-off problem for wireless networks and develop a novel privacy-preserving routing algorithm called Optimal Privacy Enhancing Routing Algorithm  ...  Privacy-preserving routing protocols in wireless networks frequently utilize additional artificial traffic to hide the source-destination identities of the communicating pair.  ...  Therefore, we use the dummy traffic approach to provide privacy by lowering the adversary's detection rates (formally defined in Section III) in a wireless network.  ... 
doi:10.1109/tifs.2017.2698424 fatcat:63njeikpevesxlrus6ce2yfepq

Evolution of Privacy Preservation Models in Location-Based Services

A B Manju, Sumathy Subramanian
2020 Advances in Science, Technology and Engineering Systems  
This work presents a detailed study on the evolution of existing privacy preservation models need to preserve privacy, and the opportunities to integrate fog computing services into privacy architectures  ...  The study proposes a fog integrated privacy preservation model exploring the benefits and open research issues in traditional models and recent integrated fog models.  ...  in the privacy preservation approaches.  ... 
doi:10.25046/aj050311 fatcat:4g4bxgpl7vbapcxcpofwkgt2ce

Locate Me: A Privacy Preserving Pseudonym Generation of Location Proof Updates Through Co-Located Devices

Deepan E
2017 International Journal for Research in Applied Science and Engineering Technology  
Extensive experimental results show that our proposed scheme (LOCATEme), besides providing location proofs effectively, can efficiently preserve the source location privacy.  ...  To address this issue, we propose a far better system, more efficient than A Privacy-Preserving LocAtion proof Updating System(APPLAUS) in which co-located Bluetooth enabled mobile devices mutually generate  ...  a position is within a given circular area in a privacy-preserving way.  ... 
doi:10.22214/ijraset.2017.2075 fatcat:45gjfkhtm5afbdr5v6sgn4yrqy

Protecting Location Privacy for Crowd Workers in Spatial Crowdsourcing Using a Novel Dummy-based Mechanism

Raed Alharthi, Esam Aloufi, Ibrahim Alrashdi, Ali Alqazzaz, Mohamed A. Zohdy, Julian Rrushi
2020 IEEE Access  
This paper provides a novel framework called Dummies' Centroid (DCentroid), which aims at preserving location privacy for crowd workers in SC.  ...  The framework adapts an anonymous communication technique using a dummy based approach to generate dummy locations, i.e. decoy locations, and send their centroid points (pseudolocations) to service providers  ...  DCentroid: LOCATION PRIVACY PROTECTION TECHNIQUE DCentroid is a new introduced approach that is motivated by the dummy based technique to achieve location privacy for crowd workers in SC [31] .  ... 
doi:10.1109/access.2020.3004470 fatcat:7a32av66hbasxc6ioakd6o6xra

In-Network Trajectory Privacy Preservation

Mingming Guo, Xinyu Jin, Niki Pissinou, Sebastian Zanlongo, Bogdan Carbunar, S. S. Iyengar
2015 ACM Computing Surveys  
In this article, we survey existing trajectory privacy work in the context of wireless sensor networks, location-based services, and geosocial networks.  ...  Furthermore, we discuss future trajectory privacy research challenges and directions.  ...  Dummy Traffic Injection. Dummy traffic injection is another widely used technique to preserve source location privacy in sWSNs.  ... 
doi:10.1145/2818183 fatcat:hgc33wgqlrdnpll6bodpe7y5mm

Privacy Enhancing Technologies for Wireless Sensor Networks [chapter]

Chi-Yin Chow, Wenjian Xu, Tian He
2013 Signals and Communication Technology  
The privacy-preserving techniques for the system privacy hide the information about the location of source nodes and the location of receiver nodes.  ...  Due to these limitations, it is very challenging to design secure privacy-preserving techniques for WSNs.  ...  Privacy-preserving techniques designed for protecting data source and base station privacy may prevent such malicious attacks.  ... 
doi:10.1007/978-3-642-40009-4_18 fatcat:acvd2cqeojazrk74x7jllyvpj4

Location Privacy Protection in Contention Based Forwarding for VANETs

Qing Yang, Alvin Lim, Xiaojun Ruan, Xiao Qin
2010 2010 IEEE Global Telecommunications Conference GLOBECOM 2010  
To address this issue, we proposed a dummy-based location privacy protection (DBLPP) routing protocol, in which routing decision is made based upon the dummy distance to the destination (DOD), instead  ...  In this scheme, users' true locations and identification information are preserved, so the user's location privacy is protected.  ...  To further preserve the location privacies of those nodes involved in routing, we propose a dummy-based location privacy protection (DBLPP) protocol.  ... 
doi:10.1109/glocom.2010.5684166 dblp:conf/globecom/YangLRQ10 fatcat:5wu2hqzfbrglrnauspu3vao7yy
« Previous Showing results 1 — 15 out of 4,568 results