Constrained Random Routing Mechanism for Source Privacy Protection in WSNs
نویسندگان
چکیده
منابع مشابه
Preserving Source Location Privacy for Energy Harvesting WSNs
Fog (From cOre to edGe) computing employs a huge number of wireless embedded devices to enable end users with anywhere-anytime-to-anything connectivity. Due to their operating nature, wireless sensor nodes often work unattended, and hence are exposed to a variety of attacks. Preserving source-location privacy plays a key role in some wireless sensor network (WSN) applications. In this paper, a ...
متن کاملPrivacy Protection Mechanism for Indoor Positioning Systems
Usage of location based services in indoor environments has grown as the popularity of smart devices has been extended. Location Based Services can be generally classified in Indoor LBS and Outdoor LBS. The most common and well-known Outdoor LBS mechanism is the Global Positioning System (GPS) because of its high coverage and accuracy in outdoor environments. However, GPS is not used for Indoor...
متن کاملAll-Direction Random Routing for Source-Location Privacy Protecting against Parasitic Sensor Networks
Wireless sensor networks are deployed to monitor the surrounding physical environments and they also act as the physical environments of parasitic sensor networks, whose purpose is analyzing the contextual privacy and obtaining valuable information from the original wireless sensor networks. Recently, contextual privacy issues associated with wireless communication in open spaces have not been ...
متن کاملSource-Location Privacy Protection in Wireless Sensor Networks using AZR Routing
In environments where sensor networks are deployed to monitor certain events or sensitive objects, attackers may deduce the approximated location of monitored objects by hop-by-hop backtracking the traffic. This paper proposes a routing technique to provide adequate source-location privacy with balanced energy consumption, the Phantom Routing based on Annular Zone (AZR). With this technique, th...
متن کاملPrivacy Protection using Random Combination of Fingerprints
The aim of this paper is to protect the information in database by combining two different fingerprint images into a new identity. This is done in two phases a) Enrollment and b) Authentication. In Enrollment phase the minutiae position from one finger and the orientation position from another finger are extracted. These two images are being combined into a new template. It is done by using a s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2017
ISSN: 2169-3536
DOI: 10.1109/access.2017.2752179