Constrained Random Routing Mechanism for Source Privacy Protection in WSNs

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Preserving Source Location Privacy for Energy Harvesting WSNs

Fog (From cOre to edGe) computing employs a huge number of wireless embedded devices to enable end users with anywhere-anytime-to-anything connectivity. Due to their operating nature, wireless sensor nodes often work unattended, and hence are exposed to a variety of attacks. Preserving source-location privacy plays a key role in some wireless sensor network (WSN) applications. In this paper, a ...

متن کامل

Privacy Protection Mechanism for Indoor Positioning Systems

Usage of location based services in indoor environments has grown as the popularity of smart devices has been extended. Location Based Services can be generally classified in Indoor LBS and Outdoor LBS. The most common and well-known Outdoor LBS mechanism is the Global Positioning System (GPS) because of its high coverage and accuracy in outdoor environments. However, GPS is not used for Indoor...

متن کامل

All-Direction Random Routing for Source-Location Privacy Protecting against Parasitic Sensor Networks

Wireless sensor networks are deployed to monitor the surrounding physical environments and they also act as the physical environments of parasitic sensor networks, whose purpose is analyzing the contextual privacy and obtaining valuable information from the original wireless sensor networks. Recently, contextual privacy issues associated with wireless communication in open spaces have not been ...

متن کامل

Source-Location Privacy Protection in Wireless Sensor Networks using AZR Routing

In environments where sensor networks are deployed to monitor certain events or sensitive objects, attackers may deduce the approximated location of monitored objects by hop-by-hop backtracking the traffic. This paper proposes a routing technique to provide adequate source-location privacy with balanced energy consumption, the Phantom Routing based on Annular Zone (AZR). With this technique, th...

متن کامل

Privacy Protection using Random Combination of Fingerprints

The aim of this paper is to protect the information in database by combining two different fingerprint images into a new identity. This is done in two phases a) Enrollment and b) Authentication. In Enrollment phase the minutiae position from one finger and the orientation position from another finger are extracted. These two images are being combined into a new template. It is done by using a s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2017

ISSN: 2169-3536

DOI: 10.1109/access.2017.2752179