Securing Privacy Assistance for Protecting Location Based Queries Using Enhanced Symmetric Key

نویسنده

  • M. Indhumathi
چکیده

-While satisfying security requirements is crucial for secure group communications in wireless systems, mobile group applications often have application-specific performance requirements in terms of timeliness, reliability, and system reconfigurability. Often there exists a tradeoff between security versus performance goals since security protocols may introduce undue computational and network overheads which may prevent performance goals from being met. Many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such contextual information can be exploited by an adversary to derive sensitive information such as the locations of monitored objects and data sinks in the field. Attacks on these components can significantly undermine any network application. The cluster head election is invoked on-demand, and is aimed to reduce the computation and communication costs. A large variety of approaches for ad hoc clustering have been developed by researchers which focus on different performance metrics. This paper presents a survey of different clustering schemes. Key Word: MANETS, location privacy, Clustering, symmetric key, Key Management Protocol.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Tree-Based Multi-dimensional Range Search on Encrypted Data with Enhanced Privacy

With searchable encryption, a data user is able to perform meaningful search on encrypted data stored in the public cloud without revealing data privacy. Besides handling simple queries (e.g., keyword queries), complex search functions, such as multi-dimensional (conjunctive) range queries, have also been studied in several approaches to support the search of multi-dimensional data. However, cu...

متن کامل

A Method for Protecting Access Pattern in Outsourced Data

Protecting the information access pattern, which means preventing the disclosure of data and structural details of databases, is very important in working with data, especially in the cases of outsourced databases and databases with Internet access. The protection of the information access pattern indicates that mere data confidentiality is not sufficient and the privacy of queries and accesses...

متن کامل

Protecting Privacy and Securing the Gathering of Location Proofs - The Secure Location Verification Proof Gathering Protocol

As wireless networks become increasingly ubiquitous, the demand for a method of locating a device has increased dramatically. Location Based Services are now commonplace but there are few methods of verifying or guaranteeing a location provided by a user without some specialised hardware, especially in larger scale networks. We propose a system for the verification of location claims, using pro...

متن کامل

E-EDPPS: Enhanced an Energy-efficient Data Privacy Protection Scheme for Wireless Sensor Networks

In this paper, we investigate the facts of ensuring secure sensed data in a balanced energy network backbone, and propose Enhanced an Energyefficient Data Privacy Protection Scheme for wireless sensor networks (E-EDPPS). In wireless sensor networks (WSNs), sensors may be deployed in an unpredictable environment where a limited energy of the sensor nodes has led to the development of EEDPPS. It ...

متن کامل

Using Uncertainty to Provide Privacy-Preserving and High-Quality Location-Based Services

Location-based services, such as finding the nearest gas station, require users to supply their location information. However, a user’s location can be tracked without her consent or knowledge. Lowering the spatial and temporal resolution of location data sent to the server has been proposed as a solution. Although this technique is effective in protecting privacy, it may be overkill and the qu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015