Dissertation/Thesis Abstract

Location privacy in wireless sensor network using reciprocal protocol
by Mohan, Rakshitha, M.S., California State University, Long Beach, 2016, 58; 10118890
Abstract (Summary)

Location privacy has been one of the greatest threats in wireless systems. The utilization of k-anonymity in Wireless Sensor Networks (WSNs) protects the location privacy. This characteristic feature enables the server to receive aggregate k-anonymized locations of internally connected sensor nodes. These k-anonymized locations are comprised of, a minimum of k persons. Nevertheless, an intruder model is used to high point the readiness of privacy risks in overlapping aggregate locations because an adversary can deduce the overlapping areas contained in an area with less than k persons whose requirement violates k-anonymity privacy. Hence, a reciprocal protocol (REAL) is used for establishing location privacy in Wireless Sensor Networks (WSNs).

The sensor nodes organize a group of non-overlapping areas and k-anonymized locations into sensing areas. To overcome the privacy threats in REAL, a process state transition is designed with a time delay mechanism that provides accuracy of the messages received and a locking mechanism is designed to enhance reciprocity property. The generation of an error-free query reply and securing location privacy and decreasing computational and communication costs is achieved by the experimental analysis of the REAL protocol .

Indexing (document details)
Advisor: Chassiakos, Anastasios
Commitee: Ary, James, Tran, Boi
School: California State University, Long Beach
Department: Electrical Engineering
School Location: United States -- California
Source: MAI 55/05M(E), Masters Abstracts International
Subjects: Electrical engineering
Publication Number: 10118890
ISBN: 978-1-339-80207-7
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy