Abstracto

Secure Communications in Wireless Sensor Network by Using Backbone Flooding

Dinesh Kumar.V.S, Gopinathan B

In device network several protocols square measure exploitation for privacy and preservation of knowledge against aggressor. Such connected data will be manipulate by associate person to derive sensitive data like the locations of observe objects and knowledge receivers within the field. Attacks on these parts will considerably undermine any network application. The listener, is realistic and may defeat these existing technique. It 1st formalizes the placement privacy problems in device networks beneath this sturdy person model and computes a bound on the communication overhead required for achieving a given level of location privacy. It proposes 2 techniques to produce location privacy to senderlocation privacy—periodic assortment and sender simulation—and 2 techniques to produce location privacy to Receiver-location privacy—Receiver simulation and backbone flooding. These techniques give trade-offs between privacy, communication price, and latency. Use of those propose techniques, it improves location privacy for each sender and receiver locations. 

Descargo de responsabilidad: este resumen se tradujo utilizando herramientas de inteligencia artificial y aún no ha sido revisado ni verificado.

Indexado en

Academic Keys
ResearchBible
CiteFactor
Cosmos SI
Búsqueda de referencia
Universidad Hamdard
Catálogo mundial de revistas científicas
director académico
Factor de impacto de revistas innovadoras internacionales (IIJIF)
Instituto Internacional de Investigación Organizada (I2OR)
Cosmos

Ver más