ABSTRACT
K -anonymity has been used to protect location
privacy for location monitoring services in wireless sensor networks (WSNs),
where sensor nodes work together to report k -anonymized aggregate locations to
a server. Each k -anonymized aggregate location is a cloaked area that contains
at least k persons. However, we identify an attack model to show that
overlapping aggregate locations still pose privacy risks because an adversary
can infer some overlapping areas with less than k persons that violates the k -anonymity
privacy requirement. In this paper, we propose a reciprocal protocol for
location privacy (REAL) in WSNs. In REAL, sensor nodes are required to
autonomously organize their sensing areas into a set of non-overlapping and
highly accurate k -anonymized aggregate locations. To confront the three key
challenges in REAL, namely, self-organization, reciprocity property and high
accuracy, we design a state transition process, a locking mechanism and a time
delay mechanism, respectively. We compare the performance of REAL with current
protocols through simulated experiments. The results show that REAL protects
location privacy, provides more accurate query answers, and reduces
communication and computational costs.
AIM
The aim of
this paper in REAL, sensor nodes are required to autonomously
organize their sensing areas into a set of non-overlapping and highly accurate
k -anonymized aggregate locations
SCOPE
The
scope of this paper is to show that REAL protects location privacy, provides
more accurate query answers, and reduces communication and computational costs.
EXISTING SYSTEM
With
the advancement of sensor and wireless communication technologies, location
monitor- ing applications have been developed for surveillance and location
systems. Basically, location monitoring applications use sensors to gather
personal locations and provide location-based services. However, with an
untrustworthy server, an adversary may abuse its received location information
to infer personal sensitive information. As a result, monitor- ing personal
locations poses privacy threats to the monitored individuals
DISADVANTAGES
- self-organization
- reciprocity property
- high accuracy
PROPOSED SYSTEM
In
this paper, we propose a reciprocal protocol for location privacy (REAL) in
WSNs. In REAL, sensor nodes are required to autonomously organize their sensing
areas into a set of non-overlapping and highly accurate k -anonymized aggregate
locations. To confront the three key challenges in REAL, namely,
self-organization, reciprocity property and high accuracy, we design a state
transition process, a locking mechanism and a time delay mechanism,
respectively.
ADVANTAGES
- The state transition process to accomplish self-organization among sensor nodes
- The locking mechanism to guarantee the reciprocity property.
- The delay mechanism to improve the accuracy of aggregate locations.
SYSTEM ARCHITECTURE
SYSTEM CONFIGURATION
HARDWARE REQUIREMENTS:-
· Processor - Pentium –III
·
Speed - 1.1 Ghz
·
RAM - 256 MB(min)
·
Hard
Disk - 20 GB
·
Floppy
Drive - 1.44 MB
·
Key
Board - Standard Windows Keyboard
·
Mouse - Two or Three Button Mouse
·
Monitor -
SVGA
SOFTWARE REQUIREMENTS:-
·
Operating
System : Android OS
·
Front
End : JAVA
·
Database
: Sqlite
·
Tool :Eclipse
REFERENCE:
Jia-Dong Zhang, and Chi-Yin Chow, “REAL:
A RECIPROCAL PROTOCOL FOR LOCATION PRIVACY IN WIRELESS SENSOR NETWORKS” IEEE
Transactions on Dependable and Secure
Computing, Year: 2015, Volume: 12, Issue: 4
No comments:
Post a Comment