Абстрактный

Secure Communications in Wireless Sensor Network by Using Backbone Flooding

Dinesh Kumar.V.S, Gopinathan B

In device network several protocols square measure exploitation for privacy and preservation of knowledge against aggressor. Such connected data will be manipulate by associate person to derive sensitive data like the locations of observe objects and knowledge receivers within the field. Attacks on these parts will considerably undermine any network application. The listener, is realistic and may defeat these existing technique. It 1st formalizes the placement privacy problems in device networks beneath this sturdy person model and computes a bound on the communication overhead required for achieving a given level of location privacy. It proposes 2 techniques to produce location privacy to senderlocation privacy—periodic assortment and sender simulation—and 2 techniques to produce location privacy to Receiver-location privacy—Receiver simulation and backbone flooding. These techniques give trade-offs between privacy, communication price, and latency. Use of those propose techniques, it improves location privacy for each sender and receiver locations. 

Отказ от ответственности: Этот реферат был переведен с помощью инструментов искусственного интеллекта и еще не прошел проверку или верификацию

Индексировано в

Академические ключи
ResearchBible
CiteFactor
Космос ЕСЛИ
РефСик
Университет Хамдарда
Всемирный каталог научных журналов
научный руководитель
Импакт-фактор Международного инновационного журнала (IIJIF)
Международный институт организованных исследований (I2OR)
Cosmos

Посмотреть больше