DocumentCode :
261260
Title :
Robust encryption algorithm based SHT in wireless sensor networks
Author :
Umam, E.G. ; Sriramb, E.G.
Author_Institution :
Dept. of ECE, Parisutham Inst. of Technol. & Sci., Thanjavur, India
fYear :
2014
fDate :
27-28 Feb. 2014
Firstpage :
1
Lastpage :
5
Abstract :
In bound applications, the locations of events reportable by a device network have to be compelled to stay anonymous. That is, unauthorized observers should be unable to notice the origin of such events by analyzing the network traffic. The authors analyze 2 forms of downsides: Communication overhead and machine load problem. During this paper, the authors give a new framework for modeling, analyzing, and evaluating obscurity in device networks. The novelty of the proposed framework is twofold: initial, it introduces the notion of "interval indistinguishability" and provides a quantitative live to model obscurity in wireless device networks; second, it maps supply obscurity to the applied mathematics downside the authors showed that the present approaches for coming up with statistically anonymous systems introduce correlation in real intervals whereas faux area unit unrelated. The authors show however mapping supply obscurity to consecutive hypothesis testing with nuisance Parameters ends up in changing the matter of exposing non-public supply data into checking out associate degree applicable knowledge transformation that removes or minimize the impact of the nuisance data victimization sturdy cryptography algorithmic rule. By doing therefore, the authors remodeled the matter of analyzing real valued sample points to binary codes, that opens the door for committal to writing theory to be incorporated into the study of anonymous networks. In existing work, unable to notice unauthorized observer in network traffic. However this work in the main supported enhances their supply obscurity against correlation check, the most goal of supply location privacy is to cover the existence of real events.
Keywords :
cryptography; wireless sensor networks; SHT; communication overhead; device network obscurity; hypothesis testing; interval indistinguishability; location privacy; machine load problem; network traffic; nuisance data victimization sturdy cryptography algorithmic rule; robust encryption algorithm; wireless device network; wireless sensor networks; Computer hacking; Correlation; Encryption; Privacy; Telecommunication traffic; Testing; Wireless sensor networks; anonymity; consecutive hypothesis testing; nuisance parameters and committal to writing theory; privacy; sturdy cryptography algorithmic rule; supply location;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Communication and Embedded Systems (ICICES), 2014 International Conference on
Conference_Location :
Chennai
Print_ISBN :
978-1-4799-3835-3
Type :
conf
DOI :
10.1109/ICICES.2014.7034145
Filename :
7034145
Link To Document :
بازگشت