Download now Free registration required
It monitors personal locations with a potentially untrusted server poses privacy threats. The two algorithms, namely, resource-aware and quality-aware algorithms that aim to provide high quality location monitoring services for system users. Both algorithms established k-anonymity privacy concept to enable trusted sensor nodes to provide the aggregate location information. The resource-aware algorithm aims to minimize communication and computational cost, while the quality-aware algorithm aims to maximize the accuracy of the aggregate locations. These two algorithms are used in adhoc networks rather than infrastructure. It uses a spatial histogram approach that estimates the distribution of the monitored persons based on the gathered aggregate location information. It guarantees the location privacy of the monitored persons.
- Format: PDF
- Size: 237.36 KB