Anonymization Algorithms For Wireless Adhoc Networks

It monitors personal locations with a potentially untrusted server poses privacy threats. The two algorithms, namely, resource-aware and quality-aware algorithms that aim to provide high quality location monitoring services for system users. Both algorithms established k-anonymity privacy concept to enable trusted sensor nodes to provide the aggregate location information. The resource-aware algorithm aims to minimize communication and computational cost, while the quality-aware algorithm aims to maximize the accuracy of the aggregate locations. These two algorithms are used in adhoc networks rather than infrastructure. It uses a spatial histogram approach that estimates the distribution of the monitored persons based on the gathered aggregate location information. It guarantees the location privacy of the monitored persons.

Provided by: International Journal of Communications and Engineering Topic: Mobility Date Added: Mar 2012 Format: PDF

Find By Topic