Defend the Locations in WSN from Snoopers

Provided by: International Journal of Engineering Sciences & Research Technology (IJESRT)
Topic: Security
Format: PDF
In detector network several protocols are exploitation for privacy and preservation of knowledge against aggressor. Such connected data will be manipulate by associate mortal to derive sensitive data like the locations of observe objects and information receivers within the field. Attacks on these elements will considerably undermine any network application. The snooper is realistic and may defeat these existing technique. It initial formalizes the situation privacy problems in detector networks underneath this robust mortal model and computes a bound on the communication overhead required for achieving a given level of location privacy.

Find By Topic