Visible to the public Robust encryption algorithm based SHT in wireless sensor networks

TitleRobust encryption algorithm based SHT in wireless sensor networks
Publication TypeConference Paper
Year of Publication2014
AuthorsUmam, E.G., Sriramb, E.G.
Conference NameInformation Communication and Embedded Systems (ICICES), 2014 International Conference on
Date PublishedFeb
Keywordsanonymity, communication overhead, Computer hacking, consecutive hypothesis testing, Correlation, cryptography, device network obscurity, Encryption, hypothesis testing, interval indistinguishability, location privacy, machine load problem, network traffic, nuisance data victimization sturdy cryptography algorithmic rule, nuisance parameters and committal to writing theory, privacy, robust encryption algorithm, SHT, sturdy cryptography algorithmic rule, supply location, telecommunication traffic, Testing, wireless device network, Wireless sensor networks
Abstract

In bound applications, the locations of events reportable by a device network have to be compelled to stay anonymous. That is, unauthorized observers should be unable to notice the origin of such events by analyzing the network traffic. The authors analyze 2 forms of downsides: Communication overhead and machine load problem. During this paper, the authors give a new framework for modeling, analyzing, and evaluating obscurity in device networks. The novelty of the proposed framework is twofold: initial, it introduces the notion of "interval indistinguishability" and provides a quantitative live to model obscurity in wireless device networks; second, it maps supply obscurity to the applied mathematics downside the authors showed that the present approaches for coming up with statistically anonymous systems introduce correlation in real intervals whereas faux area unit unrelated. The authors show however mapping supply obscurity to consecutive hypothesis testing with nuisance Parameters ends up in changing the matter of exposing non-public supply data into checking out associate degree applicable knowledge transformation that removes or minimize the impact of the nuisance data victimization sturdy cryptography algorithmic rule. By doing therefore, the authors remodeled the matter of analyzing real valued sample points to binary codes, that opens the door for committal to writing theory to be incorporated into the study of anonymous networks. In existing work, unable to notice unauthorized observer in network traffic. However this work in the main supported enhances their supply obscurity against correlation check, the most goal of supply location privacy is to cover the existence of real events.

URLhttp://ieeexplore.ieee.org/document/7034145/
DOI10.1109/ICICES.2014.7034145
Citation Key7034145