Robust encryption algorithm based SHT in wireless sensor networks
Title | Robust encryption algorithm based SHT in wireless sensor networks |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Umam, E.G., Sriramb, E.G. |
Conference Name | Information Communication and Embedded Systems (ICICES), 2014 International Conference on |
Date Published | Feb |
Keywords | anonymity, communication overhead, Computer hacking, consecutive hypothesis testing, Correlation, cryptography, device network obscurity, Encryption, hypothesis testing, interval indistinguishability, location privacy, machine load problem, network traffic, nuisance data victimization sturdy cryptography algorithmic rule, nuisance parameters and committal to writing theory, privacy, robust encryption algorithm, SHT, sturdy cryptography algorithmic rule, supply location, telecommunication traffic, Testing, wireless device network, Wireless sensor networks |
Abstract | In bound applications, the locations of events reportable by a device network have to be compelled to stay anonymous. That is, unauthorized observers should be unable to notice the origin of such events by analyzing the network traffic. The authors analyze 2 forms of downsides: Communication overhead and machine load problem. During this paper, the authors give a new framework for modeling, analyzing, and evaluating obscurity in device networks. The novelty of the proposed framework is twofold: initial, it introduces the notion of "interval indistinguishability" and provides a quantitative live to model obscurity in wireless device networks; second, it maps supply obscurity to the applied mathematics downside the authors showed that the present approaches for coming up with statistically anonymous systems introduce correlation in real intervals whereas faux area unit unrelated. The authors show however mapping supply obscurity to consecutive hypothesis testing with nuisance Parameters ends up in changing the matter of exposing non-public supply data into checking out associate degree applicable knowledge transformation that removes or minimize the impact of the nuisance data victimization sturdy cryptography algorithmic rule. By doing therefore, the authors remodeled the matter of analyzing real valued sample points to binary codes, that opens the door for committal to writing theory to be incorporated into the study of anonymous networks. In existing work, unable to notice unauthorized observer in network traffic. However this work in the main supported enhances their supply obscurity against correlation check, the most goal of supply location privacy is to cover the existence of real events. |
URL | http://ieeexplore.ieee.org/document/7034145/ |
DOI | 10.1109/ICICES.2014.7034145 |
Citation Key | 7034145 |
- network traffic
- wireless sensor networks
- wireless device network
- testing
- telecommunication traffic
- supply location
- sturdy cryptography algorithmic rule
- SHT
- robust encryption algorithm
- privacy
- nuisance parameters and committal to writing theory
- nuisance data victimization sturdy cryptography algorithmic rule
- anonymity
- machine load problem
- location privacy
- interval indistinguishability
- Hypothesis testing
- encryption
- device network obscurity
- Cryptography
- Correlation
- consecutive hypothesis testing
- Computer hacking
- communication overhead