Providing Location Privacy Using Fake Sources in Wireless Sensor Networks
Wireless Sensor Networks (WSNs) consist of low-cost, resource-constrained sensor nodes and a designated node called a sink which collects data from the sensor nodes. A WSN can be used in numerous applications such as subject tracking and monitoring, where it is often desirable to keep the location o...
Saved in:
Published in | International Conference on Application of Information and Communication Technologies pp. 1 - 4 |
---|---|
Main Authors | , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.10.2018
|
Subjects | |
Online Access | Get full text |
ISSN | 2472-8586 |
DOI | 10.1109/ICAICT.2018.8747041 |
Cover
Loading…
Abstract | Wireless Sensor Networks (WSNs) consist of low-cost, resource-constrained sensor nodes and a designated node called a sink which collects data from the sensor nodes. A WSN can be used in numerous applications such as subject tracking and monitoring, where it is often desirable to keep the location of the subject private. Without location privacy protection, an adversary can locate the subject. In this paper, we propose an algorithm that tries to keep the subject location private from a global adversary, which can see the entire network traffic, in an energy efficient way. |
---|---|
AbstractList | Wireless Sensor Networks (WSNs) consist of low-cost, resource-constrained sensor nodes and a designated node called a sink which collects data from the sensor nodes. A WSN can be used in numerous applications such as subject tracking and monitoring, where it is often desirable to keep the location of the subject private. Without location privacy protection, an adversary can locate the subject. In this paper, we propose an algorithm that tries to keep the subject location private from a global adversary, which can see the entire network traffic, in an energy efficient way. |
Author | Saginbekov, Sain Adilova, Anar Adilbekov, Ulugbek |
Author_xml | – sequence: 1 givenname: Ulugbek surname: Adilbekov fullname: Adilbekov, Ulugbek organization: Computer Science Department, Nazarbayev University, Astana, Kazakhstan – sequence: 2 givenname: Anar surname: Adilova fullname: Adilova, Anar organization: Computer Science Department, Nazarbayev University, Astana, Kazakhstan – sequence: 3 givenname: Sain surname: Saginbekov fullname: Saginbekov, Sain organization: Computer Science Department, Nazarbayev University, Astana, Kazakhstan |
BookMark | eNotj11LwzAYhaMoOGd_wW7yB1rz0ebjUopzhaKDVbwcafpW4mYiSZ3s3ztx5-bAc3F4zi268sEDQgtKCkqJvm_qh6buCkaoKpQsJSnpBcq0VLTiSohSCHmJZqyULFeVEjcoS-mDEEIFFVyxGWrWMRzc4Pw7boM1kwser6M7GHvEr-kPL80O8CZ8RwsJO4_fXIQ9pIQ34FOI-BmmnxB36Q5dj2afIDv3HHXLx65e5e3L00mzzZ0mUz7YkSttNGeSK8OsHE_RetDjSIBVpurBmN7qynDBte7Lqlc9UMZGbo1kwOdo8T_rAGD7Fd2nicft-Tv_BTpjULs |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/ICAICT.2018.8747041 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Computer Science |
EISBN | 9781538664667 9781538664681 1538664666 1538664682 |
EISSN | 2472-8586 |
EndPage | 4 |
ExternalDocumentID | 8747041 |
Genre | orig-research |
GroupedDBID | 6IE 6IF 6IK 6IL 6IN AAJGR AAWTH ABLEC ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK IPLJI OCL RIE RIL RNS |
ID | FETCH-LOGICAL-i90t-dcf389a932738a2c7ffff99d9ff0e25a5beaabc95a36399b45b8be122f3ca72e3 |
IEDL.DBID | RIE |
IngestDate | Wed Aug 27 05:56:09 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i90t-dcf389a932738a2c7ffff99d9ff0e25a5beaabc95a36399b45b8be122f3ca72e3 |
PageCount | 4 |
ParticipantIDs | ieee_primary_8747041 |
PublicationCentury | 2000 |
PublicationDate | 2018-Oct. |
PublicationDateYYYYMMDD | 2018-10-01 |
PublicationDate_xml | – month: 10 year: 2018 text: 2018-Oct. |
PublicationDecade | 2010 |
PublicationTitle | International Conference on Application of Information and Communication Technologies |
PublicationTitleAbbrev | ICAICT |
PublicationYear | 2018 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0001616382 |
Score | 1.6693678 |
Snippet | Wireless Sensor Networks (WSNs) consist of low-cost, resource-constrained sensor nodes and a designated node called a sink which collects data from the sensor... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 1 |
SubjectTerms | Computer science Context Privacy Global Adversary Monitoring Position measurement Privacy Routing Routing protocols Source Location Privacy Wireless sensor networks |
Title | Providing Location Privacy Using Fake Sources in Wireless Sensor Networks |
URI | https://ieeexplore.ieee.org/document/8747041 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PT8IwGG2Qk15UwPg7PXh0Y7Tr1h4NkYARQgIm3EjbfUsIZjMwTPSvt-0GqPHgTs2S_Wqzfq-v730fQncGlDORxtLTDLgXJjLypKLUoypMTbhICHEu_uEo6r-ETzM2q6H7nRcGAJz4DHzbdHv5Sa43liprc4N9A-tSPzALt9KrtedTIossSJVYqBOI9qD7MOhOrXqL-9WVP0qouAjSO0bD7bNL4cjS3xTK15-_0jL-9-VOUGvv1cPjXRQ6RTXIGuh4W6wBV_9uAx19yzzYRIOxc-CZNn7OS9bO3GXxLvUHdioC3JNLwBNH7a_xIsNWJvtqpkU8MQvffIVHpX583ULT3uO02_eqqgreQgSFl-jUYBRpYFtMuSQ6Ts0hRCLSNADCJFMgpdKCSWrBiwqZ4go6hKRUy5gAPUP1LM_gHOFYRkSqTmQnhtB8OleEcaGYJVEAqLhATdtN87cyb8a86qHLv09foUM7VKVQ7hrVi9UGbkzAL9StG-kvoserWg |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PT8IwGP1C9KBeUMD42x48urF167YeDZGAAiFhJtxI23UJwWwGhon-9bbdADUe3KlZsnZrs763b-99H8CdIuWEpiGzBJGR5ScssBj3PMvjfqrgIsHYuPiHo6D34j9NybQG91svjJTSiM-krZvmX36Si7UOlbUjxX0d7VLfV7hP3NKttYuoBJpb4Cq1kOvQdr_z0O_EWr8V2dW1P4qoGAzp1mG4Gb2UjizsdcFt8fkrMeN_b-8YWju3HhpvcegEajJrQH1TrgFVb28Djr7lHmxCf2w8eKqNBnkZt1O9zN-Z-EBGR4C6bCHRxAT3V2ieIS2UfVUbI5qoT998iUalgnzVgrj7GHd6VlVXwZpTp7ASkSqWwhRxC72IYRGm6qA0oWnqSEwY4ZIxLihhnqYv3Cc84tLFOPUEC7H0TmEvyzN5BihkAWbcDfTW4KtHjzgmEeVEh1Gk9Og5NPU0zd7KzBmzaoYu_j59Cwe9eDiYDfqj50s41MtWyuauYK9YruW1gv-C35hV_wLCVq6j |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=International+Conference+on+Application+of+Information+and+Communication+Technologies&rft.atitle=Providing+Location+Privacy+Using+Fake+Sources+in+Wireless+Sensor+Networks&rft.au=Adilbekov%2C+Ulugbek&rft.au=Adilova%2C+Anar&rft.au=Saginbekov%2C+Sain&rft.date=2018-10-01&rft.pub=IEEE&rft.eissn=2472-8586&rft.spage=1&rft.epage=4&rft_id=info:doi/10.1109%2FICAICT.2018.8747041&rft.externalDocID=8747041 |