SlideShare a Scribd company logo
1 of 1
Download to read offline
TOWARD A STATISTICAL FRAMEWORK FOR SOURCE
ANONYMITY IN SENSOR NETWORKS
ABSTRACT:
In certain applications, the locations of events reported by a sensor network need to remain
anonymous. That is, unauthorized observers must be unable to detect the origin of such events by
analyzing the network traffic. Known as the source anonymity problem, this problem has
emerged as an important topic in the security of wireless sensor networks, with variety of
techniques based on different adversarial assumptions being proposed.
In this work, we present a new framework for modeling, analyzing, and evaluating anonymity in
sensor networks. The novelty of the proposed framework is twofold: first, it introduces the
notion of "interval indistinguishability” and provides a quantitative measure to model anonymity
in wireless sensor networks; second, it maps source anonymity to the statistical problem of
binary hypothesis testing with nuisance parameters. We then analyze existing solutions for
designing anonymous sensor networks using the proposed model.
We show how mapping source anonymity to binary hypothesis testing with nuisance parameters
leads to converting the problem of exposing private source information into searching for an
appropriate data transformation that removes or minimize the effect of the nuisance information.
By doing so, we transform the problem from analyzing real-valued sample points to binary
codes, which opens the door for coding theory to be incorporated into the study of anonymous
sensor networks. Finally, we discuss how existing solutions can be modified to improve their
anonymity.
ECWAY TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE
CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111
VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com

More Related Content

What's hot

Generic technology ieee projects titles
Generic technology ieee projects titlesGeneric technology ieee projects titles
Generic technology ieee projects titlesGeneric Technology
 
Ieee transactions on 2018 network and service management
Ieee transactions on 2018 network and service managementIeee transactions on 2018 network and service management
Ieee transactions on 2018 network and service managementtsysglobalsolutions
 
Location Based System For Mobile Devices Using Rfid
Location Based System For Mobile Devices Using RfidLocation Based System For Mobile Devices Using Rfid
Location Based System For Mobile Devices Using Rfidvein
 
2014 ieee java project titles
2014 ieee java project titles2014 ieee java project titles
2014 ieee java project titlesEcwayt
 
Dotnet distributed processing of probabilistic top-k queries in wireless sen...
Dotnet  distributed processing of probabilistic top-k queries in wireless sen...Dotnet  distributed processing of probabilistic top-k queries in wireless sen...
Dotnet distributed processing of probabilistic top-k queries in wireless sen...Ecway Technologies
 

What's hot (6)

F33022028
F33022028F33022028
F33022028
 
Generic technology ieee projects titles
Generic technology ieee projects titlesGeneric technology ieee projects titles
Generic technology ieee projects titles
 
Ieee transactions on 2018 network and service management
Ieee transactions on 2018 network and service managementIeee transactions on 2018 network and service management
Ieee transactions on 2018 network and service management
 
Location Based System For Mobile Devices Using Rfid
Location Based System For Mobile Devices Using RfidLocation Based System For Mobile Devices Using Rfid
Location Based System For Mobile Devices Using Rfid
 
2014 ieee java project titles
2014 ieee java project titles2014 ieee java project titles
2014 ieee java project titles
 
Dotnet distributed processing of probabilistic top-k queries in wireless sen...
Dotnet  distributed processing of probabilistic top-k queries in wireless sen...Dotnet  distributed processing of probabilistic top-k queries in wireless sen...
Dotnet distributed processing of probabilistic top-k queries in wireless sen...
 

Viewers also liked

IEEE PROJECTS ABSTRACT-A zigbee based wireless sensor network for monitoring ...
IEEE PROJECTS ABSTRACT-A zigbee based wireless sensor network for monitoring ...IEEE PROJECTS ABSTRACT-A zigbee based wireless sensor network for monitoring ...
IEEE PROJECTS ABSTRACT-A zigbee based wireless sensor network for monitoring ...ASHOKKUMAR RAMAR
 
Abstract sensor networks
Abstract sensor networksAbstract sensor networks
Abstract sensor networksGaurav Tiwari
 
Abstract Of The Rfid Project I
Abstract Of The Rfid Project IAbstract Of The Rfid Project I
Abstract Of The Rfid Project IHari
 
Introduction to sensors
Introduction to sensorsIntroduction to sensors
Introduction to sensorsNaveen Kumar
 
Sensors and their applications
Sensors and their applicationsSensors and their applications
Sensors and their applicationsnitigga92
 
History of sensors
History of sensorsHistory of sensors
History of sensorsAbdalla Ali
 

Viewers also liked (9)

IEEE PROJECTS ABSTRACT-A zigbee based wireless sensor network for monitoring ...
IEEE PROJECTS ABSTRACT-A zigbee based wireless sensor network for monitoring ...IEEE PROJECTS ABSTRACT-A zigbee based wireless sensor network for monitoring ...
IEEE PROJECTS ABSTRACT-A zigbee based wireless sensor network for monitoring ...
 
Abstract sensor networks
Abstract sensor networksAbstract sensor networks
Abstract sensor networks
 
Abstract Of The Rfid Project I
Abstract Of The Rfid Project IAbstract Of The Rfid Project I
Abstract Of The Rfid Project I
 
Introduction to sensors
Introduction to sensorsIntroduction to sensors
Introduction to sensors
 
Sensors
SensorsSensors
Sensors
 
Introduction to sensors
Introduction to sensorsIntroduction to sensors
Introduction to sensors
 
Sensors and their applications
Sensors and their applicationsSensors and their applications
Sensors and their applications
 
Sensors
SensorsSensors
Sensors
 
History of sensors
History of sensorsHistory of sensors
History of sensors
 

Similar to Java toward a statistical framework for source anonymity in sensor networks

Toward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksToward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksJPINFOTECH JAYAPRAKASH
 
Toward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksToward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksJPINFOTECH JAYAPRAKASH
 
Toward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksToward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksEcwayt
 
Dotnet toward a statistical framework for source anonymity in sensor networks
Dotnet  toward a statistical framework for source anonymity in sensor networksDotnet  toward a statistical framework for source anonymity in sensor networks
Dotnet toward a statistical framework for source anonymity in sensor networksEcwaytech
 
Toward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksToward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksEcwaytech
 
Robust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networksRobust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networksijdpsjournal
 
BIG DATA ANALYTICS FOR USER-ACTIVITY ANALYSIS AND USER-ANOMALY DETECTION IN...
 BIG DATA ANALYTICS FOR USER-ACTIVITY  ANALYSIS AND USER-ANOMALY DETECTION IN... BIG DATA ANALYTICS FOR USER-ACTIVITY  ANALYSIS AND USER-ANOMALY DETECTION IN...
BIG DATA ANALYTICS FOR USER-ACTIVITY ANALYSIS AND USER-ANOMALY DETECTION IN...Nexgen Technology
 
Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...researchinventy
 
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...IJMER
 
BIG DATA SANITIZATION AND CYBER SITUATIONALAWARENESS: A NETWORK TELESCOPE PE...
 BIG DATA SANITIZATION AND CYBER SITUATIONALAWARENESS: A NETWORK TELESCOPE PE... BIG DATA SANITIZATION AND CYBER SITUATIONALAWARENESS: A NETWORK TELESCOPE PE...
BIG DATA SANITIZATION AND CYBER SITUATIONALAWARENESS: A NETWORK TELESCOPE PE...Nexgen Technology
 
Efficient Data Gathering with Compressive Sensing in Wireless Sensor Networks
Efficient Data Gathering with Compressive Sensing in Wireless Sensor NetworksEfficient Data Gathering with Compressive Sensing in Wireless Sensor Networks
Efficient Data Gathering with Compressive Sensing in Wireless Sensor NetworksIRJET Journal
 
An Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkAn Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkIOSR Journals
 
A Novel Three-Dimensional Adaptive Localization (T-Dial) Algorithm for Wirele...
A Novel Three-Dimensional Adaptive Localization (T-Dial) Algorithm for Wirele...A Novel Three-Dimensional Adaptive Localization (T-Dial) Algorithm for Wirele...
A Novel Three-Dimensional Adaptive Localization (T-Dial) Algorithm for Wirele...iosrjce
 
Web server load prediction and anomaly detection from hypertext transfer prot...
Web server load prediction and anomaly detection from hypertext transfer prot...Web server load prediction and anomaly detection from hypertext transfer prot...
Web server load prediction and anomaly detection from hypertext transfer prot...IJECEIAES
 
Data Prevention from Network Hacking
Data Prevention from Network HackingData Prevention from Network Hacking
Data Prevention from Network Hackingijtsrd
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Adaptive and online one class support vector machine-based outlier detection
Adaptive and online one class support vector machine-based outlier detectionAdaptive and online one class support vector machine-based outlier detection
Adaptive and online one class support vector machine-based outlier detectionNguyen Duong
 
COMPARISON BETWEEN DIVERGENCE MEASURES FOR ANOMALY DETECTION OF MOBILE AGENTS...
COMPARISON BETWEEN DIVERGENCE MEASURES FOR ANOMALY DETECTION OF MOBILE AGENTS...COMPARISON BETWEEN DIVERGENCE MEASURES FOR ANOMALY DETECTION OF MOBILE AGENTS...
COMPARISON BETWEEN DIVERGENCE MEASURES FOR ANOMALY DETECTION OF MOBILE AGENTS...ijwmn
 

Similar to Java toward a statistical framework for source anonymity in sensor networks (20)

Toward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksToward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networks
 
Toward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksToward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networks
 
Toward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksToward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networks
 
Dotnet toward a statistical framework for source anonymity in sensor networks
Dotnet  toward a statistical framework for source anonymity in sensor networksDotnet  toward a statistical framework for source anonymity in sensor networks
Dotnet toward a statistical framework for source anonymity in sensor networks
 
Toward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksToward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networks
 
Robust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networksRobust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networks
 
BIG DATA ANALYTICS FOR USER-ACTIVITY ANALYSIS AND USER-ANOMALY DETECTION IN...
 BIG DATA ANALYTICS FOR USER-ACTIVITY  ANALYSIS AND USER-ANOMALY DETECTION IN... BIG DATA ANALYTICS FOR USER-ACTIVITY  ANALYSIS AND USER-ANOMALY DETECTION IN...
BIG DATA ANALYTICS FOR USER-ACTIVITY ANALYSIS AND USER-ANOMALY DETECTION IN...
 
Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...
 
50120140505014
5012014050501450120140505014
50120140505014
 
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
 
BIG DATA SANITIZATION AND CYBER SITUATIONALAWARENESS: A NETWORK TELESCOPE PE...
 BIG DATA SANITIZATION AND CYBER SITUATIONALAWARENESS: A NETWORK TELESCOPE PE... BIG DATA SANITIZATION AND CYBER SITUATIONALAWARENESS: A NETWORK TELESCOPE PE...
BIG DATA SANITIZATION AND CYBER SITUATIONALAWARENESS: A NETWORK TELESCOPE PE...
 
Efficient Data Gathering with Compressive Sensing in Wireless Sensor Networks
Efficient Data Gathering with Compressive Sensing in Wireless Sensor NetworksEfficient Data Gathering with Compressive Sensing in Wireless Sensor Networks
Efficient Data Gathering with Compressive Sensing in Wireless Sensor Networks
 
An Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkAn Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor Network
 
A Novel Three-Dimensional Adaptive Localization (T-Dial) Algorithm for Wirele...
A Novel Three-Dimensional Adaptive Localization (T-Dial) Algorithm for Wirele...A Novel Three-Dimensional Adaptive Localization (T-Dial) Algorithm for Wirele...
A Novel Three-Dimensional Adaptive Localization (T-Dial) Algorithm for Wirele...
 
J017345864
J017345864J017345864
J017345864
 
Web server load prediction and anomaly detection from hypertext transfer prot...
Web server load prediction and anomaly detection from hypertext transfer prot...Web server load prediction and anomaly detection from hypertext transfer prot...
Web server load prediction and anomaly detection from hypertext transfer prot...
 
Data Prevention from Network Hacking
Data Prevention from Network HackingData Prevention from Network Hacking
Data Prevention from Network Hacking
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Adaptive and online one class support vector machine-based outlier detection
Adaptive and online one class support vector machine-based outlier detectionAdaptive and online one class support vector machine-based outlier detection
Adaptive and online one class support vector machine-based outlier detection
 
COMPARISON BETWEEN DIVERGENCE MEASURES FOR ANOMALY DETECTION OF MOBILE AGENTS...
COMPARISON BETWEEN DIVERGENCE MEASURES FOR ANOMALY DETECTION OF MOBILE AGENTS...COMPARISON BETWEEN DIVERGENCE MEASURES FOR ANOMALY DETECTION OF MOBILE AGENTS...
COMPARISON BETWEEN DIVERGENCE MEASURES FOR ANOMALY DETECTION OF MOBILE AGENTS...
 

More from ecwayerode

Triaxial accelerometer based fall detection method using a self-constructing ...
Triaxial accelerometer based fall detection method using a self-constructing ...Triaxial accelerometer based fall detection method using a self-constructing ...
Triaxial accelerometer based fall detection method using a self-constructing ...ecwayerode
 
Smart host microcontroller for optimal battery charging in a solar powered ro...
Smart host microcontroller for optimal battery charging in a solar powered ro...Smart host microcontroller for optimal battery charging in a solar powered ro...
Smart host microcontroller for optimal battery charging in a solar powered ro...ecwayerode
 
Remote control system of high efficiency and intelligent street lighting usin...
Remote control system of high efficiency and intelligent street lighting usin...Remote control system of high efficiency and intelligent street lighting usin...
Remote control system of high efficiency and intelligent street lighting usin...ecwayerode
 
Remote monitoring system of ecg and body temperature signals
Remote monitoring system of ecg and body temperature signalsRemote monitoring system of ecg and body temperature signals
Remote monitoring system of ecg and body temperature signalsecwayerode
 
Reduce the standby power consumption of a microwave oven
Reduce the standby power consumption of a microwave ovenReduce the standby power consumption of a microwave oven
Reduce the standby power consumption of a microwave ovenecwayerode
 
Low power wireless sensor network for building monitoring
Low power wireless sensor network for building monitoringLow power wireless sensor network for building monitoring
Low power wireless sensor network for building monitoringecwayerode
 
Land use classification using taxi gps traces
Land use classification using taxi gps tracesLand use classification using taxi gps traces
Land use classification using taxi gps tracesecwayerode
 
Intelligent household led lighting system considering energy efficiency and u...
Intelligent household led lighting system considering energy efficiency and u...Intelligent household led lighting system considering energy efficiency and u...
Intelligent household led lighting system considering energy efficiency and u...ecwayerode
 
Energy efficient wireless mac protocolsfor railway monitoring applications
Energy efficient wireless mac protocolsfor railway monitoring applicationsEnergy efficient wireless mac protocolsfor railway monitoring applications
Energy efficient wireless mac protocolsfor railway monitoring applicationsecwayerode
 
Design of an embedded speech centric interface for applications in handheld t...
Design of an embedded speech centric interface for applications in handheld t...Design of an embedded speech centric interface for applications in handheld t...
Design of an embedded speech centric interface for applications in handheld t...ecwayerode
 
Design and evaluation of a haptic computer assistant for tele-manipulation tasks
Design and evaluation of a haptic computer assistant for tele-manipulation tasksDesign and evaluation of a haptic computer assistant for tele-manipulation tasks
Design and evaluation of a haptic computer assistant for tele-manipulation tasksecwayerode
 
Automatic road crack detection and characterization
Automatic road crack detection and characterizationAutomatic road crack detection and characterization
Automatic road crack detection and characterizationecwayerode
 
Automatic calibration method for driver’s head orientation and eye movements ...
Automatic calibration method for driver’s head orientation and eye movements ...Automatic calibration method for driver’s head orientation and eye movements ...
Automatic calibration method for driver’s head orientation and eye movements ...ecwayerode
 
An embedded systems laboratory to support rapid prototyping of robotics and t...
An embedded systems laboratory to support rapid prototyping of robotics and t...An embedded systems laboratory to support rapid prototyping of robotics and t...
An embedded systems laboratory to support rapid prototyping of robotics and t...ecwayerode
 
Accessible display design to control home area networks
Accessible display design to control home area networksAccessible display design to control home area networks
Accessible display design to control home area networksecwayerode
 
A virtual touch event method using scene recognition for digital television
A virtual touch event method using scene recognition for digital televisionA virtual touch event method using scene recognition for digital television
A virtual touch event method using scene recognition for digital televisionecwayerode
 
A robot that approaches pedestrians
A robot that approaches pedestriansA robot that approaches pedestrians
A robot that approaches pedestriansecwayerode
 
Changes in the correlation between eye and steering movements indicate driver...
Changes in the correlation between eye and steering movements indicate driver...Changes in the correlation between eye and steering movements indicate driver...
Changes in the correlation between eye and steering movements indicate driver...ecwayerode
 
Towards the implementation of io t for environmental condition monitoring in ...
Towards the implementation of io t for environmental condition monitoring in ...Towards the implementation of io t for environmental condition monitoring in ...
Towards the implementation of io t for environmental condition monitoring in ...ecwayerode
 
Design and fabrication of pneumatic reciprocating water pumping system
Design and fabrication of pneumatic reciprocating water pumping systemDesign and fabrication of pneumatic reciprocating water pumping system
Design and fabrication of pneumatic reciprocating water pumping systemecwayerode
 

More from ecwayerode (20)

Triaxial accelerometer based fall detection method using a self-constructing ...
Triaxial accelerometer based fall detection method using a self-constructing ...Triaxial accelerometer based fall detection method using a self-constructing ...
Triaxial accelerometer based fall detection method using a self-constructing ...
 
Smart host microcontroller for optimal battery charging in a solar powered ro...
Smart host microcontroller for optimal battery charging in a solar powered ro...Smart host microcontroller for optimal battery charging in a solar powered ro...
Smart host microcontroller for optimal battery charging in a solar powered ro...
 
Remote control system of high efficiency and intelligent street lighting usin...
Remote control system of high efficiency and intelligent street lighting usin...Remote control system of high efficiency and intelligent street lighting usin...
Remote control system of high efficiency and intelligent street lighting usin...
 
Remote monitoring system of ecg and body temperature signals
Remote monitoring system of ecg and body temperature signalsRemote monitoring system of ecg and body temperature signals
Remote monitoring system of ecg and body temperature signals
 
Reduce the standby power consumption of a microwave oven
Reduce the standby power consumption of a microwave ovenReduce the standby power consumption of a microwave oven
Reduce the standby power consumption of a microwave oven
 
Low power wireless sensor network for building monitoring
Low power wireless sensor network for building monitoringLow power wireless sensor network for building monitoring
Low power wireless sensor network for building monitoring
 
Land use classification using taxi gps traces
Land use classification using taxi gps tracesLand use classification using taxi gps traces
Land use classification using taxi gps traces
 
Intelligent household led lighting system considering energy efficiency and u...
Intelligent household led lighting system considering energy efficiency and u...Intelligent household led lighting system considering energy efficiency and u...
Intelligent household led lighting system considering energy efficiency and u...
 
Energy efficient wireless mac protocolsfor railway monitoring applications
Energy efficient wireless mac protocolsfor railway monitoring applicationsEnergy efficient wireless mac protocolsfor railway monitoring applications
Energy efficient wireless mac protocolsfor railway monitoring applications
 
Design of an embedded speech centric interface for applications in handheld t...
Design of an embedded speech centric interface for applications in handheld t...Design of an embedded speech centric interface for applications in handheld t...
Design of an embedded speech centric interface for applications in handheld t...
 
Design and evaluation of a haptic computer assistant for tele-manipulation tasks
Design and evaluation of a haptic computer assistant for tele-manipulation tasksDesign and evaluation of a haptic computer assistant for tele-manipulation tasks
Design and evaluation of a haptic computer assistant for tele-manipulation tasks
 
Automatic road crack detection and characterization
Automatic road crack detection and characterizationAutomatic road crack detection and characterization
Automatic road crack detection and characterization
 
Automatic calibration method for driver’s head orientation and eye movements ...
Automatic calibration method for driver’s head orientation and eye movements ...Automatic calibration method for driver’s head orientation and eye movements ...
Automatic calibration method for driver’s head orientation and eye movements ...
 
An embedded systems laboratory to support rapid prototyping of robotics and t...
An embedded systems laboratory to support rapid prototyping of robotics and t...An embedded systems laboratory to support rapid prototyping of robotics and t...
An embedded systems laboratory to support rapid prototyping of robotics and t...
 
Accessible display design to control home area networks
Accessible display design to control home area networksAccessible display design to control home area networks
Accessible display design to control home area networks
 
A virtual touch event method using scene recognition for digital television
A virtual touch event method using scene recognition for digital televisionA virtual touch event method using scene recognition for digital television
A virtual touch event method using scene recognition for digital television
 
A robot that approaches pedestrians
A robot that approaches pedestriansA robot that approaches pedestrians
A robot that approaches pedestrians
 
Changes in the correlation between eye and steering movements indicate driver...
Changes in the correlation between eye and steering movements indicate driver...Changes in the correlation between eye and steering movements indicate driver...
Changes in the correlation between eye and steering movements indicate driver...
 
Towards the implementation of io t for environmental condition monitoring in ...
Towards the implementation of io t for environmental condition monitoring in ...Towards the implementation of io t for environmental condition monitoring in ...
Towards the implementation of io t for environmental condition monitoring in ...
 
Design and fabrication of pneumatic reciprocating water pumping system
Design and fabrication of pneumatic reciprocating water pumping systemDesign and fabrication of pneumatic reciprocating water pumping system
Design and fabrication of pneumatic reciprocating water pumping system
 

Recently uploaded

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 

Recently uploaded (20)

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 

Java toward a statistical framework for source anonymity in sensor networks

  • 1. TOWARD A STATISTICAL FRAMEWORK FOR SOURCE ANONYMITY IN SENSOR NETWORKS ABSTRACT: In certain applications, the locations of events reported by a sensor network need to remain anonymous. That is, unauthorized observers must be unable to detect the origin of such events by analyzing the network traffic. Known as the source anonymity problem, this problem has emerged as an important topic in the security of wireless sensor networks, with variety of techniques based on different adversarial assumptions being proposed. In this work, we present a new framework for modeling, analyzing, and evaluating anonymity in sensor networks. The novelty of the proposed framework is twofold: first, it introduces the notion of "interval indistinguishability” and provides a quantitative measure to model anonymity in wireless sensor networks; second, it maps source anonymity to the statistical problem of binary hypothesis testing with nuisance parameters. We then analyze existing solutions for designing anonymous sensor networks using the proposed model. We show how mapping source anonymity to binary hypothesis testing with nuisance parameters leads to converting the problem of exposing private source information into searching for an appropriate data transformation that removes or minimize the effect of the nuisance information. By doing so, we transform the problem from analyzing real-valued sample points to binary codes, which opens the door for coding theory to be incorporated into the study of anonymous sensor networks. Finally, we discuss how existing solutions can be modified to improve their anonymity. ECWAY TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111 VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com