SlideShare a Scribd company logo
1 of 1
Download to read offline
ECWAY TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE
CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111
VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com

TOWARD A STATISTICAL FRAMEWORK FOR SOURCE
ANONYMITY IN SENSOR NETWORKS
ABSTRACT:
In certain applications, the locations of events reported by a sensor network need to remain
anonymous. That is, unauthorized observers must be unable to detect the origin of such events by
analyzing the network traffic. Known as the source anonymity problem, this problem has
emerged as an important topic in the security of wireless sensor networks, with variety of
techniques based on different adversarial assumptions being proposed.

In this work, we present a new framework for modeling, analyzing, and evaluating anonymity in
sensor networks. The novelty of the proposed framework is twofold: first, it introduces the
notion of "interval indistinguishability” and provides a quantitative measure to model anonymity
in wireless sensor networks; second, it maps source anonymity to the statistical problem of
binary hypothesis testing with nuisance parameters. We then analyze existing solutions for
designing anonymous sensor networks using the proposed model.

We show how mapping source anonymity to binary hypothesis testing with nuisance parameters
leads to converting the problem of exposing private source information into searching for an
appropriate data transformation that removes or minimize the effect of the nuisance information.
By doing so, we transform the problem from analyzing real-valued sample points to binary
codes, which opens the door for coding theory to be incorporated into the study of anonymous
sensor networks. Finally, we discuss how existing solutions can be modified to improve their
anonymity.

More Related Content

What's hot

International journal on soft computing
International journal on soft computing International journal on soft computing
International journal on soft computing ijsc
 
International journal on soft computing
International journal on soft computing International journal on soft computing
International journal on soft computing ijsc
 
International journal on soft computing
International journal on soft computingInternational journal on soft computing
International journal on soft computingijsc
 
International journal on soft computing
International journal on soft computingInternational journal on soft computing
International journal on soft computingijsc
 
Machine Learning -Based Security Authentication for Wireless Multimedia Network
Machine Learning -Based Security Authentication for Wireless Multimedia NetworkMachine Learning -Based Security Authentication for Wireless Multimedia Network
Machine Learning -Based Security Authentication for Wireless Multimedia NetworkGauthamSK4
 
Call for Papers (November Issue) - International Journal on Soft Computing ( ...
Call for Papers (November Issue) - International Journal on Soft Computing ( ...Call for Papers (November Issue) - International Journal on Soft Computing ( ...
Call for Papers (November Issue) - International Journal on Soft Computing ( ...ijsc
 
Modeling self-adaptative IoT architectures
Modeling self-adaptative IoT architecturesModeling self-adaptative IoT architectures
Modeling self-adaptative IoT architecturesIván Alfonso
 
Trade offs for threshold implementations
Trade offs for threshold implementationsTrade offs for threshold implementations
Trade offs for threshold implementationsLogicMindtech Nologies
 
Network Simulator Master Thesis in Egypt
Network Simulator Master Thesis in EgyptNetwork Simulator Master Thesis in Egypt
Network Simulator Master Thesis in EgyptPhdtopiccom
 
Realization of intelligence monitoring system based on remote sensor technology
Realization of intelligence monitoring system based on remote sensor technologyRealization of intelligence monitoring system based on remote sensor technology
Realization of intelligence monitoring system based on remote sensor technologyimpulsetechembedded12
 
Review of Wireless Sensor Networks
Review of Wireless Sensor NetworksReview of Wireless Sensor Networks
Review of Wireless Sensor NetworksDr. Amarjeet Singh
 
Projects for MSc Computer Science Students
Projects for MSc Computer Science StudentsProjects for MSc Computer Science Students
Projects for MSc Computer Science StudentsPhdtopiccom
 

What's hot (14)

International journal on soft computing
International journal on soft computing International journal on soft computing
International journal on soft computing
 
International journal on soft computing
International journal on soft computing International journal on soft computing
International journal on soft computing
 
International journal on soft computing
International journal on soft computingInternational journal on soft computing
International journal on soft computing
 
International journal on soft computing
International journal on soft computingInternational journal on soft computing
International journal on soft computing
 
Machine Learning -Based Security Authentication for Wireless Multimedia Network
Machine Learning -Based Security Authentication for Wireless Multimedia NetworkMachine Learning -Based Security Authentication for Wireless Multimedia Network
Machine Learning -Based Security Authentication for Wireless Multimedia Network
 
Call for Papers (November Issue) - International Journal on Soft Computing ( ...
Call for Papers (November Issue) - International Journal on Soft Computing ( ...Call for Papers (November Issue) - International Journal on Soft Computing ( ...
Call for Papers (November Issue) - International Journal on Soft Computing ( ...
 
Modeling self-adaptative IoT architectures
Modeling self-adaptative IoT architecturesModeling self-adaptative IoT architectures
Modeling self-adaptative IoT architectures
 
becan
becanbecan
becan
 
Trade offs for threshold implementations
Trade offs for threshold implementationsTrade offs for threshold implementations
Trade offs for threshold implementations
 
Network Simulator Master Thesis in Egypt
Network Simulator Master Thesis in EgyptNetwork Simulator Master Thesis in Egypt
Network Simulator Master Thesis in Egypt
 
Realization of intelligence monitoring system based on remote sensor technology
Realization of intelligence monitoring system based on remote sensor technologyRealization of intelligence monitoring system based on remote sensor technology
Realization of intelligence monitoring system based on remote sensor technology
 
23
2323
23
 
Review of Wireless Sensor Networks
Review of Wireless Sensor NetworksReview of Wireless Sensor Networks
Review of Wireless Sensor Networks
 
Projects for MSc Computer Science Students
Projects for MSc Computer Science StudentsProjects for MSc Computer Science Students
Projects for MSc Computer Science Students
 

Viewers also liked

Dotnet t-drive enhancing driving directions with taxi drivers’ intelligence
Dotnet  t-drive enhancing driving directions with taxi drivers’ intelligenceDotnet  t-drive enhancing driving directions with taxi drivers’ intelligence
Dotnet t-drive enhancing driving directions with taxi drivers’ intelligenceEcwaytech
 
Dotnet harvesting-aware energy management for time-critical wireless sensor ...
Dotnet  harvesting-aware energy management for time-critical wireless sensor ...Dotnet  harvesting-aware energy management for time-critical wireless sensor ...
Dotnet harvesting-aware energy management for time-critical wireless sensor ...Ecwaytech
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEcwayt
 
Dotnet dynamic coverage of mobile sensor networks
Dotnet  dynamic coverage of mobile sensor networksDotnet  dynamic coverage of mobile sensor networks
Dotnet dynamic coverage of mobile sensor networksEcwaytech
 
Dotnet supporting search-as-you-type using sql in databases
Dotnet  supporting search-as-you-type using sql in databasesDotnet  supporting search-as-you-type using sql in databases
Dotnet supporting search-as-you-type using sql in databasesEcwaytech
 
Dual ram shaper
Dual ram shaper Dual ram shaper
Dual ram shaper Ecwayt
 
Dotnet power allocation for statistical qo s provisioning in opportunistic m...
Dotnet  power allocation for statistical qo s provisioning in opportunistic m...Dotnet  power allocation for statistical qo s provisioning in opportunistic m...
Dotnet power allocation for statistical qo s provisioning in opportunistic m...Ecwaytech
 
Dotnet in-network estimation with delay constraints in wireless sensor networks
Dotnet  in-network estimation with delay constraints in wireless sensor networksDotnet  in-network estimation with delay constraints in wireless sensor networks
Dotnet in-network estimation with delay constraints in wireless sensor networksEcwaytech
 
Dogum günü olanlara yaz d
Dogum günü olanlara yaz dDogum günü olanlara yaz d
Dogum günü olanlara yaz defeagbaba
 
Dotnet quality-differentiated video multicast in multirate wireless networks
Dotnet  quality-differentiated video multicast in multirate wireless networksDotnet  quality-differentiated video multicast in multirate wireless networks
Dotnet quality-differentiated video multicast in multirate wireless networksEcwaytech
 
Dotnet importance of coherence protocols with network applications on multic...
Dotnet  importance of coherence protocols with network applications on multic...Dotnet  importance of coherence protocols with network applications on multic...
Dotnet importance of coherence protocols with network applications on multic...Ecwaytech
 

Viewers also liked (11)

Dotnet t-drive enhancing driving directions with taxi drivers’ intelligence
Dotnet  t-drive enhancing driving directions with taxi drivers’ intelligenceDotnet  t-drive enhancing driving directions with taxi drivers’ intelligence
Dotnet t-drive enhancing driving directions with taxi drivers’ intelligence
 
Dotnet harvesting-aware energy management for time-critical wireless sensor ...
Dotnet  harvesting-aware energy management for time-critical wireless sensor ...Dotnet  harvesting-aware energy management for time-critical wireless sensor ...
Dotnet harvesting-aware energy management for time-critical wireless sensor ...
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
 
Dotnet dynamic coverage of mobile sensor networks
Dotnet  dynamic coverage of mobile sensor networksDotnet  dynamic coverage of mobile sensor networks
Dotnet dynamic coverage of mobile sensor networks
 
Dotnet supporting search-as-you-type using sql in databases
Dotnet  supporting search-as-you-type using sql in databasesDotnet  supporting search-as-you-type using sql in databases
Dotnet supporting search-as-you-type using sql in databases
 
Dual ram shaper
Dual ram shaper Dual ram shaper
Dual ram shaper
 
Dotnet power allocation for statistical qo s provisioning in opportunistic m...
Dotnet  power allocation for statistical qo s provisioning in opportunistic m...Dotnet  power allocation for statistical qo s provisioning in opportunistic m...
Dotnet power allocation for statistical qo s provisioning in opportunistic m...
 
Dotnet in-network estimation with delay constraints in wireless sensor networks
Dotnet  in-network estimation with delay constraints in wireless sensor networksDotnet  in-network estimation with delay constraints in wireless sensor networks
Dotnet in-network estimation with delay constraints in wireless sensor networks
 
Dogum günü olanlara yaz d
Dogum günü olanlara yaz dDogum günü olanlara yaz d
Dogum günü olanlara yaz d
 
Dotnet quality-differentiated video multicast in multirate wireless networks
Dotnet  quality-differentiated video multicast in multirate wireless networksDotnet  quality-differentiated video multicast in multirate wireless networks
Dotnet quality-differentiated video multicast in multirate wireless networks
 
Dotnet importance of coherence protocols with network applications on multic...
Dotnet  importance of coherence protocols with network applications on multic...Dotnet  importance of coherence protocols with network applications on multic...
Dotnet importance of coherence protocols with network applications on multic...
 

Similar to Dotnet toward a statistical framework for source anonymity in sensor networks

Java toward a statistical framework for source anonymity in sensor networks
Java  toward a statistical framework for source anonymity in sensor networksJava  toward a statistical framework for source anonymity in sensor networks
Java toward a statistical framework for source anonymity in sensor networksecwayerode
 
Toward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksToward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksEcway Technologies
 
A Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksA Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksIJMER
 
Wireless body area network
Wireless body area network Wireless body area network
Wireless body area network subhradeep mitra
 
Android anonymization of centralized and distributed social networks by sequ...
Android  anonymization of centralized and distributed social networks by sequ...Android  anonymization of centralized and distributed social networks by sequ...
Android anonymization of centralized and distributed social networks by sequ...Ecway2004
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Ecwaytechnoz
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Ecwayt
 
Android anonymization of centralized and distributed social networks by sequ...
Android  anonymization of centralized and distributed social networks by sequ...Android  anonymization of centralized and distributed social networks by sequ...
Android anonymization of centralized and distributed social networks by sequ...Ecwaytechnoz
 
Android anonymization of centralized and distributed social networks by sequ...
Android  anonymization of centralized and distributed social networks by sequ...Android  anonymization of centralized and distributed social networks by sequ...
Android anonymization of centralized and distributed social networks by sequ...Ecwayt
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...ecwayprojects
 
Android anonymization of centralized and distributed social networks by sequ...
Android  anonymization of centralized and distributed social networks by sequ...Android  anonymization of centralized and distributed social networks by sequ...
Android anonymization of centralized and distributed social networks by sequ...Ecwaytech
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Ecwayt
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Ecway2004
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Ecway2004
 
Android anonymization of centralized and distributed social networks by sequ...
Android  anonymization of centralized and distributed social networks by sequ...Android  anonymization of centralized and distributed social networks by sequ...
Android anonymization of centralized and distributed social networks by sequ...Ecway2004
 
Android anonymization of centralized and distributed social networks by sequ...
Android  anonymization of centralized and distributed social networks by sequ...Android  anonymization of centralized and distributed social networks by sequ...
Android anonymization of centralized and distributed social networks by sequ...Ecwaytechnoz
 
Dotnet anonymization of centralized and distributed social networks by seque...
Dotnet  anonymization of centralized and distributed social networks by seque...Dotnet  anonymization of centralized and distributed social networks by seque...
Dotnet anonymization of centralized and distributed social networks by seque...Ecwaytech
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Ecwaytechnoz
 
Android anonymization of centralized and distributed social networks by sequ...
Android  anonymization of centralized and distributed social networks by sequ...Android  anonymization of centralized and distributed social networks by sequ...
Android anonymization of centralized and distributed social networks by sequ...Ecwaytechnoz
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Ecwaytechnoz
 

Similar to Dotnet toward a statistical framework for source anonymity in sensor networks (20)

Java toward a statistical framework for source anonymity in sensor networks
Java  toward a statistical framework for source anonymity in sensor networksJava  toward a statistical framework for source anonymity in sensor networks
Java toward a statistical framework for source anonymity in sensor networks
 
Toward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksToward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networks
 
A Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksA Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor Networks
 
Wireless body area network
Wireless body area network Wireless body area network
Wireless body area network
 
Android anonymization of centralized and distributed social networks by sequ...
Android  anonymization of centralized and distributed social networks by sequ...Android  anonymization of centralized and distributed social networks by sequ...
Android anonymization of centralized and distributed social networks by sequ...
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...
 
Android anonymization of centralized and distributed social networks by sequ...
Android  anonymization of centralized and distributed social networks by sequ...Android  anonymization of centralized and distributed social networks by sequ...
Android anonymization of centralized and distributed social networks by sequ...
 
Android anonymization of centralized and distributed social networks by sequ...
Android  anonymization of centralized and distributed social networks by sequ...Android  anonymization of centralized and distributed social networks by sequ...
Android anonymization of centralized and distributed social networks by sequ...
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...
 
Android anonymization of centralized and distributed social networks by sequ...
Android  anonymization of centralized and distributed social networks by sequ...Android  anonymization of centralized and distributed social networks by sequ...
Android anonymization of centralized and distributed social networks by sequ...
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...
 
Android anonymization of centralized and distributed social networks by sequ...
Android  anonymization of centralized and distributed social networks by sequ...Android  anonymization of centralized and distributed social networks by sequ...
Android anonymization of centralized and distributed social networks by sequ...
 
Android anonymization of centralized and distributed social networks by sequ...
Android  anonymization of centralized and distributed social networks by sequ...Android  anonymization of centralized and distributed social networks by sequ...
Android anonymization of centralized and distributed social networks by sequ...
 
Dotnet anonymization of centralized and distributed social networks by seque...
Dotnet  anonymization of centralized and distributed social networks by seque...Dotnet  anonymization of centralized and distributed social networks by seque...
Dotnet anonymization of centralized and distributed social networks by seque...
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...
 
Android anonymization of centralized and distributed social networks by sequ...
Android  anonymization of centralized and distributed social networks by sequ...Android  anonymization of centralized and distributed social networks by sequ...
Android anonymization of centralized and distributed social networks by sequ...
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...
 

Dotnet toward a statistical framework for source anonymity in sensor networks

  • 1. ECWAY TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111 VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com TOWARD A STATISTICAL FRAMEWORK FOR SOURCE ANONYMITY IN SENSOR NETWORKS ABSTRACT: In certain applications, the locations of events reported by a sensor network need to remain anonymous. That is, unauthorized observers must be unable to detect the origin of such events by analyzing the network traffic. Known as the source anonymity problem, this problem has emerged as an important topic in the security of wireless sensor networks, with variety of techniques based on different adversarial assumptions being proposed. In this work, we present a new framework for modeling, analyzing, and evaluating anonymity in sensor networks. The novelty of the proposed framework is twofold: first, it introduces the notion of "interval indistinguishability” and provides a quantitative measure to model anonymity in wireless sensor networks; second, it maps source anonymity to the statistical problem of binary hypothesis testing with nuisance parameters. We then analyze existing solutions for designing anonymous sensor networks using the proposed model. We show how mapping source anonymity to binary hypothesis testing with nuisance parameters leads to converting the problem of exposing private source information into searching for an appropriate data transformation that removes or minimize the effect of the nuisance information. By doing so, we transform the problem from analyzing real-valued sample points to binary codes, which opens the door for coding theory to be incorporated into the study of anonymous sensor networks. Finally, we discuss how existing solutions can be modified to improve their anonymity.