SlideShare a Scribd company logo
ECWAY TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE
CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111
VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com

TOWARD A STATISTICAL FRAMEWORK FOR SOURCE
ANONYMITY IN SENSOR NETWORKS
ABSTRACT:
In certain applications, the locations of events reported by a sensor network need to remain
anonymous. That is, unauthorized observers must be unable to detect the origin of such events by
analyzing the network traffic. Known as the source anonymity problem, this problem has
emerged as an important topic in the security of wireless sensor networks, with variety of
techniques based on different adversarial assumptions being proposed.

In this work, we present a new framework for modeling, analyzing, and evaluating anonymity in
sensor networks. The novelty of the proposed framework is twofold: first, it introduces the
notion of "interval indistinguishability” and provides a quantitative measure to model anonymity
in wireless sensor networks; second, it maps source anonymity to the statistical problem of
binary hypothesis testing with nuisance parameters. We then analyze existing solutions for
designing anonymous sensor networks using the proposed model.

We show how mapping source anonymity to binary hypothesis testing with nuisance parameters
leads to converting the problem of exposing private source information into searching for an
appropriate data transformation that removes or minimize the effect of the nuisance information.
By doing so, we transform the problem from analyzing real-valued sample points to binary
codes, which opens the door for coding theory to be incorporated into the study of anonymous
sensor networks. Finally, we discuss how existing solutions can be modified to improve their
anonymity.

More Related Content

What's hot

International journal on soft computing
International journal on soft computing International journal on soft computing
International journal on soft computing
ijsc
 
International journal on soft computing
International journal on soft computing International journal on soft computing
International journal on soft computing
ijsc
 
International journal on soft computing
International journal on soft computingInternational journal on soft computing
International journal on soft computing
ijsc
 
International journal on soft computing
International journal on soft computingInternational journal on soft computing
International journal on soft computing
ijsc
 
Machine Learning -Based Security Authentication for Wireless Multimedia Network
Machine Learning -Based Security Authentication for Wireless Multimedia NetworkMachine Learning -Based Security Authentication for Wireless Multimedia Network
Machine Learning -Based Security Authentication for Wireless Multimedia Network
GauthamSK4
 
Call for Papers (November Issue) - International Journal on Soft Computing ( ...
Call for Papers (November Issue) - International Journal on Soft Computing ( ...Call for Papers (November Issue) - International Journal on Soft Computing ( ...
Call for Papers (November Issue) - International Journal on Soft Computing ( ...
ijsc
 
Modeling self-adaptative IoT architectures
Modeling self-adaptative IoT architecturesModeling self-adaptative IoT architectures
Modeling self-adaptative IoT architectures
Iván Alfonso
 
Trade offs for threshold implementations
Trade offs for threshold implementationsTrade offs for threshold implementations
Trade offs for threshold implementations
LogicMindtech Nologies
 
Network Simulator Master Thesis in Egypt
Network Simulator Master Thesis in EgyptNetwork Simulator Master Thesis in Egypt
Network Simulator Master Thesis in Egypt
Phdtopiccom
 
Realization of intelligence monitoring system based on remote sensor technology
Realization of intelligence monitoring system based on remote sensor technologyRealization of intelligence monitoring system based on remote sensor technology
Realization of intelligence monitoring system based on remote sensor technology
impulsetechembedded12
 
23
2323
Review of Wireless Sensor Networks
Review of Wireless Sensor NetworksReview of Wireless Sensor Networks
Review of Wireless Sensor Networks
Dr. Amarjeet Singh
 
Projects for MSc Computer Science Students
Projects for MSc Computer Science StudentsProjects for MSc Computer Science Students
Projects for MSc Computer Science Students
Phdtopiccom
 

What's hot (14)

International journal on soft computing
International journal on soft computing International journal on soft computing
International journal on soft computing
 
International journal on soft computing
International journal on soft computing International journal on soft computing
International journal on soft computing
 
International journal on soft computing
International journal on soft computingInternational journal on soft computing
International journal on soft computing
 
International journal on soft computing
International journal on soft computingInternational journal on soft computing
International journal on soft computing
 
Machine Learning -Based Security Authentication for Wireless Multimedia Network
Machine Learning -Based Security Authentication for Wireless Multimedia NetworkMachine Learning -Based Security Authentication for Wireless Multimedia Network
Machine Learning -Based Security Authentication for Wireless Multimedia Network
 
Call for Papers (November Issue) - International Journal on Soft Computing ( ...
Call for Papers (November Issue) - International Journal on Soft Computing ( ...Call for Papers (November Issue) - International Journal on Soft Computing ( ...
Call for Papers (November Issue) - International Journal on Soft Computing ( ...
 
Modeling self-adaptative IoT architectures
Modeling self-adaptative IoT architecturesModeling self-adaptative IoT architectures
Modeling self-adaptative IoT architectures
 
becan
becanbecan
becan
 
Trade offs for threshold implementations
Trade offs for threshold implementationsTrade offs for threshold implementations
Trade offs for threshold implementations
 
Network Simulator Master Thesis in Egypt
Network Simulator Master Thesis in EgyptNetwork Simulator Master Thesis in Egypt
Network Simulator Master Thesis in Egypt
 
Realization of intelligence monitoring system based on remote sensor technology
Realization of intelligence monitoring system based on remote sensor technologyRealization of intelligence monitoring system based on remote sensor technology
Realization of intelligence monitoring system based on remote sensor technology
 
23
2323
23
 
Review of Wireless Sensor Networks
Review of Wireless Sensor NetworksReview of Wireless Sensor Networks
Review of Wireless Sensor Networks
 
Projects for MSc Computer Science Students
Projects for MSc Computer Science StudentsProjects for MSc Computer Science Students
Projects for MSc Computer Science Students
 

Viewers also liked

200 & 100 meters
200 & 100 meters 200 & 100 meters
200 & 100 meters Miriam9883
 
Voice controlled robot
Voice controlled robotVoice controlled robot
Voice controlled robotEcwayt
 
Voice operated home appliance control
Voice operated home appliance controlVoice operated home appliance control
Voice operated home appliance controlEcwayt
 
On centralized and localized approximation algorithms for interference aware ...
On centralized and localized approximation algorithms for interference aware ...On centralized and localized approximation algorithms for interference aware ...
On centralized and localized approximation algorithms for interference aware ...Ecwayt
 
Vehicle gas detection with automatic safety warning system using gsm
Vehicle gas detection with automatic safety warning system using gsmVehicle gas detection with automatic safety warning system using gsm
Vehicle gas detection with automatic safety warning system using gsmEcwayt
 
Vampire attacks draining life from wireless ad hoc sensor networks
Vampire attacks draining life from wireless ad hoc sensor networksVampire attacks draining life from wireless ad hoc sensor networks
Vampire attacks draining life from wireless ad hoc sensor networksEcwayt
 
Voice operated remote for tv
Voice operated remote for tvVoice operated remote for tv
Voice operated remote for tvEcwayt
 
Towards the implementation of io t for environmental condition monitoring in ...
Towards the implementation of io t for environmental condition monitoring in ...Towards the implementation of io t for environmental condition monitoring in ...
Towards the implementation of io t for environmental condition monitoring in ...Ecwayt
 
Vehicles tracking and braking system in traffic
Vehicles tracking and braking system in trafficVehicles tracking and braking system in traffic
Vehicles tracking and braking system in trafficEcwayt
 
Tongue motion controlled wheel chair
Tongue motion controlled wheel chairTongue motion controlled wheel chair
Tongue motion controlled wheel chairEcwayt
 
trastornos del lenguaje
trastornos del lenguajetrastornos del lenguaje
trastornos del lenguaje
Jessy Bu
 
Sherlene Watkins ResumeHHnoadd
Sherlene Watkins ResumeHHnoaddSherlene Watkins ResumeHHnoadd
Sherlene Watkins ResumeHHnoaddSherlene Watkins
 
México se queda sin animales
México se queda sin animalesMéxico se queda sin animales
México se queda sin animales
edaraiza7
 
Paginas web
Paginas webPaginas web
Paginas web
Nestorsifuentes
 
What`s New in Java 8
What`s New in Java 8What`s New in Java 8
What`s New in Java 8
Mohsen Zainalpour
 
Brochure
BrochureBrochure
Brochure
LowHuiXin
 

Viewers also liked (16)

200 & 100 meters
200 & 100 meters 200 & 100 meters
200 & 100 meters
 
Voice controlled robot
Voice controlled robotVoice controlled robot
Voice controlled robot
 
Voice operated home appliance control
Voice operated home appliance controlVoice operated home appliance control
Voice operated home appliance control
 
On centralized and localized approximation algorithms for interference aware ...
On centralized and localized approximation algorithms for interference aware ...On centralized and localized approximation algorithms for interference aware ...
On centralized and localized approximation algorithms for interference aware ...
 
Vehicle gas detection with automatic safety warning system using gsm
Vehicle gas detection with automatic safety warning system using gsmVehicle gas detection with automatic safety warning system using gsm
Vehicle gas detection with automatic safety warning system using gsm
 
Vampire attacks draining life from wireless ad hoc sensor networks
Vampire attacks draining life from wireless ad hoc sensor networksVampire attacks draining life from wireless ad hoc sensor networks
Vampire attacks draining life from wireless ad hoc sensor networks
 
Voice operated remote for tv
Voice operated remote for tvVoice operated remote for tv
Voice operated remote for tv
 
Towards the implementation of io t for environmental condition monitoring in ...
Towards the implementation of io t for environmental condition monitoring in ...Towards the implementation of io t for environmental condition monitoring in ...
Towards the implementation of io t for environmental condition monitoring in ...
 
Vehicles tracking and braking system in traffic
Vehicles tracking and braking system in trafficVehicles tracking and braking system in traffic
Vehicles tracking and braking system in traffic
 
Tongue motion controlled wheel chair
Tongue motion controlled wheel chairTongue motion controlled wheel chair
Tongue motion controlled wheel chair
 
trastornos del lenguaje
trastornos del lenguajetrastornos del lenguaje
trastornos del lenguaje
 
Sherlene Watkins ResumeHHnoadd
Sherlene Watkins ResumeHHnoaddSherlene Watkins ResumeHHnoadd
Sherlene Watkins ResumeHHnoadd
 
México se queda sin animales
México se queda sin animalesMéxico se queda sin animales
México se queda sin animales
 
Paginas web
Paginas webPaginas web
Paginas web
 
What`s New in Java 8
What`s New in Java 8What`s New in Java 8
What`s New in Java 8
 
Brochure
BrochureBrochure
Brochure
 

Similar to Toward a statistical framework for source anonymity in sensor networks

Java toward a statistical framework for source anonymity in sensor networks
Java  toward a statistical framework for source anonymity in sensor networksJava  toward a statistical framework for source anonymity in sensor networks
Java toward a statistical framework for source anonymity in sensor networksecwayerode
 
Toward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksToward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksEcway Technologies
 
A Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksA Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor Networks
IJMER
 
Wireless body area network
Wireless body area network Wireless body area network
Wireless body area network subhradeep mitra
 
Android anonymization of centralized and distributed social networks by sequ...
Android  anonymization of centralized and distributed social networks by sequ...Android  anonymization of centralized and distributed social networks by sequ...
Android anonymization of centralized and distributed social networks by sequ...Ecway2004
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Ecwaytechnoz
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Ecwaytech
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Ecwayt
 
Android anonymization of centralized and distributed social networks by sequ...
Android  anonymization of centralized and distributed social networks by sequ...Android  anonymization of centralized and distributed social networks by sequ...
Android anonymization of centralized and distributed social networks by sequ...Ecwayt
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Ecwaytechnoz
 
Dotnet anonymization of centralized and distributed social networks by seque...
Dotnet  anonymization of centralized and distributed social networks by seque...Dotnet  anonymization of centralized and distributed social networks by seque...
Dotnet anonymization of centralized and distributed social networks by seque...Ecwayt
 
Android anonymization of centralized and distributed social networks by sequ...
Android  anonymization of centralized and distributed social networks by sequ...Android  anonymization of centralized and distributed social networks by sequ...
Android anonymization of centralized and distributed social networks by sequ...Ecwaytechnoz
 
Android anonymization of centralized and distributed social networks by sequ...
Android  anonymization of centralized and distributed social networks by sequ...Android  anonymization of centralized and distributed social networks by sequ...
Android anonymization of centralized and distributed social networks by sequ...Ecwayt
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...ecwayprojects
 
Android anonymization of centralized and distributed social networks by sequ...
Android  anonymization of centralized and distributed social networks by sequ...Android  anonymization of centralized and distributed social networks by sequ...
Android anonymization of centralized and distributed social networks by sequ...Ecwaytech
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Ecwayt
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Ecway2004
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Ecway2004
 
Android anonymization of centralized and distributed social networks by sequ...
Android  anonymization of centralized and distributed social networks by sequ...Android  anonymization of centralized and distributed social networks by sequ...
Android anonymization of centralized and distributed social networks by sequ...Ecway2004
 
Android anonymization of centralized and distributed social networks by sequ...
Android  anonymization of centralized and distributed social networks by sequ...Android  anonymization of centralized and distributed social networks by sequ...
Android anonymization of centralized and distributed social networks by sequ...Ecwaytechnoz
 

Similar to Toward a statistical framework for source anonymity in sensor networks (20)

Java toward a statistical framework for source anonymity in sensor networks
Java  toward a statistical framework for source anonymity in sensor networksJava  toward a statistical framework for source anonymity in sensor networks
Java toward a statistical framework for source anonymity in sensor networks
 
Toward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksToward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networks
 
A Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksA Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor Networks
 
Wireless body area network
Wireless body area network Wireless body area network
Wireless body area network
 
Android anonymization of centralized and distributed social networks by sequ...
Android  anonymization of centralized and distributed social networks by sequ...Android  anonymization of centralized and distributed social networks by sequ...
Android anonymization of centralized and distributed social networks by sequ...
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...
 
Android anonymization of centralized and distributed social networks by sequ...
Android  anonymization of centralized and distributed social networks by sequ...Android  anonymization of centralized and distributed social networks by sequ...
Android anonymization of centralized and distributed social networks by sequ...
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...
 
Dotnet anonymization of centralized and distributed social networks by seque...
Dotnet  anonymization of centralized and distributed social networks by seque...Dotnet  anonymization of centralized and distributed social networks by seque...
Dotnet anonymization of centralized and distributed social networks by seque...
 
Android anonymization of centralized and distributed social networks by sequ...
Android  anonymization of centralized and distributed social networks by sequ...Android  anonymization of centralized and distributed social networks by sequ...
Android anonymization of centralized and distributed social networks by sequ...
 
Android anonymization of centralized and distributed social networks by sequ...
Android  anonymization of centralized and distributed social networks by sequ...Android  anonymization of centralized and distributed social networks by sequ...
Android anonymization of centralized and distributed social networks by sequ...
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...
 
Android anonymization of centralized and distributed social networks by sequ...
Android  anonymization of centralized and distributed social networks by sequ...Android  anonymization of centralized and distributed social networks by sequ...
Android anonymization of centralized and distributed social networks by sequ...
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...
 
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...
 
Android anonymization of centralized and distributed social networks by sequ...
Android  anonymization of centralized and distributed social networks by sequ...Android  anonymization of centralized and distributed social networks by sequ...
Android anonymization of centralized and distributed social networks by sequ...
 
Android anonymization of centralized and distributed social networks by sequ...
Android  anonymization of centralized and distributed social networks by sequ...Android  anonymization of centralized and distributed social networks by sequ...
Android anonymization of centralized and distributed social networks by sequ...
 

More from Ecwayt

Covering points of interest with mobile sensors
Covering points of interest with mobile sensorsCovering points of interest with mobile sensors
Covering points of interest with mobile sensorsEcwayt
 
Coloring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networksColoring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networksEcwayt
 
Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...Ecwayt
 
Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...Ecwayt
 
Clustering large probabilistic graphs
Clustering large probabilistic graphsClustering large probabilistic graphs
Clustering large probabilistic graphsEcwayt
 
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim  t-drive enhancing driving directions with taxi drivers’ intelligenceCloudsim  t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligenceEcwayt
 
Cloudsim ranking on data manifold with sink points
Cloudsim  ranking on data manifold with sink pointsCloudsim  ranking on data manifold with sink points
Cloudsim ranking on data manifold with sink pointsEcwayt
 
Cloudsim quality-differentiated video multicast in multirate wireless networks
Cloudsim  quality-differentiated video multicast in multirate wireless networksCloudsim  quality-differentiated video multicast in multirate wireless networks
Cloudsim quality-differentiated video multicast in multirate wireless networksEcwayt
 
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
Cloudsim  power allocation for statistical qo s provisioning in opportunistic...Cloudsim  power allocation for statistical qo s provisioning in opportunistic...
Cloudsim power allocation for statistical qo s provisioning in opportunistic...Ecwayt
 
Cloudsim distributed web systems performance forecasting using turning bands...
Cloudsim  distributed web systems performance forecasting using turning bands...Cloudsim  distributed web systems performance forecasting using turning bands...
Cloudsim distributed web systems performance forecasting using turning bands...Ecwayt
 
Cloudsim distributed processing of probabilistic top-k queries in wireless s...
Cloudsim  distributed processing of probabilistic top-k queries in wireless s...Cloudsim  distributed processing of probabilistic top-k queries in wireless s...
Cloudsim distributed processing of probabilistic top-k queries in wireless s...Ecwayt
 
Civil 2013 titles
Civil 2013 titlesCivil 2013 titles
Civil 2013 titlesEcwayt
 
Chopper based dc motor speed control
Chopper based dc motor speed controlChopper based dc motor speed control
Chopper based dc motor speed controlEcwayt
 
Channel assignment for throughput optimization in multichannel multiradio wir...
Channel assignment for throughput optimization in multichannel multiradio wir...Channel assignment for throughput optimization in multichannel multiradio wir...
Channel assignment for throughput optimization in multichannel multiradio wir...Ecwayt
 
Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...Ecwayt
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoringEcwayt
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoringEcwayt
 
Capacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psCapacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psEcwayt
 
Bomb detection robot with wireless camera
Bomb detection robot with wireless cameraBomb detection robot with wireless camera
Bomb detection robot with wireless cameraEcwayt
 
Bed side patients monitoring system with emergency alert
Bed side patients monitoring system with  emergency alertBed side patients monitoring system with  emergency alert
Bed side patients monitoring system with emergency alertEcwayt
 

More from Ecwayt (20)

Covering points of interest with mobile sensors
Covering points of interest with mobile sensorsCovering points of interest with mobile sensors
Covering points of interest with mobile sensors
 
Coloring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networksColoring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networks
 
Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...
 
Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...
 
Clustering large probabilistic graphs
Clustering large probabilistic graphsClustering large probabilistic graphs
Clustering large probabilistic graphs
 
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim  t-drive enhancing driving directions with taxi drivers’ intelligenceCloudsim  t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligence
 
Cloudsim ranking on data manifold with sink points
Cloudsim  ranking on data manifold with sink pointsCloudsim  ranking on data manifold with sink points
Cloudsim ranking on data manifold with sink points
 
Cloudsim quality-differentiated video multicast in multirate wireless networks
Cloudsim  quality-differentiated video multicast in multirate wireless networksCloudsim  quality-differentiated video multicast in multirate wireless networks
Cloudsim quality-differentiated video multicast in multirate wireless networks
 
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
Cloudsim  power allocation for statistical qo s provisioning in opportunistic...Cloudsim  power allocation for statistical qo s provisioning in opportunistic...
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
 
Cloudsim distributed web systems performance forecasting using turning bands...
Cloudsim  distributed web systems performance forecasting using turning bands...Cloudsim  distributed web systems performance forecasting using turning bands...
Cloudsim distributed web systems performance forecasting using turning bands...
 
Cloudsim distributed processing of probabilistic top-k queries in wireless s...
Cloudsim  distributed processing of probabilistic top-k queries in wireless s...Cloudsim  distributed processing of probabilistic top-k queries in wireless s...
Cloudsim distributed processing of probabilistic top-k queries in wireless s...
 
Civil 2013 titles
Civil 2013 titlesCivil 2013 titles
Civil 2013 titles
 
Chopper based dc motor speed control
Chopper based dc motor speed controlChopper based dc motor speed control
Chopper based dc motor speed control
 
Channel assignment for throughput optimization in multichannel multiradio wir...
Channel assignment for throughput optimization in multichannel multiradio wir...Channel assignment for throughput optimization in multichannel multiradio wir...
Channel assignment for throughput optimization in multichannel multiradio wir...
 
Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
 
Capacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psCapacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a ps
 
Bomb detection robot with wireless camera
Bomb detection robot with wireless cameraBomb detection robot with wireless camera
Bomb detection robot with wireless camera
 
Bed side patients monitoring system with emergency alert
Bed side patients monitoring system with  emergency alertBed side patients monitoring system with  emergency alert
Bed side patients monitoring system with emergency alert
 

Toward a statistical framework for source anonymity in sensor networks

  • 1. ECWAY TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111 VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com TOWARD A STATISTICAL FRAMEWORK FOR SOURCE ANONYMITY IN SENSOR NETWORKS ABSTRACT: In certain applications, the locations of events reported by a sensor network need to remain anonymous. That is, unauthorized observers must be unable to detect the origin of such events by analyzing the network traffic. Known as the source anonymity problem, this problem has emerged as an important topic in the security of wireless sensor networks, with variety of techniques based on different adversarial assumptions being proposed. In this work, we present a new framework for modeling, analyzing, and evaluating anonymity in sensor networks. The novelty of the proposed framework is twofold: first, it introduces the notion of "interval indistinguishability” and provides a quantitative measure to model anonymity in wireless sensor networks; second, it maps source anonymity to the statistical problem of binary hypothesis testing with nuisance parameters. We then analyze existing solutions for designing anonymous sensor networks using the proposed model. We show how mapping source anonymity to binary hypothesis testing with nuisance parameters leads to converting the problem of exposing private source information into searching for an appropriate data transformation that removes or minimize the effect of the nuisance information. By doing so, we transform the problem from analyzing real-valued sample points to binary codes, which opens the door for coding theory to be incorporated into the study of anonymous sensor networks. Finally, we discuss how existing solutions can be modified to improve their anonymity.