Providing Location Privacy Using Fake Sources in Wireless Sensor Networks

Ulugbek Adilbekov, Anar Adilova, Sain Saginbekov

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Wireless Sensor Networks (WSNs) consist of low-cost, resource-constrained sensor nodes and a designated node called a sink which collects data from the sensor nodes. A WSN can be used in numerous applications such as subject tracking and monitoring, where it is often desirable to keep the location of the subject private. Without location privacy protection, an adversary can locate the subject. In this paper, we propose an algorithm that tries to keep the subject location private from a global adversary, which can see the entire network traffic, in an energy efficient way.

Original languageEnglish
Title of host publicationIEEE 12th International Conference on Application of Information and Communication Technologies, AICT 2018 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781538664674
DOIs
Publication statusPublished - Oct 2018
Event12th IEEE International Conference on Application of Information and Communication Technologies, AICT 2018 - Almaty, Kazakhstan
Duration: Oct 17 2018Oct 19 2018

Publication series

NameIEEE 12th International Conference on Application of Information and Communication Technologies, AICT 2018 - Proceedings

Conference

Conference12th IEEE International Conference on Application of Information and Communication Technologies, AICT 2018
CountryKazakhstan
CityAlmaty
Period10/17/1810/19/18

Keywords

  • Context Privacy
  • Global Adversary
  • Source Location Privacy
  • Wireless Sensor Networks

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications
  • Computer Vision and Pattern Recognition
  • Information Systems and Management
  • Health Informatics
  • Information Systems

Fingerprint Dive into the research topics of 'Providing Location Privacy Using Fake Sources in Wireless Sensor Networks'. Together they form a unique fingerprint.

Cite this