ATTENTION: The works hosted here are being migrated to a new repository that will consolidate resources, improve discoverability, and better show UTA's research impact on the global community. We will update authors as the migration progresses. Please see MavMatrix for more information.
Show simple item record
dc.contributor.author | Mehta, Kiran K | en_US |
dc.date.accessioned | 2008-09-17T23:35:02Z | |
dc.date.available | 2008-09-17T23:35:02Z | |
dc.date.issued | 2008-09-17T23:35:02Z | |
dc.date.submitted | August 2008 | en_US |
dc.identifier.other | DISS-2187 | en_US |
dc.identifier.uri | http://hdl.handle.net/10106/1075 | |
dc.description.abstract | While many protocols for sensor network security provide con dentiality for
the content of messages, contextual information usually remains exposed. Such contextual
information can be exploited by an adversary to derive sensitive information
such as the locations of monitored objects and data sinks in the eld. Attacks on
these components can signi cantly undermine network applications. The existing
techniques defend the leakage of location information only from an adversary who
sees only local network tra c. However, a stronger adversary, the global eavesdrop-
per, is realistic and can defeat all existing techniques. This paper rst formalizes
the location privacy issues in sensor networks under this strong adversary model and
computes a lower bound on the communication overhead needed for achieving a certain
level of location privacy. The paper then proposes two techniques to provide
location privacy for monitored objects (source location privacy): periodic collection
and source simulation, and two techniques to provide location privacy for data sinks
(destination location privacy): destination simulation and backbone
ooding. These
techniques provide trade-o s between privacy, communication cost, and latency. The analysis and simulation demonstrate that the proposed techniques are e cient and
e ective for source and destination location privacy in sensor networks. | en_US |
dc.description.sponsorship | Liu, Donggang | en_US |
dc.language.iso | EN | en_US |
dc.publisher | Computer Science & Engineering | en_US |
dc.title | Location Privacy In Sensor Networks Against A Global Eavesdropper | en_US |
dc.type | M.S. | en_US |
dc.contributor.committeeChair | Liu, Donggang | en_US |
dc.degree.department | Computer Science & Engineering | en_US |
dc.degree.discipline | Computer Science & Engineering | en_US |
dc.degree.grantor | University of Texas at Arlington | en_US |
dc.degree.level | masters | en_US |
dc.degree.name | M.S. | en_US |
dc.identifier.externalLink | https://www.uta.edu/ra/real/editprofile.php?onlyview=1&pid=1396 | |
dc.identifier.externalLinkDescription | Link to Research Profiles | |
Files in this item
- Name:
- umi-uta-2187.pdf
- Size:
- 801.7Kb
- Format:
- PDF
This item appears in the following Collection(s)
Show simple item record