SlideShare una empresa de Scribd logo
1 de 7
For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit: www.ocularsystems.in Or
                                     Call Us On 7385665306


    A Privacy-Preserving Location Monitoring System for
                           Wireless Sensor Networks

Abstract:-
Monitoring personal locations with a potentially untrusted server poses privacy
threats to the monitored individuals. Tothis end, we propose a privacy-preserving
location monitoring system for wireless sensor networks. In our system, we design
two innetworklocation anonymization algorithms, namely, resource- and quality-
aware algorithms, that aim to enable the system to providehigh quality location
monitoring services for system users, while preserving personal location privacy.
Both algorithms rely on the wellestablished k-anonymity privacy concept, that is, a
person is indistinguishable among k persons, to enable trusted sensor nodes to
provide the aggregate location information of monitored persons for our system.
Each aggregate location is in a form of a monitoredarea A along with the number
of monitored persons residing in A, where A contains at least k persons. The
resource-aware algorithmaims to minimize communication and computational
cost, while the quality-aware algorithm aims to maximize the accuracy of
theaggregate locations by minimizing their monitored areas. To utilize the
aggregate location information to provide location monitoringservices, we use a
spatial histogram approach that estimates the distribution of the monitored persons
based on the gathered aggregatelocation information. Then the estimated
distribution is used to provide location monitoring services through answering
range queries.




  Ocular Systems, Shop No:1, Swagat Corner Building, Near NarayaniDham Temple, Katraj, Pune-46
                                 E-Mail: info@ocularsystems.in
For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit: www.ocularsystems.in Or
                                     Call Us On 7385665306

We evaluate our system through simulated experiments. The results show that our
system provides high quality location monitoringservices for system users and
guarantees the location privacy of the monitored persons.


System Architecture




Algorithm

The Resource-Aware Algorithm

Existing System

Existing locationmonitoring systems. In an identity-sensor location monitoring
System, since each sensor node reports the exactlocation information of each
0monitored object to theserver, the adversary can pinpoint each object's exact
location.On the other hand, in a counting-sensor locationmonitoring system, each
sensor node reports the numberof objects in its sensing area to the server. The
adversarycan map the monitored areas of the sensor nodes to thesystem layout. If
the object count of a monitored area isvery small or equal to one,

  Ocular Systems, Shop No:1, Swagat Corner Building, Near NarayaniDham Temple, Katraj, Pune-46
                                 E-Mail: info@ocularsystems.in
For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit: www.ocularsystems.in Or
                                     Call Us On 7385665306




Proposed System

This paper proposes a privacy-preserving locationmonitoring system for wireless
sensor networks to providemonitoring services. Our system relies on the
wellestablished k-anonymity privacy concept, which requireseach person is
indistinguishable among k persons. In oursystem, each sensor node blurs its
sensing area into acloaked area, in which at least k persons are residing.
Eachsensor node reports only aggregate location information,


We proposetwo in-network aggregate location anonymization algorithms, namely,
resource- and quality-aware algorithms.Both algorithms require the sensor nodes to
collaboratewith each other to blur their sensing areas into cloakedareas, such that
each cloaked area contains at least kpersons to constitute a k-anonymous cloaked
area. Theresource-aware algorithm aims to minimize communication
and computational cost, while the quality-awarealgorithm aims to minimize the
size of the cloaked areas,in order to maximize the accuracy of the
aggregatelocations reported to the server.



Modules

1. WSN Location Monitoring Module

The location monitoring system using identity sensors,the sensor nodes report the
exact location information ofthe monitored persons to the server; thus using
identitysensors immediately poses a major privacy breach. To tackle such a


  Ocular Systems, Shop No:1, Swagat Corner Building, Near NarayaniDham Temple, Katraj, Pune-46
                                 E-Mail: info@ocularsystems.in
For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit: www.ocularsystems.in Or
                                     Call Us On 7385665306

privacy breach, the concept of aggregatelocation information, that is, a collection
of location datarelating to a group or category of persons from whichindividual
identities have been removed , has beensuggested as an effective approach to
preserve locationprivacy . Although the counting sensors by natureprovide
aggregate location information, they wouldalso pose privacy breaches.



2. Aggregate locations Module

We design two in-network location anonymization algorithms,namely, resource-
and quality-aware algorithms that preserve personal location privacy, while
enablingthe system to provide location monitoring services. Bothalgorithms rely
on the well established k-anonymity privacyconcept that requires a person is
indistinguishableamong k persons. In our system, sensor nodes executeour location
anonymization algorithms to provide k-anonymous aggregate locations, in which
each aggregatelocation is a cloaked area A




  Ocular Systems, Shop No:1, Swagat Corner Building, Near NarayaniDham Temple, Katraj, Pune-46
                                 E-Mail: info@ocularsystems.in
For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit: www.ocularsystems.in Or
                                     Call Us On 7385665306




3. Mapped Location monitoring Module


Sensor nodes.
Each sensor node is responsible for determining the number of objects in its
sensing area, blurringits sensing area into a cloaked area A, which includesat least
k objects, and reporting A with the number ofobjects located in A as aggregate
location informationto the server. We do not have any assumption aboutthe
network topology, as our system only requires acommunication path from each
sensor node to the server through a distributed tree . Each sensor node is alsoaware
of its location and sensing area.


Server.


  Ocular Systems, Shop No:1, Swagat Corner Building, Near NarayaniDham Temple, Katraj, Pune-46
                                 E-Mail: info@ocularsystems.in
For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit: www.ocularsystems.in Or
                                     Call Us On 7385665306

The server is responsible for collecting the aggregatelocations reported from the
sensor nodes, usinga spatial histogram to estimate the distribution of themonitored
objects, and answering range queries basedon the estimated object distribution.
Furthermore, theadministrator can change the anonymized level k of thesystem at
anytime by disseminating a message with anew value of k to all the sensor nodes.
System users.
Authenticated administrators and userscan issue range queries to our system
through either theserver or the sensor nodes, as depicted in Above System
Architecture figure. Theserver uses the spatial histogram to answer their queries.




4. Minimum bounding rectangle (MBR)




We find the minimum bounding rectangle (MBR) of the sensing area of A. It is
important to note that the sensing area can be in any polygon or irregular shape.

Software Requirements:
Hardware Requirement:
    Minimum 1.1 GHz PROCESSOR should be on the computer.



  Ocular Systems, Shop No:1, Swagat Corner Building, Near NarayaniDham Temple, Katraj, Pune-46
                                 E-Mail: info@ocularsystems.in
For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit: www.ocularsystems.in Or
                                     Call Us On 7385665306

    128 MBRAM.
    20 GB HDD.

    1.44 MB FDD.

    52x CD-ROM Drive.
    MONITORS at 800x600 minimum resolution at 256 colors minimum.

    I/O, One or two button mouse and standard 101-key keyboard.



Software Requirement:

             Operating System:Windows 95/98/2000/NT4.0.

              Technology : JAVA, JFC(Swing)

              Development IDE              : Eclipse 3.x




 Ocular Systems, Shop No:1, Swagat Corner Building, Near NarayaniDham Temple, Katraj, Pune-46
                                E-Mail: info@ocularsystems.in

Más contenido relacionado

Último

Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 

Último (20)

Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 

Destacado

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Destacado (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

A privacy preserving location monitoring system for wireless sensor networks

  • 1. For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit: www.ocularsystems.in Or Call Us On 7385665306 A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks Abstract:- Monitoring personal locations with a potentially untrusted server poses privacy threats to the monitored individuals. Tothis end, we propose a privacy-preserving location monitoring system for wireless sensor networks. In our system, we design two innetworklocation anonymization algorithms, namely, resource- and quality- aware algorithms, that aim to enable the system to providehigh quality location monitoring services for system users, while preserving personal location privacy. Both algorithms rely on the wellestablished k-anonymity privacy concept, that is, a person is indistinguishable among k persons, to enable trusted sensor nodes to provide the aggregate location information of monitored persons for our system. Each aggregate location is in a form of a monitoredarea A along with the number of monitored persons residing in A, where A contains at least k persons. The resource-aware algorithmaims to minimize communication and computational cost, while the quality-aware algorithm aims to maximize the accuracy of theaggregate locations by minimizing their monitored areas. To utilize the aggregate location information to provide location monitoringservices, we use a spatial histogram approach that estimates the distribution of the monitored persons based on the gathered aggregatelocation information. Then the estimated distribution is used to provide location monitoring services through answering range queries. Ocular Systems, Shop No:1, Swagat Corner Building, Near NarayaniDham Temple, Katraj, Pune-46 E-Mail: info@ocularsystems.in
  • 2. For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit: www.ocularsystems.in Or Call Us On 7385665306 We evaluate our system through simulated experiments. The results show that our system provides high quality location monitoringservices for system users and guarantees the location privacy of the monitored persons. System Architecture Algorithm The Resource-Aware Algorithm Existing System Existing locationmonitoring systems. In an identity-sensor location monitoring System, since each sensor node reports the exactlocation information of each 0monitored object to theserver, the adversary can pinpoint each object's exact location.On the other hand, in a counting-sensor locationmonitoring system, each sensor node reports the numberof objects in its sensing area to the server. The adversarycan map the monitored areas of the sensor nodes to thesystem layout. If the object count of a monitored area isvery small or equal to one, Ocular Systems, Shop No:1, Swagat Corner Building, Near NarayaniDham Temple, Katraj, Pune-46 E-Mail: info@ocularsystems.in
  • 3. For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit: www.ocularsystems.in Or Call Us On 7385665306 Proposed System This paper proposes a privacy-preserving locationmonitoring system for wireless sensor networks to providemonitoring services. Our system relies on the wellestablished k-anonymity privacy concept, which requireseach person is indistinguishable among k persons. In oursystem, each sensor node blurs its sensing area into acloaked area, in which at least k persons are residing. Eachsensor node reports only aggregate location information, We proposetwo in-network aggregate location anonymization algorithms, namely, resource- and quality-aware algorithms.Both algorithms require the sensor nodes to collaboratewith each other to blur their sensing areas into cloakedareas, such that each cloaked area contains at least kpersons to constitute a k-anonymous cloaked area. Theresource-aware algorithm aims to minimize communication and computational cost, while the quality-awarealgorithm aims to minimize the size of the cloaked areas,in order to maximize the accuracy of the aggregatelocations reported to the server. Modules 1. WSN Location Monitoring Module The location monitoring system using identity sensors,the sensor nodes report the exact location information ofthe monitored persons to the server; thus using identitysensors immediately poses a major privacy breach. To tackle such a Ocular Systems, Shop No:1, Swagat Corner Building, Near NarayaniDham Temple, Katraj, Pune-46 E-Mail: info@ocularsystems.in
  • 4. For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit: www.ocularsystems.in Or Call Us On 7385665306 privacy breach, the concept of aggregatelocation information, that is, a collection of location datarelating to a group or category of persons from whichindividual identities have been removed , has beensuggested as an effective approach to preserve locationprivacy . Although the counting sensors by natureprovide aggregate location information, they wouldalso pose privacy breaches. 2. Aggregate locations Module We design two in-network location anonymization algorithms,namely, resource- and quality-aware algorithms that preserve personal location privacy, while enablingthe system to provide location monitoring services. Bothalgorithms rely on the well established k-anonymity privacyconcept that requires a person is indistinguishableamong k persons. In our system, sensor nodes executeour location anonymization algorithms to provide k-anonymous aggregate locations, in which each aggregatelocation is a cloaked area A Ocular Systems, Shop No:1, Swagat Corner Building, Near NarayaniDham Temple, Katraj, Pune-46 E-Mail: info@ocularsystems.in
  • 5. For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit: www.ocularsystems.in Or Call Us On 7385665306 3. Mapped Location monitoring Module Sensor nodes. Each sensor node is responsible for determining the number of objects in its sensing area, blurringits sensing area into a cloaked area A, which includesat least k objects, and reporting A with the number ofobjects located in A as aggregate location informationto the server. We do not have any assumption aboutthe network topology, as our system only requires acommunication path from each sensor node to the server through a distributed tree . Each sensor node is alsoaware of its location and sensing area. Server. Ocular Systems, Shop No:1, Swagat Corner Building, Near NarayaniDham Temple, Katraj, Pune-46 E-Mail: info@ocularsystems.in
  • 6. For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit: www.ocularsystems.in Or Call Us On 7385665306 The server is responsible for collecting the aggregatelocations reported from the sensor nodes, usinga spatial histogram to estimate the distribution of themonitored objects, and answering range queries basedon the estimated object distribution. Furthermore, theadministrator can change the anonymized level k of thesystem at anytime by disseminating a message with anew value of k to all the sensor nodes. System users. Authenticated administrators and userscan issue range queries to our system through either theserver or the sensor nodes, as depicted in Above System Architecture figure. Theserver uses the spatial histogram to answer their queries. 4. Minimum bounding rectangle (MBR) We find the minimum bounding rectangle (MBR) of the sensing area of A. It is important to note that the sensing area can be in any polygon or irregular shape. Software Requirements: Hardware Requirement:  Minimum 1.1 GHz PROCESSOR should be on the computer. Ocular Systems, Shop No:1, Swagat Corner Building, Near NarayaniDham Temple, Katraj, Pune-46 E-Mail: info@ocularsystems.in
  • 7. For Diploma, BE, ME, M Tech, BCA, MCA, PHD Project Guidance, Please Visit: www.ocularsystems.in Or Call Us On 7385665306  128 MBRAM.  20 GB HDD.  1.44 MB FDD.  52x CD-ROM Drive.  MONITORS at 800x600 minimum resolution at 256 colors minimum.  I/O, One or two button mouse and standard 101-key keyboard. Software Requirement:  Operating System:Windows 95/98/2000/NT4.0.  Technology : JAVA, JFC(Swing)  Development IDE : Eclipse 3.x Ocular Systems, Shop No:1, Swagat Corner Building, Near NarayaniDham Temple, Katraj, Pune-46 E-Mail: info@ocularsystems.in