Isolation Protection and Location Auditing System for Wireless Networks

  IJCOT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© - April Issue 2013 by IJCTT Journal
Volume-4 Issue-4                           
Year of Publication : 2013
Authors : G. Anil Kumar, Cheedalla Raghav Sai, Gudipati Shanker

MLA

G. Anil Kumar, Cheedalla Raghav Sai, Gudipati Shanker "Isolation Protection and Location Auditing System for Wireless Networks "International Journal of Computer Trends and Technology (IJCTT),V4(4):810-815 April Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract: -We propose a isolation-protection location auditing system for wireless sensor networks. Auditing personal locations with entrusted server poses isolation threats to the monitored individuals. We use two network location anonymization algorithms, namely, resource- and quality-aware algorithms that aim to enable the system to provide high quality location auditing services for system users, while protection personal location isolation. Both algorithms depend on established k-anonymity isolation concept, that is, a person is similar persons, to enable sensor nodes to provide the aggregate location information of monitored persons for the system. To utilize the aggregate location information to provide location auditing services, we use a spatial histogram that estimates the distribution of the monitored objects based on the gathered aggregate location information. Then the estimated distribution is used to provide location auditing services through answering range queries. The results show that our system provides high quality location auditing services for system users and guarantees the location isolation of the monitored persons.

 

References-

[1] Chi-Yin Chow, Mohamed F. Mokbel, Tian He. A Isolation-Protection Location Auditing System for Wireless Sensor Networks in IEEE VOL. 10, NO. 1, Jan 2011.
[2] A. Harter, A. Hopper, P. Steggles, A. Ward, and P. Webster, .The anatomy of a context-aware application,. in Proc. of MobiCom,1999.
[3] N. B. Priyantha, A. Chakraborty, and H. Balakrishnan, .The cricket location-support system, in Proc. of MobiCom, 2000.
[4] B. Son, S. Shin, J. Kim, and Y. Her, .Implementation of the real time people counting system using wireless sensor networks, IJMUE, vol. 2, no. 2, pp. 63.80, 2007.
[5] M. Gruteser, G. Schelle, A. Jain, R. Han, and D. Grunwald, Isolation-aware location sensor networks,. in Proc. of HotOS, 2003.
[6] Location Isolation Protection Act of 2001, http://www.techlawjournal.com/cong107/ isolation/location/s1164is.asp.
[7] Title 47 United States Code Section 222 (h) (2), http://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=browse usc&do%cid=Cite:+47USC222.

Keywords — Location isolation, wireless sensor networks, location auditing system, aggregate query processing.