International Journal of Computer
Trends and Technology

Research Article | Open Access | Download PDF

Volume 3 | Issue 1 | Year 2012 | Article Id. IJCTT-V3I1P124 | DOI : https://doi.org/10.14445/22312803/IJCTT-V3I1P124

Secured Location Monitoring System in Wireless Sensor Networks


Koteswara Rao Makkena, Ch. Ramesh Kumar

Citation :

Koteswara Rao Makkena, Ch. Ramesh Kumar, "Secured Location Monitoring System in Wireless Sensor Networks," International Journal of Computer Trends and Technology (IJCTT), vol. 3, no. 1, pp. 130-143, 2012. Crossref, https://doi.org/10.14445/22312803/IJCTT-V3I1P124

Abstract

A wireless sensor network is deployed to monitor certain events and pinpoint their locations, the location information is intended only for legitimate users. However, an eavesdropper can monitor the traffic and deduce the approximate location of monitored objects in certain situations. This paper presents a secured location monitoring system in which we can monitor moving objects in wireless sensor networks while preserving their location privacy. The method consists of two main modules, in-network location anonymization and aggregate query processing over anonymized locations. In the first module, trusted wireless sensor nodes collaborate with each other to anonymize users` exact locations by a cloaked spatial region that satisfies a prespecified privacy requirement. On the other side, the aggregate query processing module collects and analyzes the cloaked spatial regions reported from the wireless sensor nodes to support aggregate and alarm queries over anonymized locations.

Keywords

Wireless sensor network, privacy, monitoring system.

References

1] A. Harter, A. Hopper, P. Steggles, A. Ward, and P. Webster, .The anatomy of a context-aware application,. in Proc. of MobiCom, 1999.
[2] N. B. Priyantha, A. Chakraborty, and H. Balakrishnan, .The cricket location-support system,. in Proc. of MobiCom, 2000.
[3] B. Son, S. Shin, J. Kim, and Y. Her, .Implementation of the realtime people counting system using wireless sensor networks,. IJMUE, vol. 2, no. 2, pp. 63.80, 2007.
[4] Onesystems Technologies, .Counting people in buildings. http://www.onesystemstech.com.sg/index.php?option=comcontent&task =view%&id=10..
[5] Traf-Sys Inc., .People counting systems. http://www.trafsys.com/products/people-counters/thermal-sensor.aspx.
[6] M. Gruteser, G. Schelle, A. Jain, R. Han, and D. Grunwald, .Privacyaware location sensor networks,. in Proc. of HotOS, 2003. 
[7] G. James. Can't Hide Your Prying Eyes. Computerworld, 38:35{36, 2004. http://www.computerworld.com/securitytopics/security/privacy/story/0,1 0%801,90518,00.html. 
[8] G. Kaupins and R. Minch. Legal and Ethical Implications of Employee Location Monitoring. In Proceedings of the Hawaii International Conference on System Sciences, 2005.