期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
Clustered trajectories anonymity in wireless sensor networks
1
作者 Seble Hailu Dady Wang Jiahao +1 位作者 Qin Zhiguang Yang Fan 《High Technology Letters》 EI CAS 2015年第2期140-146,共7页
This paper proposes a clustered trajectories anonymity scheme (CTA) that enhances the kano nymity scheme to provide the intended level of source location privacy in mobile event monitoring when a global attacker is ... This paper proposes a clustered trajectories anonymity scheme (CTA) that enhances the kano nymity scheme to provide the intended level of source location privacy in mobile event monitoring when a global attacker is assumed. CTA applies isomorphic property of rotation to create traces of the fake sources distributions which are similar to those of the real sources. Thus anonymity of each trajectory and that of the clustered is achieved. In addition, location kdiversity is achieved by dis tributing fake sources around the base station. To reduce the time delay, tree rooted at the base sta tion is constructed to overlap part of the beacon interval of the nodes in the hierarchy. Both the ana lytical analysis and the simulation results prove that proved energy overhead and time delay. our scheme provides perfect anonymity with improved energy overhead and time delay. 展开更多
关键词 clustered trajectories anonymity scheme (CTA) source location privacy K-ANONYMITY global attackers wireless sensor networks (WSNs)
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部