SlideShare a Scribd company logo
ECWAY TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE
CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111
VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com

TOWARD A STATISTICAL FRAMEWORK FOR SOURCE
ANONYMITY IN SENSOR NETWORKS
ABSTRACT:
In certain applications, the locations of events reported by a sensor network need to remain
anonymous. That is, unauthorized observers must be unable to detect the origin of such events by
analyzing the network traffic. Known as the source anonymity problem, this problem has
emerged as an important topic in the security of wireless sensor networks, with variety of
techniques based on different adversarial assumptions being proposed.

In this work, we present a new framework for modeling, analyzing, and evaluating anonymity in
sensor networks. The novelty of the proposed framework is twofold: first, it introduces the
notion of "interval indistinguishability” and provides a quantitative measure to model anonymity
in wireless sensor networks; second, it maps source anonymity to the statistical problem of
binary hypothesis testing with nuisance parameters. We then analyze existing solutions for
designing anonymous sensor networks using the proposed model.

We show how mapping source anonymity to binary hypothesis testing with nuisance parameters
leads to converting the problem of exposing private source information into searching for an
appropriate data transformation that removes or minimize the effect of the nuisance information.
By doing so, we transform the problem from analyzing real-valued sample points to binary
codes, which opens the door for coding theory to be incorporated into the study of anonymous
sensor networks. Finally, we discuss how existing solutions can be modified to improve their
anonymity.

More Related Content

PDF
Model based analysis of wireless system architectures for real-time applications
PPTX
Computer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance
PPTX
PDF
Dotnet distance bounding a practical security solution for real-time locatio...
DOCX
Successive interference cancellation carving out mac layer opportunities
PDF
Java successive interference cancellation carving out mac layer opportunities
PPTX
Fog Computing Projects
Model based analysis of wireless system architectures for real-time applications
Computer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance
Dotnet distance bounding a practical security solution for real-time locatio...
Successive interference cancellation carving out mac layer opportunities
Java successive interference cancellation carving out mac layer opportunities
Fog Computing Projects

What's hot (14)

PDF
International journal on soft computing
PDF
International journal on soft computing
PDF
International journal on soft computing
PDF
International journal on soft computing
PPTX
Machine Learning -Based Security Authentication for Wireless Multimedia Network
PPTX
Call for Papers (November Issue) - International Journal on Soft Computing ( ...
PPTX
Modeling self-adaptative IoT architectures
PPTX
becan
DOCX
Trade offs for threshold implementations
PPTX
Network Simulator Master Thesis in Egypt
DOC
Realization of intelligence monitoring system based on remote sensor technology
PDF
Review of Wireless Sensor Networks
PPTX
Projects for MSc Computer Science Students
International journal on soft computing
International journal on soft computing
International journal on soft computing
International journal on soft computing
Machine Learning -Based Security Authentication for Wireless Multimedia Network
Call for Papers (November Issue) - International Journal on Soft Computing ( ...
Modeling self-adaptative IoT architectures
becan
Trade offs for threshold implementations
Network Simulator Master Thesis in Egypt
Realization of intelligence monitoring system based on remote sensor technology
Review of Wireless Sensor Networks
Projects for MSc Computer Science Students
Ad

Viewers also liked (16)

DOCX
200 & 100 meters
DOC
Voice controlled robot
DOC
Voice operated home appliance control
PDF
On centralized and localized approximation algorithms for interference aware ...
DOC
Vehicle gas detection with automatic safety warning system using gsm
PDF
Vampire attacks draining life from wireless ad hoc sensor networks
DOC
Voice operated remote for tv
DOCX
Towards the implementation of io t for environmental condition monitoring in ...
DOC
Vehicles tracking and braking system in traffic
DOC
Tongue motion controlled wheel chair
DOCX
trastornos del lenguaje
DOCX
Sherlene Watkins ResumeHHnoadd
DOCX
México se queda sin animales
PPSX
Paginas web
PPTX
What`s New in Java 8
PDF
Brochure
200 & 100 meters
Voice controlled robot
Voice operated home appliance control
On centralized and localized approximation algorithms for interference aware ...
Vehicle gas detection with automatic safety warning system using gsm
Vampire attacks draining life from wireless ad hoc sensor networks
Voice operated remote for tv
Towards the implementation of io t for environmental condition monitoring in ...
Vehicles tracking and braking system in traffic
Tongue motion controlled wheel chair
trastornos del lenguaje
Sherlene Watkins ResumeHHnoadd
México se queda sin animales
Paginas web
What`s New in Java 8
Brochure
Ad

Similar to Toward a statistical framework for source anonymity in sensor networks (20)

PDF
Java toward a statistical framework for source anonymity in sensor networks
PDF
Toward a statistical framework for source anonymity in sensor networks
PDF
A Security Framework for Replication Attacks in Wireless Sensor Networks
DOCX
Wireless body area network
PDF
Anonymization of centralized and distributed social networks by sequential cl...
PDF
Android anonymization of centralized and distributed social networks by sequ...
PDF
Anonymization of centralized and distributed social networks by sequential cl...
PDF
Anonymization of centralized and distributed social networks by sequential cl...
PDF
Anonymization of centralized and distributed social networks by sequential cl...
PDF
Android anonymization of centralized and distributed social networks by sequ...
PDF
Android anonymization of centralized and distributed social networks by sequ...
PDF
Dotnet anonymization of centralized and distributed social networks by seque...
PDF
Anonymization of centralized and distributed social networks by sequential cl...
PDF
Android anonymization of centralized and distributed social networks by sequ...
PDF
Anonymization of centralized and distributed social networks by sequential cl...
PDF
Android anonymization of centralized and distributed social networks by sequ...
PDF
Dotnet anonymization of centralized and distributed social networks by seque...
PDF
Android anonymization of centralized and distributed social networks by sequ...
PDF
Anonymization of centralized and distributed social networks by sequential cl...
PDF
Android anonymization of centralized and distributed social networks by sequ...
Java toward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networks
A Security Framework for Replication Attacks in Wireless Sensor Networks
Wireless body area network
Anonymization of centralized and distributed social networks by sequential cl...
Android anonymization of centralized and distributed social networks by sequ...
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...
Android anonymization of centralized and distributed social networks by sequ...
Android anonymization of centralized and distributed social networks by sequ...
Dotnet anonymization of centralized and distributed social networks by seque...
Anonymization of centralized and distributed social networks by sequential cl...
Android anonymization of centralized and distributed social networks by sequ...
Anonymization of centralized and distributed social networks by sequential cl...
Android anonymization of centralized and distributed social networks by sequ...
Dotnet anonymization of centralized and distributed social networks by seque...
Android anonymization of centralized and distributed social networks by sequ...
Anonymization of centralized and distributed social networks by sequential cl...
Android anonymization of centralized and distributed social networks by sequ...

More from Ecwayt (20)

PDF
Covering points of interest with mobile sensors
PDF
Coloring based inter-wban scheduling for mobile wireless body area networks
DOC
Code modulation based encryption & decryption technique for secure communicat...
PDF
Clustering sentence level text using a novel fuzzy relational clustering algo...
PDF
Clustering large probabilistic graphs
PDF
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligence
PDF
Cloudsim ranking on data manifold with sink points
PDF
Cloudsim quality-differentiated video multicast in multirate wireless networks
PDF
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
PDF
Cloudsim distributed web systems performance forecasting using turning bands...
PDF
Cloudsim distributed processing of probabilistic top-k queries in wireless s...
DOCX
Civil 2013 titles
DOC
Chopper based dc motor speed control
PDF
Channel assignment for throughput optimization in multichannel multiradio wir...
PDF
Channel allocation and routing in hybrid multichannel multiradio wireless mes...
PDF
Casual stereoscopic photo authoring
DOCX
Casual stereoscopic photo authoring
PDF
Capacity of hybrid wireless mesh networks with random a ps
DOC
Bomb detection robot with wireless camera
DOC
Bed side patients monitoring system with emergency alert
Covering points of interest with mobile sensors
Coloring based inter-wban scheduling for mobile wireless body area networks
Code modulation based encryption & decryption technique for secure communicat...
Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering large probabilistic graphs
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim ranking on data manifold with sink points
Cloudsim quality-differentiated video multicast in multirate wireless networks
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
Cloudsim distributed web systems performance forecasting using turning bands...
Cloudsim distributed processing of probabilistic top-k queries in wireless s...
Civil 2013 titles
Chopper based dc motor speed control
Channel assignment for throughput optimization in multichannel multiradio wir...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Casual stereoscopic photo authoring
Casual stereoscopic photo authoring
Capacity of hybrid wireless mesh networks with random a ps
Bomb detection robot with wireless camera
Bed side patients monitoring system with emergency alert

Toward a statistical framework for source anonymity in sensor networks

  • 1. ECWAY TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111 VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com TOWARD A STATISTICAL FRAMEWORK FOR SOURCE ANONYMITY IN SENSOR NETWORKS ABSTRACT: In certain applications, the locations of events reported by a sensor network need to remain anonymous. That is, unauthorized observers must be unable to detect the origin of such events by analyzing the network traffic. Known as the source anonymity problem, this problem has emerged as an important topic in the security of wireless sensor networks, with variety of techniques based on different adversarial assumptions being proposed. In this work, we present a new framework for modeling, analyzing, and evaluating anonymity in sensor networks. The novelty of the proposed framework is twofold: first, it introduces the notion of "interval indistinguishability” and provides a quantitative measure to model anonymity in wireless sensor networks; second, it maps source anonymity to the statistical problem of binary hypothesis testing with nuisance parameters. We then analyze existing solutions for designing anonymous sensor networks using the proposed model. We show how mapping source anonymity to binary hypothesis testing with nuisance parameters leads to converting the problem of exposing private source information into searching for an appropriate data transformation that removes or minimize the effect of the nuisance information. By doing so, we transform the problem from analyzing real-valued sample points to binary codes, which opens the door for coding theory to be incorporated into the study of anonymous sensor networks. Finally, we discuss how existing solutions can be modified to improve their anonymity.