SlideShare a Scribd company logo
ECWAY TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE
CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111
VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com

TOWARD A STATISTICAL FRAMEWORK FOR SOURCE
ANONYMITY IN SENSOR NETWORKS
ABSTRACT:
In certain applications, the locations of events reported by a sensor network need to remain
anonymous. That is, unauthorized observers must be unable to detect the origin of such events by
analyzing the network traffic. Known as the source anonymity problem, this problem has
emerged as an important topic in the security of wireless sensor networks, with variety of
techniques based on different adversarial assumptions being proposed.

In this work, we present a new framework for modeling, analyzing, and evaluating anonymity in
sensor networks. The novelty of the proposed framework is twofold: first, it introduces the
notion of "interval indistinguishability” and provides a quantitative measure to model anonymity
in wireless sensor networks; second, it maps source anonymity to the statistical problem of
binary hypothesis testing with nuisance parameters. We then analyze existing solutions for
designing anonymous sensor networks using the proposed model.

We show how mapping source anonymity to binary hypothesis testing with nuisance parameters
leads to converting the problem of exposing private source information into searching for an
appropriate data transformation that removes or minimize the effect of the nuisance information.
By doing so, we transform the problem from analyzing real-valued sample points to binary
codes, which opens the door for coding theory to be incorporated into the study of anonymous
sensor networks. Finally, we discuss how existing solutions can be modified to improve their
anonymity.

More Related Content

PDF
Model based analysis of wireless system architectures for real-time applications
PPTX
Computer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance
PPTX
PDF
Dotnet distance bounding a practical security solution for real-time locatio...
DOCX
Successive interference cancellation carving out mac layer opportunities
PDF
Java successive interference cancellation carving out mac layer opportunities
PPTX
Fog Computing Projects
Model based analysis of wireless system architectures for real-time applications
Computer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance
Dotnet distance bounding a practical security solution for real-time locatio...
Successive interference cancellation carving out mac layer opportunities
Java successive interference cancellation carving out mac layer opportunities
Fog Computing Projects

What's hot (14)

PDF
International journal on soft computing
PDF
International journal on soft computing
PDF
International journal on soft computing
PDF
International journal on soft computing
PPTX
Machine Learning -Based Security Authentication for Wireless Multimedia Network
PPTX
Call for Papers (November Issue) - International Journal on Soft Computing ( ...
PPTX
Modeling self-adaptative IoT architectures
PPTX
becan
DOCX
Trade offs for threshold implementations
PPTX
Network Simulator Master Thesis in Egypt
DOC
Realization of intelligence monitoring system based on remote sensor technology
PDF
Review of Wireless Sensor Networks
PPTX
Projects for MSc Computer Science Students
International journal on soft computing
International journal on soft computing
International journal on soft computing
International journal on soft computing
Machine Learning -Based Security Authentication for Wireless Multimedia Network
Call for Papers (November Issue) - International Journal on Soft Computing ( ...
Modeling self-adaptative IoT architectures
becan
Trade offs for threshold implementations
Network Simulator Master Thesis in Egypt
Realization of intelligence monitoring system based on remote sensor technology
Review of Wireless Sensor Networks
Projects for MSc Computer Science Students
Ad

Viewers also liked (18)

DOC
Vehicles tracking and braking system in traffic
DOC
Zero no load power acdc adapter for electronic equipment with embed battery
PPTX
Teenage pregnancy in Sierra Leone
DOC
Zigbee and atmega32 based wireless digital control and monitoring system for ...
PDF
Topology abstraction service for ip vp ns
DOC
Triple loop modulation (tlm) for high reliability and efficiency in a power f...
DOC
Wireless sensor network for multi storey building design and implementation
PDF
Toward privacy preserving and collusion resistance in a location proof updati...
DOC
Voice operated remote for tv
DOC
Vehicle gas detection with automatic safety warning system using gsm
DOCX
Towards the implementation of io t for environmental condition monitoring in ...
PDF
Vampire attacks draining life from wireless ad hoc sensor networks
DOC
Ultrasonic sensor based automatic braking comfort
DOC
Tongue motion controlled wheel chair
DOC
Towards the implementation of iot for environmental condition monitoring in h...
DOC
Zigbee device access control and reliable data transmission in zigbee based h...
PDF
On centralized and localized approximation algorithms for interference aware ...
DOC
Unterminated small signal behavioral model of dc–dc converters
Vehicles tracking and braking system in traffic
Zero no load power acdc adapter for electronic equipment with embed battery
Teenage pregnancy in Sierra Leone
Zigbee and atmega32 based wireless digital control and monitoring system for ...
Topology abstraction service for ip vp ns
Triple loop modulation (tlm) for high reliability and efficiency in a power f...
Wireless sensor network for multi storey building design and implementation
Toward privacy preserving and collusion resistance in a location proof updati...
Voice operated remote for tv
Vehicle gas detection with automatic safety warning system using gsm
Towards the implementation of io t for environmental condition monitoring in ...
Vampire attacks draining life from wireless ad hoc sensor networks
Ultrasonic sensor based automatic braking comfort
Tongue motion controlled wheel chair
Towards the implementation of iot for environmental condition monitoring in h...
Zigbee device access control and reliable data transmission in zigbee based h...
On centralized and localized approximation algorithms for interference aware ...
Unterminated small signal behavioral model of dc–dc converters
Ad

Similar to Toward a statistical framework for source anonymity in sensor networks (20)

PDF
Java toward a statistical framework for source anonymity in sensor networks
PDF
Toward a statistical framework for source anonymity in sensor networks
PDF
A Security Framework for Replication Attacks in Wireless Sensor Networks
DOCX
Wireless body area network
PDF
Anonymization of centralized and distributed social networks by sequential cl...
PDF
Android anonymization of centralized and distributed social networks by sequ...
PDF
Anonymization of centralized and distributed social networks by sequential cl...
PDF
Anonymization of centralized and distributed social networks by sequential cl...
PDF
Anonymization of centralized and distributed social networks by sequential cl...
PDF
Android anonymization of centralized and distributed social networks by sequ...
PDF
Android anonymization of centralized and distributed social networks by sequ...
PDF
Dotnet anonymization of centralized and distributed social networks by seque...
PDF
Anonymization of centralized and distributed social networks by sequential cl...
PDF
Android anonymization of centralized and distributed social networks by sequ...
PDF
Anonymization of centralized and distributed social networks by sequential cl...
PDF
Android anonymization of centralized and distributed social networks by sequ...
PDF
Dotnet anonymization of centralized and distributed social networks by seque...
PDF
Android anonymization of centralized and distributed social networks by sequ...
PDF
Anonymization of centralized and distributed social networks by sequential cl...
PDF
Android anonymization of centralized and distributed social networks by sequ...
Java toward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networks
A Security Framework for Replication Attacks in Wireless Sensor Networks
Wireless body area network
Anonymization of centralized and distributed social networks by sequential cl...
Android anonymization of centralized and distributed social networks by sequ...
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...
Anonymization of centralized and distributed social networks by sequential cl...
Android anonymization of centralized and distributed social networks by sequ...
Android anonymization of centralized and distributed social networks by sequ...
Dotnet anonymization of centralized and distributed social networks by seque...
Anonymization of centralized and distributed social networks by sequential cl...
Android anonymization of centralized and distributed social networks by sequ...
Anonymization of centralized and distributed social networks by sequential cl...
Android anonymization of centralized and distributed social networks by sequ...
Dotnet anonymization of centralized and distributed social networks by seque...
Android anonymization of centralized and distributed social networks by sequ...
Anonymization of centralized and distributed social networks by sequential cl...
Android anonymization of centralized and distributed social networks by sequ...

Toward a statistical framework for source anonymity in sensor networks

  • 1. ECWAY TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111 VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com TOWARD A STATISTICAL FRAMEWORK FOR SOURCE ANONYMITY IN SENSOR NETWORKS ABSTRACT: In certain applications, the locations of events reported by a sensor network need to remain anonymous. That is, unauthorized observers must be unable to detect the origin of such events by analyzing the network traffic. Known as the source anonymity problem, this problem has emerged as an important topic in the security of wireless sensor networks, with variety of techniques based on different adversarial assumptions being proposed. In this work, we present a new framework for modeling, analyzing, and evaluating anonymity in sensor networks. The novelty of the proposed framework is twofold: first, it introduces the notion of "interval indistinguishability” and provides a quantitative measure to model anonymity in wireless sensor networks; second, it maps source anonymity to the statistical problem of binary hypothesis testing with nuisance parameters. We then analyze existing solutions for designing anonymous sensor networks using the proposed model. We show how mapping source anonymity to binary hypothesis testing with nuisance parameters leads to converting the problem of exposing private source information into searching for an appropriate data transformation that removes or minimize the effect of the nuisance information. By doing so, we transform the problem from analyzing real-valued sample points to binary codes, which opens the door for coding theory to be incorporated into the study of anonymous sensor networks. Finally, we discuss how existing solutions can be modified to improve their anonymity.