Downloads & Free Reading Options - Results
Achieving Sink Node Anonymity In Tactical Wireless Sensor Networks Using A Reactive Routing Protocol by Haakensen%2c Thomas J.
Read "Achieving Sink Node Anonymity In Tactical Wireless Sensor Networks Using A Reactive Routing Protocol" by Haakensen%2c Thomas J. through these free online access and download options.
Books Results
Source: The Internet Archive
The internet Archive Search Results
Available books for downloads and borrow from The internet Archive
1DTIC AD1046393: Achieving Sink Node Anonymity In Tactical Wireless Sensor Networks Using A Reactive Routing Protocol
By Defense Technical Information Center
wireless sensor network (WSN) collects and routes information from the environment to an aggregation point, known as a sink node. The sink node processes the information or acts as a gateway to forward information to another network. Due to its essential role in the network, the sink node is a high priority target for an attacker who wishes to disable a WSN. In this thesis, we focus on the mitigation of sink-node vulnerability in a WSN. Specifically, in this thesis we study the issue of protecting the sink node through anonymity techniques. In particular, we use a technique known as k-anonymity. To achieve k-anonymity, we use a specific routing protocol designed to work within the constraints of WSN communication protocols, specifically IEEE 802.15.4. We use and modify the Lightweight Ad hoc On-Demand Next Generation (LOADng) reactive-routing protocol to achieve anonymity. This modified protocol prevents an attacker from identifying the sink node without adding significant complexity to the regular sensor nodes. We simulate the modified LOADng protocol using a custom-designed simulator in MATLAB. We demonstrate the effectiveness of our protocol and also show some of the performance tradeoffs that come with this method.
“DTIC AD1046393: Achieving Sink Node Anonymity In Tactical Wireless Sensor Networks Using A Reactive Routing Protocol” Metadata:
- Title: ➤ DTIC AD1046393: Achieving Sink Node Anonymity In Tactical Wireless Sensor Networks Using A Reactive Routing Protocol
- Author: ➤ Defense Technical Information Center
- Language: English
“DTIC AD1046393: Achieving Sink Node Anonymity In Tactical Wireless Sensor Networks Using A Reactive Routing Protocol” Subjects and Themes:
- Subjects: ➤ DTIC Archive - Haakensen,Thomas J - Naval Postgraduate School Monterey United States - WIRELESS SENSOR NETWORKS - MOBILE AD HOC NETWORKS - ROUTING PROTOCOLS - nodes - simulators - communication protocols - vulnerability
Edition Identifiers:
- Internet Archive ID: DTIC_AD1046393
Downloads Information:
The book is available for download in "texts" format, the size of the file-s is: 41.63 Mbs, the file-s for this book were downloaded 70 times, the file-s went public at Thu Apr 30 2020.
Available formats:
Abbyy GZ - Archive BitTorrent - DjVuTXT - Djvu XML - Item Tile - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Processed JP2 ZIP - Text PDF - chOCR - hOCR -
Related Links:
- Whefi.com: Download
- Whefi.com: Review - Coverage
- Internet Archive: Details
- Internet Archive Link: Downloads
Online Marketplaces
Find DTIC AD1046393: Achieving Sink Node Anonymity In Tactical Wireless Sensor Networks Using A Reactive Routing Protocol at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
2Achieving Sink Node Anonymity In Tactical Wireless Sensor Networks Using A Reactive Routing Protocol
By Haakensen, Thomas J.
A wireless sensor network (WSN) collects and routes information from the environment to an aggregation point, known as a sink node. The sink node processes the information or acts as a gateway to forward information to another network. Due to its essential role in the network, the sink node is a high priority target for an attacker who wishes to disable a WSN. In this thesis, we focus on the mitigation of sink-node vulnerability in a WSN. Specifically, in this thesis we study the issue of protecting the sink node through anonymity techniques. In particular, we use a technique known as k-anonymity. To achieve k-anonymity, we use a specific routing protocol designed to work within the constraints of WSN communication protocols, specifically IEEE 802.15.4. We use and modify the Lightweight Ad hoc On-Demand – Next Generation (LOADng) reactive-routing protocol to achieve anonymity. This modified protocol prevents an attacker from identifying the sink node without adding significant complexity to the regular sensor nodes. We simulate the modified LOADng protocol using a custom-designed simulator in MATLAB. We demonstrate the effectiveness of our protocol and also show some of the performance tradeoffs that come with this method.
“Achieving Sink Node Anonymity In Tactical Wireless Sensor Networks Using A Reactive Routing Protocol” Metadata:
- Title: ➤ Achieving Sink Node Anonymity In Tactical Wireless Sensor Networks Using A Reactive Routing Protocol
- Author: Haakensen, Thomas J.
- Language: English
“Achieving Sink Node Anonymity In Tactical Wireless Sensor Networks Using A Reactive Routing Protocol” Subjects and Themes:
- Subjects: Sink node anonymity - base station anonymity - Wireless Sensor Networks (WSN) - Mobile Ad hoc Network (MANET) - Lightweight Ad hoc On-Demand – Next Generation (LOADng)
Edition Identifiers:
- Internet Archive ID: achievingsinknod1094555612
Downloads Information:
The book is available for download in "texts" format, the size of the file-s is: 35.92 Mbs, the file-s for this book were downloaded 32 times, the file-s went public at Sat May 04 2019.
Available formats:
Abbyy GZ - Archive BitTorrent - DjVuTXT - Djvu XML - Item Tile - Metadata - Scandata - Single Page Processed JP2 ZIP - Text PDF -
Related Links:
- Whefi.com: Download
- Whefi.com: Review - Coverage
- Internet Archive: Details
- Internet Archive Link: Downloads
Online Marketplaces
Find Achieving Sink Node Anonymity In Tactical Wireless Sensor Networks Using A Reactive Routing Protocol at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
Buy “Achieving Sink Node Anonymity In Tactical Wireless Sensor Networks Using A Reactive Routing Protocol” online:
Shop for “Achieving Sink Node Anonymity In Tactical Wireless Sensor Networks Using A Reactive Routing Protocol” on popular online marketplaces.
- Ebay: New and used books.