Downloads & Free Reading Options - Results

Achieving Sink Node Anonymity In Tactical Wireless Sensor Networks Using A Reactive Routing Protocol by Haakensen%2c Thomas J.

Read "Achieving Sink Node Anonymity In Tactical Wireless Sensor Networks Using A Reactive Routing Protocol" by Haakensen%2c Thomas J. through these free online access and download options.

Search for Downloads

Search by Title or Author

Books Results

Source: The Internet Archive

The internet Archive Search Results

Available books for downloads and borrow from The internet Archive

1DTIC AD1046393: Achieving Sink Node Anonymity In Tactical Wireless Sensor Networks Using A Reactive Routing Protocol

By

wireless sensor network (WSN) collects and routes information from the environment to an aggregation point, known as a sink node. The sink node processes the information or acts as a gateway to forward information to another network. Due to its essential role in the network, the sink node is a high priority target for an attacker who wishes to disable a WSN. In this thesis, we focus on the mitigation of sink-node vulnerability in a WSN. Specifically, in this thesis we study the issue of protecting the sink node through anonymity techniques. In particular, we use a technique known as k-anonymity. To achieve k-anonymity, we use a specific routing protocol designed to work within the constraints of WSN communication protocols, specifically IEEE 802.15.4. We use and modify the Lightweight Ad hoc On-Demand Next Generation (LOADng) reactive-routing protocol to achieve anonymity. This modified protocol prevents an attacker from identifying the sink node without adding significant complexity to the regular sensor nodes. We simulate the modified LOADng protocol using a custom-designed simulator in MATLAB. We demonstrate the effectiveness of our protocol and also show some of the performance tradeoffs that come with this method.

“DTIC AD1046393: Achieving Sink Node Anonymity In Tactical Wireless Sensor Networks Using A Reactive Routing Protocol” Metadata:

  • Title: ➤  DTIC AD1046393: Achieving Sink Node Anonymity In Tactical Wireless Sensor Networks Using A Reactive Routing Protocol
  • Author: ➤  
  • Language: English

“DTIC AD1046393: Achieving Sink Node Anonymity In Tactical Wireless Sensor Networks Using A Reactive Routing Protocol” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 41.63 Mbs, the file-s for this book were downloaded 70 times, the file-s went public at Thu Apr 30 2020.

Available formats:
Abbyy GZ - Archive BitTorrent - DjVuTXT - Djvu XML - Item Tile - Metadata - OCR Page Index - OCR Search Text - Page Numbers JSON - Scandata - Single Page Processed JP2 ZIP - Text PDF - chOCR - hOCR -

Related Links:

Online Marketplaces

Find DTIC AD1046393: Achieving Sink Node Anonymity In Tactical Wireless Sensor Networks Using A Reactive Routing Protocol at online marketplaces:


2Achieving Sink Node Anonymity In Tactical Wireless Sensor Networks Using A Reactive Routing Protocol

By

A wireless sensor network (WSN) collects and routes information from the environment to an aggregation point, known as a sink node. The sink node processes the information or acts as a gateway to forward information to another network. Due to its essential role in the network, the sink node is a high priority target for an attacker who wishes to disable a WSN. In this thesis, we focus on the mitigation of sink-node vulnerability in a WSN. Specifically, in this thesis we study the issue of protecting the sink node through anonymity techniques. In particular, we use a technique known as k-anonymity. To achieve k-anonymity, we use a specific routing protocol designed to work within the constraints of WSN communication protocols, specifically IEEE 802.15.4. We use and modify the Lightweight Ad hoc On-Demand – Next Generation (LOADng) reactive-routing protocol to achieve anonymity. This modified protocol prevents an attacker from identifying the sink node without adding significant complexity to the regular sensor nodes. We simulate the modified LOADng protocol using a custom-designed simulator in MATLAB. We demonstrate the effectiveness of our protocol and also show some of the performance tradeoffs that come with this method.

“Achieving Sink Node Anonymity In Tactical Wireless Sensor Networks Using A Reactive Routing Protocol” Metadata:

  • Title: ➤  Achieving Sink Node Anonymity In Tactical Wireless Sensor Networks Using A Reactive Routing Protocol
  • Author:
  • Language: English

“Achieving Sink Node Anonymity In Tactical Wireless Sensor Networks Using A Reactive Routing Protocol” Subjects and Themes:

Edition Identifiers:

Downloads Information:

The book is available for download in "texts" format, the size of the file-s is: 35.92 Mbs, the file-s for this book were downloaded 32 times, the file-s went public at Sat May 04 2019.

Available formats:
Abbyy GZ - Archive BitTorrent - DjVuTXT - Djvu XML - Item Tile - Metadata - Scandata - Single Page Processed JP2 ZIP - Text PDF -

Related Links:

Online Marketplaces

Find Achieving Sink Node Anonymity In Tactical Wireless Sensor Networks Using A Reactive Routing Protocol at online marketplaces:


Buy “Achieving Sink Node Anonymity In Tactical Wireless Sensor Networks Using A Reactive Routing Protocol” online:

Shop for “Achieving Sink Node Anonymity In Tactical Wireless Sensor Networks Using A Reactive Routing Protocol” on popular online marketplaces.