An Improved Pillar K-Means Based Protocol for Privacy-Preserving Location Monitoring in Wireless Sensor Network
- 2 Downloads
The main criteria affecting the wireless sensor network is the security of data transmission. This paper proposed a security model for preserving the data transmission by enhancing a location monitoring and privacy-preserving protocol in the wireless sensor network. The proposed approach in this paperwork incorporates improved pillar k-means and hybrid location-privacy aware algorithm for increasing the security of wireless sensor network. The sensor network is used by different users, where the network authenticates its user by monitoring and preserving the network from the connected user. The proposed hybrid algorithm reduces the overall cost regarding communication and computational while the quality-aware increases the accuracy of location to the server. The improved pillar k-means algorithm proposed in this work to cluster the sensor nodes into a set of cluster nodes. The clustering process groups the network into nodes and searches the transmission node is monitored and secured. The output of the proposed work is carried out in MatLab platform, and it was compared with existing protocol, and the result shows the proposed IPLPA is the least possible method for preserving security regarding location monitoring and privacy in the wireless sensor network.
KeywordsImproved pillar k-means clustering Location aware algorithm Privacy-aware algorithm Location monitoring Privacy preserving
Compliance with Ethical Standards
Conflict of interest
Soumyasri SM and Rajkiran Ballal declares that they has no conflict of interest.
Human and Animal Rights
This article does not contain any studies with human participants or animals performed by any of the authors.
- 4.Jagadha, C., & Umamaheswari, P. (2013). Novel security issues for wireless sensor networks. International Conference on Emerging Trends in Engineering and Techno – Sciences, 7(11), 7–11.Google Scholar
- 6.Shi, R., Goswami, M., Gao, J., & Gu, X. (2013). Is random walk truly memory less-traffic analysis and source location privacy under random walks. In Proceedings of IEEE INFOCOM (pp. 3021–3029).Google Scholar
- 8.Kamat, P., Zhang, Y., Trappe, W., & Ozturk, C. (2005). Enhancing source location privacy in sensor network routing. In Proceedings of 25th IEEE international conference on distributed computing systems (pp. 599–608).Google Scholar
- 11.George, C. M., & Kumar, M. (2013). Cluster based location privacy in wireless sensor networks against a universal adversary. In Proceedings of IEEE international conference on information communication and embedded systems (ICICES) (pp. 288–293).Google Scholar
- 13.Sahingoz, O. K. (2013). Mobile networking with UAVs: Opportunities and challenges. In Proceedings of IEEE international conference on unmanned aircraft systems (ICUAS) (pp. 933–941).Google Scholar
- 15.Sanghvi, N. (2012). Exploring secured location data for preserving in scanning system. International Journal of Advanced Computer and Mathematical Sciences, 3(3), 343–347.Google Scholar
- 18.Lee, S., Kim, H., & Lee, S. W. (2013). Security concerns of identity authentication and context privacy preservation in uHealthcare System. In Proceedings of IEEE ACIS international conference on software engineering, artificial intelligence, networking and parallel/distributed computing (SNPD) (pp. 107–112). IEEE.Google Scholar
- 27.Barakbah, A. R., & Kiyoki, Y. (2009). A pillar algorithm for k-means optimization by distance maximization for initial centroid designation. In Proceedings of IEEE symposium on computational intelligence and data mining (pp. 61–68).Google Scholar