Carleton University - Canada’s Capital University Carleton University - Canada’s Capital University Sitemap
Contact SCS
Campus Map
Computer Science Search:
Powered by Google
News & Seminars Future Students Current Students SCS Research People Tech Support
Ottawa-Carleton Institute for Computer Science (OCICS) Seminar Series
University of Ottawa - Carleton University
Ottawa-Carleton Institute for Computer Science (OCICS) Presentation
March 8, 2013 @ 10:00
Security in unattended wireless sensor networks (exploring the issue of unattended wireless sensor networks)
Speaker: Pandey Richa

Location: 240 TB (Tory Building)
ABSTRACT

In recent years, sensors and sensor networks have been extremely popular in the research community. Especially the prior research have explored various aspects of Wireless sensor networks which may include system architecture, power awareness and data abstraction. To be more specific, security issues in WSNs have received a lot of attention. Nowadays , Wireless sensor networks are in great demand to obtain the forensic evidence. The main purpose of forensic evidence is to maintain the integrity of the evidence. So, in order to increase the probability of retaining data integrity, the data replication strategy was proposed for unattended wireless sensor networks, where the main emphasis is that data integrity should be validated by data survival rate. But the problem arises is that the distribution of multiple data replicas may expose the location information of critical sensor nodes which stores the important information relevant to the network. This may result in high possibility of being attacked by the adversary. The current work focuses on trade off between the data survival rate and explore the various location privacy issues. Various estimation algorithms have been proposed such as random guess, coordinate median, average of overlapping area and expectation maximization approaches. Simulation results can be obtained by averaging the outcomes of 5000 realizations. On the basis of simulation results, the location privacy measures have been computed with the increase in data replicas.
Return to Schedule