Now showing items 1-3 of 3

    • Anonymity and Hostile Node Identification in Wireless Sensor Networks 

      Reindl, Phillip Steven (North Dakota State University, 2010)
      In many secure wireless network attack scenarios, the source of a data packet is as sensitive as the data it contains. Existing work to provide source anonymity in wireless sensor networks (WSN) are not frugal in terms ...
    • K-Anonymization Implementation Using Apache Spark 

      Tortikar, Pratik (North Dakota State University, 2019)
      This experiment attempts on data which can reveal a person’s identity to anonymize with k-1 anonymity principle. "Given person-specific field-structured data, produce a release of the data with scientific guarantees that ...
    • Post-Deployment Key Management in Heterogeneous Wireless Sensor Networks 

      Loree, Paul Edward (North Dakota State University, 2010)
      Many wireless sensor network applications require secure communication between nodes in the network. However, establishing pair-wise keys between nodes to provide security is challenging due to the limited resources in ...