Browsing by Subject "Data protection."
Now showing items 1-3 of 3
-
Anonymity and Hostile Node Identification in Wireless Sensor Networks
(North Dakota State University, 2010)In many secure wireless network attack scenarios, the source of a data packet is as sensitive as the data it contains. Existing work to provide source anonymity in wireless sensor networks (WSN) are not frugal in terms ... -
K-Anonymization Implementation Using Apache Spark
(North Dakota State University, 2019)This experiment attempts on data which can reveal a person’s identity to anonymize with k-1 anonymity principle. "Given person-specific field-structured data, produce a release of the data with scientific guarantees that ... -
Post-Deployment Key Management in Heterogeneous Wireless Sensor Networks
(North Dakota State University, 2010)Many wireless sensor network applications require secure communication between nodes in the network. However, establishing pair-wise keys between nodes to provide security is challenging due to the limited resources in ...