Open Access Open Access  Restricted Access Subscription or Fee Access

Privacy Maintaining Location Supervising System for 3D Space in WSN

B.N. Jagdale, Dr.J.W. Bakal


Location supervising Systems when send a personal location data to untrusted server, it may pose a privacy threat to the monitored objects. The current privacy preserving location supervising systems for wireless sensor networks are used to preserve the privacy of monitored objects in a environment that considers only X and Y co-ordinates to show the cloaking area. Also these systems can provide the supervising services to the system users. Here unlike previously proposed systems, we propose a system that will consider Z co-ordinate also for preserving privacy of monitored objects and can also be used for spatial systems. Use of Z co-ordinate will results in a high privacy as compare to the privacy provided by the systems that uses only X and Y coordinates to show the cloaking area for privacy preservation.


3D Space, Location Privacy, Wireless Sensor Networks, Location Supervising System.

Full Text:



C.-Y. Chow, M.F. Mokbel, and X. Liu, “A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks,” IEEE Trans. Mobile Computing, vol. 10, NOo 1, Jan 2011.

Hairuo Xie, Lars Kulik, and Egemen Tanin “Privacy-Aware Traffic Monitoring,” IEEE Transactions On Intelligent Transportation Systems, VOL. 11, NO. 1, MARCH 2010.

Marco Gruteser and XUAN LIU “Protecting Privacy in Continuous Location-Tracking Applications”, IEEE SECURITY & PRIVACY , MARCH/APRIL 2004.

Haibo Hu, Jianliang Xu, Senior Member, IEEE, and Dik Lun Lee “PAM: An Efficient and Privacy-Aware Monitoring Framework for Continuously Moving Objects,” IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 22, NO. 3, MARCH 2010.

Jessa Liying Wang and Michael C. Loui “Privacy and Ethical Issues in Location-Based Tracking Systems,” IEEE Conference on Intelligent Transportation, May 2009.

I. Krontiris, F. C. Ferling, T. Dimitriou, “Location Privacy in Urban Sensing Networks: Research Challenges and Directions” IEEE Wireless Communications , Oct. 2010

B. Gedik and L. Liu, “Protecting Location Privacy with Personalized K-Anonymity: Architecture and Algorithms,” IEEE Trans. Mobile Computing, vol. 7, no. 1, pp. 1-18, Jan. 2008.

Location Privacy Protection Act of 2001,, 2010

Title 47 United States Code Section 222 (h) (2), http://frwebgate. Cite:+47USC222, 2009.

H.Kido, Y. Yanagisawa, and T. Satoh, “An Anonymous Communication Technique Using Dummies for Location-Based Services,” Proc. Int’l Conf. Pervasive Services (ICPS), 2005.

M.Gruteser and D. Grunwald, “Anonymous Usage of Location-Based Services through Spatial and Temporal Cloaking,” Proc. ACM MobiSys, 2003.

A. Harter, A. Hopper, P. Steggles, A. Ward, and P. Webster, “The Anatomy of a Context-Aware Application,” Proc. ACM MobiCom, 1999.

N.B Priyantha, A. Chakraborty, and H. Balakrishnan, “The Cricket Location-Support System,” Proc. ACM MobiCom, 2000

M. Gruteser, G. Schelle, A. Jain, R. Han, and D. Grunwald, “Privacy-Aware Location Sensor Networks,” Proc. Ninth Conf. Hot Topics in Operating Systems (HotOS), 2003


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.