This paper proposes a clustered trajectories anonymity scheme(CTA) that enhances the k-anonymity scheme to provide the intended level of source location privacy in mobile event monitoring when a global attacker is assumed.CTA applies isomorphic property of rotation to create traces of the fake sources distributions which are similar to those of the real sources.Thus anonymity of each trajectory and that of the clustered is achieved.In addition,location k-diversity is achieved by distributing fake sources around the base station.To reduce the time delay,tree rooted at the base station is constructed to overlap part of the beacon interval of the nodes in the hierarchy.Both the analytical analysis and the simulation results prove that our scheme provides perfect anonymity with improved energy overhead and time delay.
This paper proposes a clustered trajectories anonymity scheme (CTA) that enhances the kano nymity scheme to provide the intended level of source location privacy in mobile event monitoring when a global attacker is assumed. CTA applies isomorphic property of rotation to create traces of the fake sources distributions which are similar to those of the real sources. Thus anonymity of each trajectory and that of the clustered is achieved. In addition, location kdiversity is achieved by dis tributing fake sources around the base station. To reduce the time delay, tree rooted at the base sta tion is constructed to overlap part of the beacon interval of the nodes in the hierarchy. Both the ana lytical analysis and the simulation results prove that proved energy overhead and time delay. our scheme provides perfect anonymity with improved energy overhead and time delay.