Work place: Computer Engineering, Ramrao Adik Institute of Technology, D Y Patil Deemed to be University, Nerul, Navi Mumbai,400706, MH, India
E-mail: namratajitenpatel@gmail.com
Website: https://orcid.org/0000-0001-8643-5723
Research Interests: Computer systems and computational processes, Computer Architecture and Organization, Operating Systems, Information Security, Network Security, Information Systems, Discrete Mathematics
Biography
Ms.Namrata Jiten Patel PhD Research Scholar in Computer Engineering at DY Patil Deemed to University and Assistant professor in SIES Graduate School of Technology undertaken various subjects like Discrete Mathematics, Computer Network , Information Security, and Operating System.
By Namrata J. Patel Ashish Jadhav
DOI: https://doi.org/10.5815/ijwmt.2023.02.02, Pub. Date: 8 Apr. 2023
Privacy preservation in wireless networks is a multidomain task, including encryption, hashing, secure routing, obfuscation, and third-party data sharing. To design a privacy preservation model for wireless networks, it is recommended that data privacy, location privacy, temporal privacy, node privacy, and route privacy be incorporated. However, incorporating these models into any wireless network is computationally complex. Moreover, it affects the quality of services (QoS) parameters like end-to-end delay, throughput, energy consumption, and packet delivery ratio. Therefore, network designers are expected to use the most optimum privacy models that should minimally affect these QoS metrics. To do this, designers opt for standard privacy models for securing wireless networks without considering their interconnectivity and interface-ability constraints. Due to this, network security increases, but overall, network QoS is reduced. To reduce the probability of such scenarios, this text analyses and reviews various state-of-the-art models for incorporating privacy preservation in wireless networks without compromising their QoS performance. These models are compared on privacy strength, end-to-end delay, energy consumption, and network throughput. The comparison will assist network designers and researchers to select the best models for their given deployments, thereby assisting in privacy improvement while maintaining high QoS performance.Moreover, this text also recommends various methods to work together to improve their performance. This text also recommends various proven machine learning architectures that can be contemplated & explored by networks to enhance their privacy performance. The paper intends to provide a brief survey of different types of Privacy models and their comparison, which can benefit the readers in choosing a privacy model for their use.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals