Namrata J. Patel

Work place: Computer Engineering, Ramrao Adik Institute of Technology, D Y Patil Deemed to be University, Nerul, Navi Mumbai,400706, MH, India

E-mail: namratajitenpatel@gmail.com

Website: https://orcid.org/0000-0001-8643-5723

Research Interests: Computer systems and computational processes, Computer Architecture and Organization, Operating Systems, Information Security, Network Security, Information Systems, Discrete Mathematics

Biography

Ms.Namrata Jiten Patel PhD Research Scholar in Computer Engineering at DY Patil Deemed to University and Assistant professor in SIES Graduate School of Technology undertaken various subjects like Discrete Mathematics, Computer Network , Information Security, and Operating System.

Author Articles
A Systematic Review of Privacy Preservation Models in Wireless Networks

By Namrata J. Patel Ashish Jadhav

DOI: https://doi.org/10.5815/ijwmt.2023.02.02, Pub. Date: 8 Apr. 2023

Privacy preservation in wireless networks is a multidomain task, including encryption, hashing, secure routing, obfuscation, and third-party data sharing. To design a privacy preservation model for wireless networks, it is recommended that data privacy, location privacy, temporal privacy, node privacy, and route privacy be incorporated. However, incorporating these models into any wireless network is computationally complex. Moreover, it affects the quality of services (QoS) parameters like end-to-end delay, throughput, energy consumption, and packet delivery ratio. Therefore, network designers are expected to use the most optimum privacy models that should minimally affect these QoS metrics. To do this, designers opt for standard privacy models for securing wireless networks without considering their interconnectivity and interface-ability constraints. Due to this, network security increases, but overall, network QoS is reduced. To reduce the probability of such scenarios, this text analyses and reviews various state-of-the-art models for incorporating privacy preservation in wireless networks without compromising their QoS performance. These models are compared on privacy strength, end-to-end delay, energy consumption, and network throughput. The comparison will assist network designers and researchers to select the best models for their given deployments, thereby assisting in privacy improvement while maintaining high QoS performance.Moreover, this text also recommends various methods to work together to improve their performance. This text also recommends various proven machine learning architectures that can be contemplated & explored by networks to enhance their privacy performance. The paper intends to provide a brief survey of different types of Privacy models and their comparison, which can benefit the readers in choosing a privacy model for their use.

[...] Read more.
Other Articles