Mutar, A.I.Kurnaz, S.Mohammed, A.H.2024-09-292024-09-292020978-172819090-7https://doi.org/10.1109/ISMSIT50672.2020.9255272https://hdl.handle.net/20.500.14619/93374th International Symposium on Multidisciplinary Studies and Innovative Technologies, ISMSIT 2020 -- 22 October 2020 through 24 October 2020 -- Istanbul -- 165025The usage of K-anonymity to preserve location privacy for wireless sensor network (WSN) monitoring systems, where sensor nodes operate together to notify a server with anonymous shared positions. That k-anonymous position is a coated region with at least k people. However, we identify an attack model to show that overlapping aggregate locations remain privacy-risk because the enemy can infer certain overlapping areas with persons under k who violate the privacy requirement for anonymity. Within this paper we suggest a mutual WSN privacy protocol (REAL). Actual needs sensor nodes to arrange their sensing areas separately into a variety of non-overlapping, extremely precise anonymous aggregate positions. We also developed a state transfer framework, a locking mechanism and a time delay mechanism to address the three main REAL challenges, namely self-organisation, shared assets and high precision. We equate REAL's output with current protocols through virtual experiments. The findings demonstrate that REAL preserves the privacy of sites, offers more precise question answers and decreases connectivity and device expense. © 2020 IEEE.eninfo:eu-repo/semantics/closedAccess3D diagramsAntennaOptimumREALWireless sensor networkWireless Sensor Networks Mutual Policy for Position ProtectionConference Object10.1109/ISMSIT50672.2020.92552722-s2.0-85097682884N/A