Abstract—Wireless sensor networks monitoring personal locations are identified through internet server. If server is untrusted, it may cause threats pertaining to privacy of individuals being monitored. In this work, we propose a privacy preserving location monitoring system for wireless sensor networks. Here, we design two in-network anonymization algorithms which aim to enable the system to provide high quality location monitoring services, while preserving personal location privacy and algorithms rely on the well-established n-anonymity privacy concept. For the location monitoring system using identity sensors, the sensor nodes report the exact location information of the monitored persons to the server; thus using identity sensors immediately poses 3 major privacy breaches. To tackle such a privacy breach, the concept of aggregate location information, that is, a collection of location data relating to a group or category of persons from which individual identities have been removed has been suggested as an effective approach to preserve location privacy. Index Terms—Wireless sensor network location monitoring, privacy preservation anonymity network resource aware, quality aware. I. INTRODUCTION Wireless sensor networks rely on wireless communication, which is by nature a broadcast medium that is more vulnerable to security attacks than its wired counterpart due to lack of a physical boundary. In the wireless sensor domain, location privacy is an important security issue. Lack of location privacy can expose significant information about the traffic carried on the network and the physical world entities. Various protocols are proposed for routing and data gathering but none of them are designed with security as a goal. The resource limitation of sensor networks poses great challenges for security. The security breaches occur primarily in the form of Interruption, Interception, Modification and fabrication. Few of the security attacks are Denial of service, Attack of information in transit, Sybil attack, Blackhole/ Sinkhole Attack, ‘Hello flood’ Attack, Wormhole Attack. Privacy has been a major security issue in WSN’s, which can be classified into Data-oriented and Context-oriented [1], [2]. Data-oriented protections are categorized into data aggregation and data query techniques. Context-oriented privacy protections can be split into location privacy and Manuscript received December 26, 2013; revised June 14, 2014. This work was supported and sponsored by World Bank project, TEQIP phase-II. The authors are with Basaveshwar Engineering College Bagalkot, Karnataka, India (e-mail: kiranb4004@gmail.com, ajaykatageri@yahoo.co.in, balajibiradar64@gmail.com, basavaraj.914@gmail.com). temporal privacy techniques, the location privacy is split into data source and base station techniques. [1] This paper provides an overview of ongoing research activities, various design issues involved and possible solutions incorporating these issues. This paper [2] explains WSN is an emerging technology that shows great promise for various futuristic applications both for mass public and military and studies the security aspects of these networks. The paper [3] discusses about classification of WSN and challenges of the Next Generation WSN. The paper [4] says increasing demand for security and automated monitoring of things and places makes WSNs a promising technology. [5] Says monitoring personal locations with a potentially untrusted server poses privacy threats to the monitored individuals. The [6] author takes an example such as a hospital or bank, needs to share person-specific records in such a way that the identities of the individuals who are the subjects of the data cannot be determined. [7] Proposes an anonymous communication technique to protect the location privacy of the users of location-based services. [8] Paper tackles a major privacy threat in current location-based services where users have to report their exact locations to the database server in order to obtain their desired services. In this paper, we propose a privacy preservation of such mobile users with the help of anonymization and by reporting aggregate location. An anonymization means a person is indistinguishable amongst k persons in a network. The most effective way to compromise location privacy used by adversary is packet-tracing. In such an attack, an adversary can locate the immediate nodes by eavesdropping the transmitted packet, and further reduce the flow direction of packets. Along with privacy preservation of mobile users we are monitoring location of any mobile user through our system. II. EXISTING SYSTEM The existing system [5]-[8] is based on the concepts like, False Locations, Spatial Cloaking and Space Transformation. Anonymous communications will provide anonymous routing between the sender and the receiver. Source location privacy hides the sender's location and identity. Aggregate data privacy that preserves the privacy of the sensor node's aggregate readings during transmission. Data storage privacy hides the data storage location. Query privacy that avoids disclosing the personal interests. Drawbacks of the Existing System are, False location technique, Space transformation technique, Spatial cloaking technique. A Privacy-Preserving Location Monitoring System for WSNs with Blocking Misbehaving Users in Anonymity Networks Kirankumar B. Balavalad, Ajayakumar C. K. Atageri, Prithviraj. S. Patil, and Basavaraj M. Angadi Journal of Advances in Computer Networks, Vol. 2, No. 4, December 2014 248 DOI: 10.7763/JACN.2014.V2.121