Seculation Routing With Fortification Wireless Networks

Tikka Pallam Raju, B S N Murthy

Abstract


Wireless sensor networks having so many problems a number of solutios enough? security issues, discusses some existing solutions, and suggests possible research directions like key establishment secrecy,authentication,privacy,denial-of-service attacks ,secure routing  and node capture attacks. Sensor devices are limited in their energy, computation, and communication capabilities Sensor nodes are often deployed in open areas, thus allowing physical attack Sensor networks closely interact with their physical environments and with people, posing new security problems. So In this paper address all the problems of wireless senor networks .In this paper we control back bone flooding attacks and give the location privacy These techniques provide trade-offs between privacy, communication cost, and latency.Through analysis and simulation, we demonstrate that the proposed techniques are efficient and effective for source and sink location privacy in sensor networks.


Keywords


Wireless sensor networks having so many problems a number of solutios enough? security issues, discusses some existing solutions, and suggests possible research directions like key establishment secrecy,authentication,privacy,denial-of-service attacks ,se

References


M.Shao, Y. Yang, S. Zhu, and G. Cao, “Towards statistically strong source anonymity for sensor networks,”. [2] Wensheng Zhang • Guohong Cao • Tom La Porta.” Dynamic proxy tree-based data dissemination schemes for wireless sensor networks” May 2006

http://en.wikipedia.org/wiki/Onion_routing.

M. Rennhard and B. Plattner, “Introducing MorphMix: peer-to-peer based anonymous Internet usage with collusion detection,” in Proc. ACM Workshop on Privacy in the Electronic Society, pp. 91-102, 2002.

Sumit Jaiswal , Jaydeep Howlader, Prasenjit Choudhury” A Review Of Anonymous Communications– Mix. [6] Yanfei Fan, Yixin Jiang, Haojin Zhu, Jiming Chen, Xuemin Shen, “Network Coding Based Privacy Preservation against Traffic Analysis in Multi-Hop Wireless Networks,” IEEE Transaction on Wireless Communication, Vol. 10, no. 3, 2011

Kiran Mehta, Donggang Liu, Matthew Wright, “Protecting Location Privacy in Sensor Networks against a Global Eavesdropper” IEEE Transactions on Mobile Computing, Vol. 11, No.2, 2012


Full Text: PDF[FULL TEXT]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.