Privacy Preserving from global eavesdropper in Wireless Sensor Network Using Routing Technique

himasri p, chandhra sekhar m.v.b

Abstract


Various sensor network security schemes care for the content of messages, while the related information is left defenceless by divulge the location of the monitored objects. Preserving location privacy is essential and one of the largely challenging problems in lots of mission crucial sensor network applications. Previous solutions are principally designed to defend privacy from regional attackers who eavesdrop on traffic in a petite region at a moment. However, they can be effortlessly defeated by abundantly motivated global attackers that be able to trace the entire network’s communication proceedings. Although a few topical privacy solutions are proposed adjacent to global attackers, they experience from significant communication transparency as they inject dummy traffic or send messages in a globally synchronized method. As a result, they devour a lot of energy to maintain a required privacy level that craft the network lifetime diminutive. We propose an energy-efficient source location privacy preserving solution, handle the Energy Efficient Location Privacy method beside global attackers (E-LPG). E-LPG hides inventive source locations through a spatial scatter of messages with stealthy wormholes and owing to a temporal scatter using random setback when endorsed With a imperfect number of wormholes, E-LPG can accomplish a high privacy level lacking incurring further communication overhead. We evaluated the effectiveness and efficiency of E-LPG owing to theoretical analysis and general simulations. We have shown that E-LPG also generate dramatic synergistic consequence when used among other privacy schemes accompaniment.


Keywords


Wireless Sensor Networks, Privacy, location privacy, Eavesdropper, Probabilistic algorithm, Resiliency.

References


I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci,

―Wireless Sensor Networks: A Survey,‖ Computer Networks, vol. 38,

no. 4, pp. 393-422, 2002.

B. Bamba, L. Liu, P. Pesti, and T. Wang, ―Supporting Anonymous

Location Queries in Mobile Environments with Privacygrid,‖ Proc. Int’l

Conf. World Wide Web (WWW ’08), 2008.

BlueRadios Inc., ―Order and Price Info,‖ http://www.blueradios.

com/orderinfo.htm, Feb. 2006.

B. Bollobas, D. Gamarnik, O. Riordan, and B. Sudakov, ―On the Value

of a Random Minimum Weight Steiner Tree,‖ Combinatorica, vol. 24,

no. 2, pp. 187-207, 2004.

H. Chan, A. Perrig, and D. Song, ―Random Key Predistribution Schemes

for Sensor Networks,‖ Proc. IEEE Symp. Security and Privacy (S&P

’03), pp. 197-213, May 2003.

J. Deng, R. Han, and S. Mishra, ―Enhancing Base Station Security in

Wireless Sensor Networks,‖ Technical Report CU-CS-951-03, Univ. of

Colorado, Dept. of Computer Science, 2003.

J. Deng, R. Han, and S. Mishra, ―Intrusion Tolerance and Anti- Traffic

Analysis Strategies for Wireless Sensor Networks,‖ Proc. Int’l Conf.

Dependable Systems and Networks (DSN ’04), June 2004.

J. Deng, R. Han, and S. Mishra, ―Decorrelating Wireless Sensor

Network Traffic to Inhibit Traffic Analysis Attacks,‖ Pervasive and

Mobile Computing J., Special Issue on Security in Wireless Mobile

Computing Systems, vol. 2, pp. 159-186, Apr. 2006.

L. Eschenauer and V.D. Gligor, ―A Key-Management Scheme for

Distributed Sensor Networks,‖ Proc. ACM Conf. Computer and Comm.

Security (CCS ’02), Nov. 2002.

G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K.L. Tan,

―Private Queries in Location Based Services: Anonymizers are not

Necessary,‖ Proc. ACM SIGMOD Int’l Conf. Management of Data

(SIGMOD ’08), 2008.

H. Gupta, Z. Zhou, S. Das, and Q. Gu, ―Connected Sensor Cover: Self-

Organization of Sensor Networks for Efficient Query Execution,‖

IEEE/ACM Trans. Networking, vol. 14, no. 1, pp. 55- 67, Feb. 2006.


Full Text: PDF[FULL TEXT]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.