Privacy Preserving from global eavesdropper in Wireless Sensor Network Using Routing Technique
Abstract
Various sensor network security schemes care for the content of messages, while the related information is left defenceless by divulge the location of the monitored objects. Preserving location privacy is essential and one of the largely challenging problems in lots of mission crucial sensor network applications. Previous solutions are principally designed to defend privacy from regional attackers who eavesdrop on traffic in a petite region at a moment. However, they can be effortlessly defeated by abundantly motivated global attackers that be able to trace the entire network’s communication proceedings. Although a few topical privacy solutions are proposed adjacent to global attackers, they experience from significant communication transparency as they inject dummy traffic or send messages in a globally synchronized method. As a result, they devour a lot of energy to maintain a required privacy level that craft the network lifetime diminutive. We propose an energy-efficient source location privacy preserving solution, handle the Energy Efficient Location Privacy method beside global attackers (E-LPG). E-LPG hides inventive source locations through a spatial scatter of messages with stealthy wormholes and owing to a temporal scatter using random setback when endorsed With a imperfect number of wormholes, E-LPG can accomplish a high privacy level lacking incurring further communication overhead. We evaluated the effectiveness and efficiency of E-LPG owing to theoretical analysis and general simulations. We have shown that E-LPG also generate dramatic synergistic consequence when used among other privacy schemes accompaniment.
Keywords
References
I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci,
―Wireless Sensor Networks: A Survey,‖ Computer Networks, vol. 38,
no. 4, pp. 393-422, 2002.
B. Bamba, L. Liu, P. Pesti, and T. Wang, ―Supporting Anonymous
Location Queries in Mobile Environments with Privacygrid,‖ Proc. Int’l
Conf. World Wide Web (WWW ’08), 2008.
BlueRadios Inc., ―Order and Price Info,‖ http://www.blueradios.
com/orderinfo.htm, Feb. 2006.
B. Bollobas, D. Gamarnik, O. Riordan, and B. Sudakov, ―On the Value
of a Random Minimum Weight Steiner Tree,‖ Combinatorica, vol. 24,
no. 2, pp. 187-207, 2004.
H. Chan, A. Perrig, and D. Song, ―Random Key Predistribution Schemes
for Sensor Networks,‖ Proc. IEEE Symp. Security and Privacy (S&P
’03), pp. 197-213, May 2003.
J. Deng, R. Han, and S. Mishra, ―Enhancing Base Station Security in
Wireless Sensor Networks,‖ Technical Report CU-CS-951-03, Univ. of
Colorado, Dept. of Computer Science, 2003.
J. Deng, R. Han, and S. Mishra, ―Intrusion Tolerance and Anti- Traffic
Analysis Strategies for Wireless Sensor Networks,‖ Proc. Int’l Conf.
Dependable Systems and Networks (DSN ’04), June 2004.
J. Deng, R. Han, and S. Mishra, ―Decorrelating Wireless Sensor
Network Traffic to Inhibit Traffic Analysis Attacks,‖ Pervasive and
Mobile Computing J., Special Issue on Security in Wireless Mobile
Computing Systems, vol. 2, pp. 159-186, Apr. 2006.
L. Eschenauer and V.D. Gligor, ―A Key-Management Scheme for
Distributed Sensor Networks,‖ Proc. ACM Conf. Computer and Comm.
Security (CCS ’02), Nov. 2002.
G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K.L. Tan,
―Private Queries in Location Based Services: Anonymizers are not
Necessary,‖ Proc. ACM SIGMOD Int’l Conf. Management of Data
(SIGMOD ’08), 2008.
H. Gupta, Z. Zhou, S. Das, and Q. Gu, ―Connected Sensor Cover: Self-
Organization of Sensor Networks for Efficient Query Execution,‖
IEEE/ACM Trans. Networking, vol. 14, no. 1, pp. 55- 67, Feb. 2006.
Refbacks
- There are currently no refbacks.
Copyright © 2013, All rights reserved.| ijseat.com
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.
Â