ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Defend the Locations in WSN from Snoopers

Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.3, No. 2)

Publication Date:

Authors : ; ;

Page : 732-739

Keywords : Sensor networks; location privacy;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

In detector network several protocols are exploitation for privacy and preservation of knowledge against aggressor. Such connected data will be manipulate by associate mortal to derive sensitive data like the locations of observe objects and information receivers within the field. Attacks on these elements will considerably undermine any network application.The snooper, is realistic and may defeat these existing technique. It initial formalizes the situation privacy problems in detector networks underneath this robust mortal model and computes a bound on the communication overhead required for achieving a given level of location privacy. It proposes 2 techniques to produce location privacy to sender-location privacy?periodic assortment and sender simulation?and 2 techniques to produce location privacy to Receiver-location privacy?Receiver simulation and backbone flooding. These techniques give trade-offs between privacy, communication value, and latency. Use of those propose techniques, it improves location privacy for each sender and receiver locations.

Last modified: 2014-08-14 22:31:11