Defend the Locations in WSN from Snoopers
Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.3, No. 2)Publication Date: 2014-02-28
Authors : Dinesh Kumar V S; Gopinathan B;
Page : 732-739
Keywords : Sensor networks; location privacy;
Abstract
In detector network several protocols are exploitation for privacy and preservation of knowledge against aggressor. Such connected data will be manipulate by associate mortal to derive sensitive data like the locations of observe objects and information receivers within the field. Attacks on these elements will considerably undermine any network application.The snooper, is realistic and may defeat these existing technique. It initial formalizes the situation privacy problems in detector networks underneath this robust mortal model and computes a bound on the communication overhead required for achieving a given level of location privacy. It proposes 2 techniques to produce location privacy to sender-location privacy?periodic assortment and sender simulation?and 2 techniques to produce location privacy to Receiver-location privacy?Receiver simulation and backbone flooding. These techniques give trade-offs between privacy, communication value, and latency. Use of those propose techniques, it improves location privacy for each sender and receiver locations.
Other Latest Articles
- Multi-Step Verification Environment for a Chip Design using SoC platform
- The Evaluation of a Performance Model for a MOST Network
- Critical Event Monitoring in WSNS using Level-By-Level Offset Based Wake up Pattern
- Design and Implementation of Locally Distributed Web Server Systems using Load Balancer
- Effect of Jute Fibres on Engineering characteristics of Black Cotton Soil
Last modified: 2014-08-14 22:31:11