Bidirectional Location Privacy Protection Schemes against Internal Adversary in WSN
Journal: International Journal of Science and Research (IJSR) (Vol.3, No. 11)Publication Date: 2014-11-05
Authors : Samson Raja T; S. Satheesbabu; K. Balasubadra;
Page : 2611-2615
Keywords : Local Adversary; tree diversionary; location privacy wireless sensor networks;
Abstract
Wireless sensor networks (WSNs) consist of numerous small nodes that collect and spread the information for many different types of applications. The major use of WSN is tracking and monitoring the objects, such that the observed objects are also needed the protection. For instance, a WSN can often deploy in hostile environments to detect and collect interested events such as the appearance of a rare animal. However, due to the open characteristic of wireless communications, an adversary can detect the location of a source or sink in networks. Thus the location privacy of both the source and sink becomes a censorious problem in WSNs. Previous research only focuses on the location privacy of the source or sinks independently. A new research proposes the implementation of four location privacy schema to deliver messages from source to sink, which can protect the end-to-end location privacy against local eavesdropper. But, the introduced four location privacy schemes have different performance on protecting the single stationary source, sink or both. As the proposed work, we plan to decompose the provided schemes and analyze the safety period, end to end latency, energy consumption by introduce the new scheme The tree diversionary protection for location privacy at source and sink respectively. Also focusing on optimal combination can be discovered to achieve a highest end to end location privacy protection for multiple mobile sources. Simulation results show that our scheme is very effective to improve the privacy protection while maximizing the network lifetime.
Other Latest Articles
- Productivity and Economics of Some Soil Fertility Management Practices on Cucumber Production in Abakaliki, Southeastern Nigeria
- Design and Implementation of Galios Field Based AES-256 Algorithm for Optimized Cryptosystem
- Longitudinal Stress Analysis of Buried Pipes under Expansive Soils
- Endoscopic Dacryocystorhinostomy: A Prospective Study
- A Review on Web Security Mechanism Performance Evaluation Using Vulnerability and Attack Injection
Last modified: 2021-06-30 21:12:54