ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Bidirectional Location Privacy Protection Schemes against Internal Adversary in WSN

Journal: International Journal of Science and Research (IJSR) (Vol.3, No. 11)

Publication Date:

Authors : ; ; ;

Page : 2611-2615

Keywords : Local Adversary; tree diversionary; location privacy wireless sensor networks;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Wireless sensor networks (WSNs) consist of numerous small nodes that collect and spread the information for many different types of applications. The major use of WSN is tracking and monitoring the objects, such that the observed objects are also needed the protection. For instance, a WSN can often deploy in hostile environments to detect and collect interested events such as the appearance of a rare animal. However, due to the open characteristic of wireless communications, an adversary can detect the location of a source or sink in networks. Thus the location privacy of both the source and sink becomes a censorious problem in WSNs. Previous research only focuses on the location privacy of the source or sinks independently. A new research proposes the implementation of four location privacy schema to deliver messages from source to sink, which can protect the end-to-end location privacy against local eavesdropper. But, the introduced four location privacy schemes have different performance on protecting the single stationary source, sink or both. As the proposed work, we plan to decompose the provided schemes and analyze the safety period, end to end latency, energy consumption by introduce the new scheme The tree diversionary protection for location privacy at source and sink respectively. Also focusing on optimal combination can be discovered to achieve a highest end to end location privacy protection for multiple mobile sources. Simulation results show that our scheme is very effective to improve the privacy protection while maximizing the network lifetime.

Last modified: 2021-06-30 21:12:54