ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Mitigating Hotspot Locating Attack in Wireless Sensor Network

Journal: International Journal of Science and Research (IJSR) (Vol.2, No. 6)

Publication Date:

Authors : ; ; ;

Page : 366-371

Keywords : Anonymity; Context privacy; Context awareness; Fake event; Source location privacy preserving scheme;

Source : Downloadexternal Find it from : Google Scholarexternal


In wireless sensor network monitored objects can be located by using traffic analysis techniques. Whenever sensors are used to monitor sensitive objects, the privacy of monitored objects locations becomes an important concern. In case of hotspot locating attack, it becomes easier for the adversaries to locate the area from which large numbers of packets are originating called as hotspot, causing the inconsistencies in the network. In this paper we develop a realistic adversary model which can monitor multiple parts of the network and can analyse the traffic in those areas. Next we propose a cloud based privacy preserving scheme by creating fake traffic of irregular shape which provides an efficient mechanism to protect the source nodes location in addition to that we also generate the fake event at a particular time interval so that adversary cannot correlate the expected hotspot regions like pond or river with the inconsistencies in the network. Next we are introducing the concept of context aware location privacy where the sensor nodes are having the ability to perceive the presence of adversary in their vicinity in order to transmit data packets in more energy-efficient manner. Simulation and analytical results demonstrate that our scheme can provide stronger privacy protection

Last modified: 2021-06-30 20:17:50