ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Protecting Location Privacy in Sensor Networks against a Global Eavesdropper Using Fake Objects and Fake Sink

Journal: International Journal of Scientific Engineering and Research (IJSER) (Vol.3, No. 8)

Publication Date:

Authors : ; ;

Page : 136-139

Keywords : WSN; location privacy; sink node; object.;

Source : Downloadexternal Find it from : Google Scholarexternal


Sensor Networks are employed in several applications eg. habitat monitoring, military tracking. Whenever sensor networks are used to monitor sensitive objects the privacy of objects location becomes important issue. To safeguard such necessary info, goodly effort in sensor network security has targeted on providing security services like integrity, confidentiality, accessibility, and authentication. These security necessities aren't sufficient in case of location privacy application. The contextual info may be disclosed by the communication patterns of sensors itself. In WSN, sensor data is distributed from sensor node to sink node. This data is sent using comparatively fixed path. The bound traffic patterns are created during this procedure that is analyzed by attacker to search out the placement of either source sensor or sink node. Once attacker is aware of the placement of either source sensor or sink node he will establish the spot of object. Suppressing or hiding the location of object becomes necessary if it's representing a sensitive entity like soldier or an endangered species. Source sensor location privacy and sink location privacy are necessary tasks in an order to stay object safe. during this paper we've got used location privacy techniques together to safeguard the source sensor and sink, successively to safeguard the article from being disclosed. Sensors are low power devices. Very little power is employed for the sensing operation however the most power of sensor is used for transmission and reception of the packets or messages, so communication overhead should be reduced. In this paper we've got targeted on the technique that uses the less variety of packets to cover the location of source sensor and sink and in turn hides location of object.

Last modified: 2021-07-08 15:26:54