Anonymity Preserving Routing In Location Privacy Schemes In Wireless Sensor Networks

Location privacy measures need to be developed to prevent the opponent from determining the physical locations of source sensors and sinks. An opponent can easily intercept network traffic due to the use of a broadcast medium for routing packets and get detailed information such as packet transmis...

Full description

Bibliographic Details
Main Author: R Regin
Format: Article
Language:English
Published: SAINTGITS College of Engineering 2015-12-01
Series:International Journal of Research and Innovations in Science and Technology
Subjects:
WSN
Online Access:http://journals.saintgits.org/paper-submission/uploads/article/V2%20I2%2001.pdf
id doaj-0168608070ac46e59b4b963ebf61db48
record_format Article
spelling doaj-0168608070ac46e59b4b963ebf61db482020-11-25T02:19:15ZengSAINTGITS College of EngineeringInternational Journal of Research and Innovations in Science and Technology2394-38662394-38582015-12-012216Anonymity Preserving Routing In Location Privacy Schemes In Wireless Sensor NetworksR Regin0Adhiyamaan College of EngineeringLocation privacy measures need to be developed to prevent the opponent from determining the physical locations of source sensors and sinks. An opponent can easily intercept network traffic due to the use of a broadcast medium for routing packets and get detailed information such as packet transmission time and frequency to perform traffic analysis and infer the locations of monitored objects and data sinks. On the other hand, sensors usually have limited processing speed and energy supplies. It is very expensive to apply traditional anonymous communication techniques for hiding the communication between sensor nodes and sinks. The existing source-location privacy protects the location of monitored objects to increase the number of messages sent by the source before the object is located by the attacker. The flooding technique has the source node send each packet through numerous paths to a sink making it difficult for an opponent to trace the source. The locations of sinks can be protected from a local eavesdropper by hashing the ID field in the packet header. But opponent can track sinks by carrying out time correlation and rate monitoring attacks. Besides protection some source nodes are transferring relatively large amounts of data in existing system. As a result, these nodes run out of battery faster due to improper position of nodes and sinks. Thus in the proposed system the sinks should be located as optimally as possible to reduce traffic flow and energy consumption for sensor nodes. Hence Sink placement problem is resolved for minimizing the delay as well as maximizing the lifetime of a WSN. Thus proposed system is efficient in terms of overhead and functionality when compared to existing system.http://journals.saintgits.org/paper-submission/uploads/article/V2%20I2%2001.pdfWSNAnonymousEavesdropperSource Location Privacy.Source Location Privacy
collection DOAJ
language English
format Article
sources DOAJ
author R Regin
spellingShingle R Regin
Anonymity Preserving Routing In Location Privacy Schemes In Wireless Sensor Networks
International Journal of Research and Innovations in Science and Technology
WSN
Anonymous
Eavesdropper
Source Location Privacy.
Source Location Privacy
author_facet R Regin
author_sort R Regin
title Anonymity Preserving Routing In Location Privacy Schemes In Wireless Sensor Networks
title_short Anonymity Preserving Routing In Location Privacy Schemes In Wireless Sensor Networks
title_full Anonymity Preserving Routing In Location Privacy Schemes In Wireless Sensor Networks
title_fullStr Anonymity Preserving Routing In Location Privacy Schemes In Wireless Sensor Networks
title_full_unstemmed Anonymity Preserving Routing In Location Privacy Schemes In Wireless Sensor Networks
title_sort anonymity preserving routing in location privacy schemes in wireless sensor networks
publisher SAINTGITS College of Engineering
series International Journal of Research and Innovations in Science and Technology
issn 2394-3866
2394-3858
publishDate 2015-12-01
description Location privacy measures need to be developed to prevent the opponent from determining the physical locations of source sensors and sinks. An opponent can easily intercept network traffic due to the use of a broadcast medium for routing packets and get detailed information such as packet transmission time and frequency to perform traffic analysis and infer the locations of monitored objects and data sinks. On the other hand, sensors usually have limited processing speed and energy supplies. It is very expensive to apply traditional anonymous communication techniques for hiding the communication between sensor nodes and sinks. The existing source-location privacy protects the location of monitored objects to increase the number of messages sent by the source before the object is located by the attacker. The flooding technique has the source node send each packet through numerous paths to a sink making it difficult for an opponent to trace the source. The locations of sinks can be protected from a local eavesdropper by hashing the ID field in the packet header. But opponent can track sinks by carrying out time correlation and rate monitoring attacks. Besides protection some source nodes are transferring relatively large amounts of data in existing system. As a result, these nodes run out of battery faster due to improper position of nodes and sinks. Thus in the proposed system the sinks should be located as optimally as possible to reduce traffic flow and energy consumption for sensor nodes. Hence Sink placement problem is resolved for minimizing the delay as well as maximizing the lifetime of a WSN. Thus proposed system is efficient in terms of overhead and functionality when compared to existing system.
topic WSN
Anonymous
Eavesdropper
Source Location Privacy.
Source Location Privacy
url http://journals.saintgits.org/paper-submission/uploads/article/V2%20I2%2001.pdf
work_keys_str_mv AT rregin anonymitypreservingroutinginlocationprivacyschemesinwirelesssensornetworks
_version_ 1724877292330549248