Anonymity Preserving Routing In Location Privacy Schemes In Wireless Sensor Networks
Location privacy measures need to be developed to prevent the opponent from determining the physical locations of source sensors and sinks. An opponent can easily intercept network traffic due to the use of a broadcast medium for routing packets and get detailed information such as packet transmis...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
SAINTGITS College of Engineering
2015-12-01
|
Series: | International Journal of Research and Innovations in Science and Technology |
Subjects: | |
Online Access: | http://journals.saintgits.org/paper-submission/uploads/article/V2%20I2%2001.pdf |
id |
doaj-0168608070ac46e59b4b963ebf61db48 |
---|---|
record_format |
Article |
spelling |
doaj-0168608070ac46e59b4b963ebf61db482020-11-25T02:19:15ZengSAINTGITS College of EngineeringInternational Journal of Research and Innovations in Science and Technology2394-38662394-38582015-12-012216Anonymity Preserving Routing In Location Privacy Schemes In Wireless Sensor NetworksR Regin0Adhiyamaan College of EngineeringLocation privacy measures need to be developed to prevent the opponent from determining the physical locations of source sensors and sinks. An opponent can easily intercept network traffic due to the use of a broadcast medium for routing packets and get detailed information such as packet transmission time and frequency to perform traffic analysis and infer the locations of monitored objects and data sinks. On the other hand, sensors usually have limited processing speed and energy supplies. It is very expensive to apply traditional anonymous communication techniques for hiding the communication between sensor nodes and sinks. The existing source-location privacy protects the location of monitored objects to increase the number of messages sent by the source before the object is located by the attacker. The flooding technique has the source node send each packet through numerous paths to a sink making it difficult for an opponent to trace the source. The locations of sinks can be protected from a local eavesdropper by hashing the ID field in the packet header. But opponent can track sinks by carrying out time correlation and rate monitoring attacks. Besides protection some source nodes are transferring relatively large amounts of data in existing system. As a result, these nodes run out of battery faster due to improper position of nodes and sinks. Thus in the proposed system the sinks should be located as optimally as possible to reduce traffic flow and energy consumption for sensor nodes. Hence Sink placement problem is resolved for minimizing the delay as well as maximizing the lifetime of a WSN. Thus proposed system is efficient in terms of overhead and functionality when compared to existing system.http://journals.saintgits.org/paper-submission/uploads/article/V2%20I2%2001.pdfWSNAnonymousEavesdropperSource Location Privacy.Source Location Privacy |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
R Regin |
spellingShingle |
R Regin Anonymity Preserving Routing In Location Privacy Schemes In Wireless Sensor Networks International Journal of Research and Innovations in Science and Technology WSN Anonymous Eavesdropper Source Location Privacy. Source Location Privacy |
author_facet |
R Regin |
author_sort |
R Regin |
title |
Anonymity Preserving Routing In Location Privacy Schemes In Wireless Sensor Networks |
title_short |
Anonymity Preserving Routing In Location Privacy Schemes In Wireless Sensor Networks |
title_full |
Anonymity Preserving Routing In Location Privacy Schemes In Wireless Sensor Networks |
title_fullStr |
Anonymity Preserving Routing In Location Privacy Schemes In Wireless Sensor Networks |
title_full_unstemmed |
Anonymity Preserving Routing In Location Privacy Schemes In Wireless Sensor Networks |
title_sort |
anonymity preserving routing in location privacy schemes in wireless sensor networks |
publisher |
SAINTGITS College of Engineering |
series |
International Journal of Research and Innovations in Science and Technology |
issn |
2394-3866 2394-3858 |
publishDate |
2015-12-01 |
description |
Location privacy measures need to be developed to prevent the opponent from determining the physical locations of
source sensors and sinks. An opponent can easily intercept network traffic due to the use of a broadcast medium for
routing packets and get detailed information such as packet transmission time and frequency to perform traffic analysis
and infer the locations of monitored objects and data sinks. On the other hand, sensors usually have limited processing
speed and energy supplies. It is very expensive to apply traditional anonymous communication techniques for hiding the
communication between sensor nodes and sinks. The existing source-location privacy protects the location of monitored
objects to increase the number of messages sent by the source before the object is located by the attacker. The flooding
technique has the source node send each packet through numerous paths to a sink making it difficult for an opponent to
trace the source. The locations of sinks can be protected from a local eavesdropper by hashing the ID field in the packet
header. But opponent can track sinks by carrying out time correlation and rate monitoring attacks. Besides protection
some source nodes are transferring relatively large amounts of data in existing system. As a result, these nodes run out
of battery faster due to improper position of nodes and sinks. Thus in the proposed system the sinks should be located as
optimally as possible to reduce traffic flow and energy consumption for sensor nodes. Hence Sink placement problem is
resolved for minimizing the delay as well as maximizing the lifetime of a WSN. Thus proposed system is efficient in
terms of overhead and functionality when compared to existing system. |
topic |
WSN Anonymous Eavesdropper Source Location Privacy. Source Location Privacy |
url |
http://journals.saintgits.org/paper-submission/uploads/article/V2%20I2%2001.pdf |
work_keys_str_mv |
AT rregin anonymitypreservingroutinginlocationprivacyschemesinwirelesssensornetworks |
_version_ |
1724877292330549248 |