Secured Approaches to Sink Location Privacy Protection in Wireless Sensor Network

نویسندگان

  • Abhishek R. Malviya
  • Balaso N. Jagdale
چکیده

Wireless Sensor Network (WSN) is a broad network consisting of a number of sensor nodes in it. WSN is used mainly for monitoring and data aggregation purpose. A best plan of opponent may to attack the sink node which is the aggregation point for the whole network. So, first there comes a need to secure the sink node from adversary. There are previous work are done by providing location privacy to sink node that are capable of defeating the limited adversary called local eavesdropper who can only observe network traffic in a small region but very few techniques has been proposed to achieve protection against the stronger adversary called global eavesdropper. This paper formalizes the essence of various sink location privacy-preserving schemes for wireless sensor networks and the proposed approaches first tries to modify the existing sink location privacy protection scheme by creating zones in the network and other keeps the sink mobile in the network and both tries to increase privacy protection strength of the

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Sink Location Service Based on Fano Plane in Wireless Sensor Networks

Sink location is considered as a basic service in geographic routing in wireless sensor networks. Obtaining the location of sink node by source node using an efficient method with low complexity has always been a challenging issue in research. In this paper, a sink location algorithm based on Fano plane is proposed. The research challenge is how to ensure the intersection of two SLQ (Location Q...

متن کامل

Sink Location Privacy Protection in Wireless Sensor Network

Wireless Sensor Network (WSN) is a broad network consisting of a number of sensor nodes in it. WSN is used mainly for monitoring and data aggregation purpose. A best plan of opponent may attack the sink node which is the aggregation point for the whole network. So, first there comes a need to secure the sink node from adversary. There are previous work are done by providing location privacy to ...

متن کامل

Location Privacy in Wireless Sensor Networks

The insecure atmospheres makes easy for an adversary to eavesdrop the network in a wireless sensor network. An eclectic collection of protocols are available for providing content privacy but the contextual information remains unprotected. So an adversary can use this contextual information to carry out attack on source node or the sink node in sensor network. The current approaches for locatio...

متن کامل

Protection of Source and Sink in Wireless Sensor Networks

The deliberation of interloper is to interrupt the communication or to invade the location of sender and receiver. One of the primary concerns of wireless sensor networks is the privacy of sender and receiver. There is always a threat of eavesdropper. The chief objective of this paper is to achieve a high degree of security for both source and sink. Due to an open characteristic of wireless sen...

متن کامل

Preventing Attacks from Eavesdropper Using HMAC Protocol in Wireless Sensor Networks

A wireless sensor network (WSN) is composed of numerous small sensing devices with limited communication range. The sensors collect data from the environment and report them to the sinks. With the promising sensing and wireless technologies, sensor networks are expected to be widely deployed in a broad spectrum of civil and military applications. Location information of the sinks, the sensors, ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015