Mitigating Hotspot Locating Attack in Wireless Sensor Network

Journal Title: International Journal of Science and Research (IJSR) - Year 2013, Vol 2, Issue 6

Abstract

In wireless sensor network monitored objects can be located by using traffic analysis techniques. Whenever sensors are used to monitor sensitive objects, the privacy of monitored objects’ locations becomes an important concern. In case of hotspot locating attack, it becomes easier for the adversaries to locate the area from which large numbers of packets are originating called as hotspot, causing the inconsistencies in the network. In this paper we develop a realistic adversary model which can monitor multiple parts of the network and can analyse the traffic in those areas. Next we propose a cloud based privacy preserving scheme by creating fake traffic of irregular shape which provides an efficient mechanism to protect the source node’s location in addition to that we also generate the fake event at a particular time interval so that adversary cannot correlate the expected hotspot regions like pond or river with the inconsistencies in the network. Next we are introducing the concept of context aware location privacy where the sensor nodes are having the ability to perceive the presence of adversary in their vicinity in order to transmit data packets in more energy-efficient manner. Simulation and analytical results demonstrate that our scheme can provide stronger privacy protection

Authors and Affiliations

Keywords

Related Articles

Investigation of Flood Prone Areas in Oferekpe Ikwo Local Government Area Ebonyi State Using Electrical Resistivity Method

Abstract: An electrical resistivity survey method of geophysical investigation was conducted at Oferekpe Ikwo L.G.A of Ebonyi State. The aim of the study was to ascertain the areas prone to flooding by investigating th...

The Determination of Minimum Bubbling Velocity, Minimum Fluidization Velocity and Fluidization Index of Fine Powders (Hematite) using Gas-Solid Tapered Beds

The Determination of Minimum Bubbling Velocity, Minimum Fluidization Velocity and Fluidization Index of Fine Powders (Hematite) using Gas-Solid Tapered Beds

"Research on 6 DOF - Steward Platform Mechanical Characteristics Analysis and Optimization Design "

This paper deals with the analysis mechanical characteristics of 6 DOF of Stewart Platform Modeling. The configuration of the sensor is based on the well known Stewart Platform manipulator. The key difference between oth...

R-Restricted Steiner Problem is NP-Complete

This work aims to arrive a Steiner minimum tree with -terminals. Every full component of a Steiner tree contains almost 4 terminals. In this work, we propose to flash R-restricted Steiner problem which is NP-complete.

Antioxidant Properties of Selected Wild Plants

The antioxidant properties of 4 Jordanian plant extracts were studied by chemical assays of total antioxidant capacity and ferric reducing power. The extracts total phenols and flavonoids contents were also determined. T...

Download PDF file
  • EP ID EP336426
  • DOI -
  • Views 96
  • Downloads 0

How To Cite

(2013). Mitigating Hotspot Locating Attack in Wireless Sensor Network. International Journal of Science and Research (IJSR), 2(6), -. https://europub.co.uk./articles/-A-336426