Privacy Preserving from global eavesdropper in Wireless Sensor Network Using Routing Technique
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 4
Abstract
Various sensor network security schemes care for the content of messages, while the related information is left defenceless by divulge the location of the monitored objects. Preserving location privacy is essential and one of the largely challenging problems in lots of mission crucial sensor network applications. Previous solutions are principally designed to defend privacy from regional attackers who eavesdrop on traffic in a petite region at a moment. However, they can be effortlessly defeated by abundantly motivated global attackers that be able to trace the entire network’s communication proceedings. Although a few topical privacy solutions are proposed adjacent to global attackers, they experience from significant communication transparency as they inject dummy traffic or send messages in a globally synchronized method. As a result, they devour a lot of energy to maintain a required privacy level that craft the network lifetime diminutive. We propose an energy-efficient source location privacy preserving solution, handle the Energy Efficient Location Privacy method beside global attackers (E-LPG). E-LPG hides inventive source locations through a spatial scatter of messages with stealthy wormholes and owing to a temporal scatter using random setback when endorsed With a imperfect number of wormholes, E-LPG can accomplish a high privacy level lacking incurring further communication overhead. We evaluated the effectiveness and efficiency of E-LPG owing to theoretical analysis and general simulations. We have shown that E-LPG also generate dramatic synergistic consequence when used among other privacy schemes accompaniment.
Authors and Affiliations
Himasri. P| Student of M.Tech (CSE) and Department of Computer Science Engineering, AITAM, Tekkali, Srikakulam, M. v. b. Chandhra sekhar| Asst.Prof in Department of Computer Science Engineering, AITAM, Tekkali, Srikakulam
Collective Conviction Based Confidentiality Sustain Endorsement Procedure in Cloud Computing
Cloud computing is consistently growing as a typical for sharing the knowledge over the remote warehousing in a web cloud server. Cloud administrations offers awing enhancements for the purchasers to understand the on...
Direct Power Control Algorithm for Electric Traction Systems
In this paper presents a direct power control-based algorithm is used for general filtering and unbalance compensation scheme for electric traction systems. This method can improve the power flow exchange between the...
IDDR Scheme for a Potential Based Multi Path Dynamic Routing Algorithm
Applications running on the same (WSN) stage more often than not have diverse Quality of Service (QoS) prerequisites. Two fundamental prerequisites are low deferral and high information integrity. In any case, by and...
An Efficient Data User Authentication Protocol to Enable Data User Revocation
Cloud computing offer favorable circumstances to individual customers and affiliations which minimizes endeavor and resource use cost. Information owners sending the data to cloud servers without adjacent data organi...
A NEW EXTENSIBLE KEY EXCHANGE SCHEME FOR WIRELESS SENSOR NETWORKS
A sensor network is confident of a large number of sensor nodes Sensor nodes are small, low-cost, low-power devices that have following performance communicate on short distances sense environmental data perform limi...