International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014

Catching Moles and Packet Droppers in Wireless Sensors Network

Mohammed Hajee, Mohammed Abdul Rawoof

While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such contextual information can be exploited by an adversary to derive sensitive information such as the locations of monitored objects and data sinks in the field. Attacks on these components can significantly undermine any network application. Existing techniques defend the leakage of location information from a limited adversary who can only observe network traffic in a small region. However, a stronger adversary, the global eavesdropper, is realistic and can defeat these existing techniques. This paper first formalizes the location privacy issues in sensor networks under this strong adversary model and computes a lower bound on the communication overhead needed for achieving a given level of location privacy. The paper then proposes two techniques to provide location privacy to monitored objects (source location privacy) periodic collection and source simulation and two techniques to provide location privacy to data sinks (sink location privacy) sink simulation and backbone flooding. These techniques provide trade-offs between privacy, communication cost, and latency. Through analysis and simulation, we demonstrate that the proposed techniques are efficient and effective for source and sink location privacy in sensor networks

Keywords: Sensor Network, Sink simulation, Backbone Flooding, Latency, cost

Edition: Volume 3 Issue 9, September 2014

Pages: 1882 - 1884


How to Cite this Article?

Mohammed Hajee, Mohammed Abdul Rawoof, "Catching Moles and Packet Droppers in Wireless Sensors Network", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=11091402, Volume 3 Issue 9, September 2014, 1882 - 1884

26 PDF Views | 26 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Sensor Network'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 685 - 689

Secure Routing in Wireless Sensor Networks through the Identified Trusted Node

D. Latha, K. Palanivel

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1658 - 1660

A Review of Pairwise Key Establishment Techniques for Wireless Sensor Networks

Dinesh Dhakar, Ravi Khatri

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1422 - 1430

Security Schemes to Resolve Wormhole Attack in Distributed Sensor Networks

Sharada Y. Yalavigi, Dr. Krishnamurthy G. N, Dr. Nandini Sidnal

Share this article



Similar Articles with Keyword 'Latency'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 6, June 2020

Pages: 901 - 905

Low Latency Placement for Effective Fog based Infrastructure

Dr. Varsha Jotwani

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1888 - 1891

Lightning CEP - Joining on High Velocity Stream

Vikas Kale, Kishor Shedge

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1107 - 1110

Delivery Delay and Distribution in DTN using Probabilistic Routing of Packets

Heena Arora, Gagandeep Singh, Sahil

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2591 - 2595

DASU: High Quality Video Streaming Over Multiple Wireless Access Network Using Real Time Adaptive Algorithm

Prathibha T P

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1699 - 1703

Multipath Routing in Delay Tolerant Networks Using Hypercube Based Social Feature

Prajakta B. Bhosale, H. A. Hingoliwala

Share this article



Similar Articles with Keyword 'cost'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1884 - 1886

Performance Analysis of Clustal W Algorithm on Linux Cluster

Swati Jasrotia, Salam Din

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 3075 - 3078

Maintaining Privacy in Location Sharing Using LOCX

Syeda Maimuna Afreen, Shameem Akther

Share this article

Comparative Studies, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1664 - 1667

Over View of Past Literature and Making Comparative Analysis Along with Our Strategy of Materialized View Selection

Sapna Choudhary, Roshna Mahajan

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2369 - 2372

Multi-Level Complex Key Sharing For Secure Access and Authorization on Cloud Platforms

Jaskarandeep Punia, Rajesh Kumar Bawa

Share this article
Top