Mitigating Hotspot Locating Attack in Wireless Sensor Network
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 6, June 2013

Mitigating Hotspot Locating Attack in Wireless Sensor Network

Basavarajeshwari, I Manimozhi, M.Jitendranath

In wireless sensor network monitored objects can be located by using traffic analysis techniques. Whenever sensors are used to monitor sensitive objects, the privacy of monitored objects locations becomes an important concern. In case of hotspot locating attack, it becomes easier for the adversaries to locate the area from which large numbers of packets are originating called as hotspot, causing the inconsistencies in the network. In this paper we develop a realistic adversary model which can monitor multiple parts of the network and can analyse the traffic in those areas. Next we propose a cloud based privacy preserving scheme by creating fake traffic of irregular shape which provides an efficient mechanism to protect the source nodes location in addition to that we also generate the fake event at a particular time interval so that adversary cannot correlate the expected hotspot regions like pond or river with the inconsistencies in the network. Next we are introducing the concept of context aware location privacy where the sensor nodes are having the ability to perceive the presence of adversary in their vicinity in order to transmit data packets in more energy-efficient manner. Simulation and analytical results demonstrate that our scheme can provide stronger privacy protection

Keywords: Anonymity, Context privacy, Context awareness, Fake event, Source location privacy preserving scheme

Edition: Volume 2 Issue 6, June 2013

Pages: 366 - 371

Share this Article

How to Cite this Article?

Basavarajeshwari, I Manimozhi, M.Jitendranath, "Mitigating Hotspot Locating Attack in Wireless Sensor Network", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSRON12013144, Volume 2 Issue 6, June 2013, 366 - 371

79 PDF Views | 68 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Anonymity'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2435 - 2438

A Scalable Approach for Scheduled Data Anonymization Using MapReduce on Cloud

Surumi K S, Joyal Ulahannan

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1253 - 1257

Implementation Details of Anonymization of Sensitive Labels in Collaborative Data Publishing

Vandhana V

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2244 - 2248

Privacy in Location-Based Services

Sampada Sarodaya, S. V. Dabhade

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2573 - 2576

Anonymizing Data Privacy Personalization and the Web

Sandhyarani Hulage, K. M. Varpe

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1600 - 1604

FIM-Anonymizing Using Tree Structured Data

Rabitha T, Farzin Ahammed T

Share this Article

Similar Articles with Keyword 'Context awareness'

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 6, June 2013

Pages: 366 - 371

Mitigating Hotspot Locating Attack in Wireless Sensor Network

Basavarajeshwari, I Manimozhi, M.Jitendranath

Share this Article

Review Papers, Computer Science & Engineering, Indonesia, Volume 6 Issue 11, November 2017

Pages: 1247 - 1251

Trends and Challenges in Developing Context-Aware Music Recommendation Systems

G. A. Vida Mastrika Giri

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 253 - 255

Context Awareness in Data Mining Applications ? A Survey

Sanjeevani S. Dhaneshwar, Manisha R. Patil

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016

Pages: 1030 - 1035

Functional Context Awareness: Measuring and Utilizing the Context Dependency of Mobile Usage

Swati S. Gore, Prachi A. Joshi

Share this Article

Similar Articles with Keyword 'Fake event'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2526 - 2529

A Survey on Problems Faced in Identification of Malicious Data Insertion in Wireless Sensor Networks and Rectification of It

Rohini Divase, S. N. Kini

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 6, June 2013

Pages: 366 - 371

Mitigating Hotspot Locating Attack in Wireless Sensor Network

Basavarajeshwari, I Manimozhi, M.Jitendranath

Share this Article
Top