International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 6, June 2013

Mitigating Hotspot Locating Attack in Wireless Sensor Network

Basavarajeshwari, I Manimozhi, M.Jitendranath

In wireless sensor network monitored objects can be located by using traffic analysis techniques. Whenever sensors are used to monitor sensitive objects, the privacy of monitored objects locations becomes an important concern. In case of hotspot locating attack, it becomes easier for the adversaries to locate the area from which large numbers of packets are originating called as hotspot, causing the inconsistencies in the network. In this paper we develop a realistic adversary model which can monitor multiple parts of the network and can analyse the traffic in those areas. Next we propose a cloud based privacy preserving scheme by creating fake traffic of irregular shape which provides an efficient mechanism to protect the source nodes location in addition to that we also generate the fake event at a particular time interval so that adversary cannot correlate the expected hotspot regions like pond or river with the inconsistencies in the network. Next we are introducing the concept of context aware location privacy where the sensor nodes are having the ability to perceive the presence of adversary in their vicinity in order to transmit data packets in more energy-efficient manner. Simulation and analytical results demonstrate that our scheme can provide stronger privacy protection

Keywords: Anonymity, Context privacy, Context awareness, Fake event, Source location privacy preserving scheme

Edition: Volume 2 Issue 6, June 2013

Pages: 366 - 371


How to Cite this Article?

Basavarajeshwari, I Manimozhi, M.Jitendranath, "Mitigating Hotspot Locating Attack in Wireless Sensor Network", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSRON12013144, Volume 2 Issue 6, June 2013, 366 - 371

24 PDF Views | 20 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Anonymity'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1640 - 1647

Privacy Preservation Protection for Personalized Web User by k-Anonymity with Profile Construction for Web Search Engines

Uma Maheswari.T, Dr.V. Kavitha

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1454 - 1457

A Reliable Method for Accuracy Constrained Privacy Preservation for Relational Data

Waghmare Ashwini R, V. M. Jarali

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1253 - 1257

Implementation Details of Anonymization of Sensitive Labels in Collaborative Data Publishing

Vandhana V

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1987 - 1989

Secured Routing Using ALERT in MANETs

Aniket K. Khasnikar, Smita Kapse

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1845 - 1848

A Cloud Storage System for Preserving Privacy and Data Integrity of User

M. S. Tore, S. K. Sonkar

Share this article

Similar Articles with Keyword 'Context awareness'

Review Papers, Computer Science & Engineering, Indonesia, Volume 6 Issue 11, November 2017

Pages: 1247 - 1251

Trends and Challenges in Developing Context-Aware Music Recommendation Systems

G. A. Vida Mastrika Giri

Share this article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 6, June 2013

Pages: 366 - 371

Mitigating Hotspot Locating Attack in Wireless Sensor Network

Basavarajeshwari, I Manimozhi, M.Jitendranath

Share this article

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016

Pages: 1030 - 1035

Functional Context Awareness: Measuring and Utilizing the Context Dependency of Mobile Usage

Swati S. Gore, Prachi A. Joshi

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 253 - 255

Context Awareness in Data Mining Applications ? A Survey

Sanjeevani S. Dhaneshwar, Manisha R. Patil

Share this article

Similar Articles with Keyword 'Fake event'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2526 - 2529

A Survey on Problems Faced in Identification of Malicious Data Insertion in Wireless Sensor Networks and Rectification of It

Rohini Divase, S. N. Kini

Share this article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 6, June 2013

Pages: 366 - 371

Mitigating Hotspot Locating Attack in Wireless Sensor Network

Basavarajeshwari, I Manimozhi, M.Jitendranath

Share this article

Top