International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Downloads: 108 | Views: 135

Research Proposals or Synopsis | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014

Bidirectional Location Privacy Protection Schemes against Internal Adversary in WSN

Samson Raja T | S. Satheesbabu | Dr. K. Balasubadra

Abstract: Wireless sensor networks (WSNs) consist of numerous small nodes that collect and spread the information for many different types of applications. The major use of WSN is tracking and monitoring the objects, such that the observed objects are also needed the protection. For instance, a WSN can often deploy in hostile environments to detect and collect interested events such as the appearance of a rare animal. However, due to the open characteristic of wireless communications, an adversary can detect the location of a source or sink in networks. Thus the location privacy of both the source and sink becomes a censorious problem in WSNs. Previous research only focuses on the location privacy of the source or sinks independently. A new research proposes the implementation of four location privacy schema to deliver messages from source to sink, which can protect the end-to-end location privacy against local eavesdropper. But, the introduced four location privacy schemes have different performance on protecting the single stationary source, sink or both. As the proposed work, we plan to decompose the provided schemes and analyze the safety period, end to end latency, energy consumption by introduce the new scheme The tree diversionary protection for location privacy at source and sink respectively. Also focusing on optimal combination can be discovered to achieve a highest end to end location privacy protection for multiple mobile sources. Simulation results show that our scheme is very effective to improve the privacy protection while maximizing the network lifetime.

Keywords: Local Adversary, tree diversionary, location privacy wireless sensor networks

Edition: Volume 3 Issue 11, November 2014,

Pages: 2611 - 2615

How to Download this Article?

Type Your Email Address below to Receive the Article PDF Link

Verification Code will appear in 2 Seconds ... Wait