Mitigating Hotspot Locating Attack in Wireless Sensor Network
Journal Title: International Journal of Science and Research (IJSR) - Year 2013, Vol 2, Issue 6
Abstract
In wireless sensor network monitored objects can be located by using traffic analysis techniques. Whenever sensors are used to monitor sensitive objects, the privacy of monitored objects’ locations becomes an important concern. In case of hotspot locating attack, it becomes easier for the adversaries to locate the area from which large numbers of packets are originating called as hotspot, causing the inconsistencies in the network. In this paper we develop a realistic adversary model which can monitor multiple parts of the network and can analyse the traffic in those areas. Next we propose a cloud based privacy preserving scheme by creating fake traffic of irregular shape which provides an efficient mechanism to protect the source node’s location in addition to that we also generate the fake event at a particular time interval so that adversary cannot correlate the expected hotspot regions like pond or river with the inconsistencies in the network. Next we are introducing the concept of context aware location privacy where the sensor nodes are having the ability to perceive the presence of adversary in their vicinity in order to transmit data packets in more energy-efficient manner. Simulation and analytical results demonstrate that our scheme can provide stronger privacy protection
Comparison of the Physicochemical Properties of Starch from Ginger (Zingiber officinale) and Maize (Zea mays)
Starches were extracted from ginger and maize, and thereafter characterized based on their physicochemical properties. The properties of starch from ginger were then compared with the starch from maize and the following...
Prevalence of Comorbid Conditions in Patients of Chronic Obstructive Pulmonary Disease [COPD] with Acute Exacerbation
"Abstract Bacground Acute exacerbation of chronic obstructive pulmonary disease [AECOPD] often requires hospital admission[in icu] with high mortality. Comorbidity appears to increase the mortality with aecopd. Recent s...
Enhanced and Automated Virtual Machine Provisioning to Online E-assessment using Openstack Cloud
This paper consist of system that efficiently uses the cloud resource provisioning for conducting E-Assessment and automates the resource maintenance in the cloud environment to reduce user activity in cloud management....
Application Research and Penetration Testing on WebSocket Technology
The WebSocket technology provides a bi-directional real time communications for web applications and services. This paper provides the study of the websocket protocol and describes the advantages they provide. This paper...
Experimental Analysis of Augmentation in Heat Transfer Coefficient Using Twisted Tape with Semi-Circular Cut Insert
Research is going on to investigate the level of heat transfer enhancement that can be achieved by forced convection in which water is flow inside horizontal pipe. The use of semi-circular cut inserts generate turbulence...