Privacy Preserving from global eavesdropper in Wireless Sensor Network Using Routing Technique
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 4
Abstract
Various sensor network security schemes care for the content of messages, while the related information is left defenceless by divulge the location of the monitored objects. Preserving location privacy is essential and one of the largely challenging problems in lots of mission crucial sensor network applications. Previous solutions are principally designed to defend privacy from regional attackers who eavesdrop on traffic in a petite region at a moment. However, they can be effortlessly defeated by abundantly motivated global attackers that be able to trace the entire network’s communication proceedings. Although a few topical privacy solutions are proposed adjacent to global attackers, they experience from significant communication transparency as they inject dummy traffic or send messages in a globally synchronized method. As a result, they devour a lot of energy to maintain a required privacy level that craft the network lifetime diminutive. We propose an energy-efficient source location privacy preserving solution, handle the Energy Efficient Location Privacy method beside global attackers (E-LPG). E-LPG hides inventive source locations through a spatial scatter of messages with stealthy wormholes and owing to a temporal scatter using random setback when endorsed With a imperfect number of wormholes, E-LPG can accomplish a high privacy level lacking incurring further communication overhead. We evaluated the effectiveness and efficiency of E-LPG owing to theoretical analysis and general simulations. We have shown that E-LPG also generate dramatic synergistic consequence when used among other privacy schemes accompaniment.
Authors and Affiliations
Himasri. P| Student of M.Tech (CSE) and Department of Computer Science Engineering, AITAM, Tekkali, Srikakulam, M. v. b. Chandhra sekhar| Asst.Prof in Department of Computer Science Engineering, AITAM, Tekkali, Srikakulam
Recursive Approach to the Design of a Parallel Self Timed Adder
As innovation scales down into the lower nanometer values control, postpone region and recurrence gets to be im¬portant parameters for the examination and plan of any circuits. This short exhibits a parallel single-...
Enhancing Performance of Data Access by using Cooperative Caching in Disruption Tolerant Networks
An interruption tolerant system (DTN) is a system outlined so that transitory or irregular correspondences issues, restrictions and peculiarities have the slightest conceivable antagonistic effect Disruption tolerant...
The Competent Service Management and Reliable Trustworthiness in Cloud Environment
Presently days, Cloud Computing is having trust area in innovative work regardless of loads of work in the stream. There are number of research issues in this section including trust management, privacy, security, re...
Simulation of an Efficient Hybrid Transformer DC-DC Converter for PV Based Renewable Energy Sources -Power Conditioning Systems (PCS) Applications with High Boost Ratio
With the increase in renewable energy resources there is need for better conversion devices. as most of the renewable energy resources are low voltage devices like PV cells and fuel cells the voltage needs to be step...
Secure Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
publish–subscribe is a messaging pattern where senders of messages, called publishers, do not program the messages to be sent directly to specific receivers, called subscribers. provisioning of basic security mechan...