Privacy Preserving from global eavesdropper in Wireless Sensor Network Using Routing Technique
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 4
Abstract
Various sensor network security schemes care for the content of messages, while the related information is left defenceless by divulge the location of the monitored objects. Preserving location privacy is essential and one of the largely challenging problems in lots of mission crucial sensor network applications. Previous solutions are principally designed to defend privacy from regional attackers who eavesdrop on traffic in a petite region at a moment. However, they can be effortlessly defeated by abundantly motivated global attackers that be able to trace the entire network’s communication proceedings. Although a few topical privacy solutions are proposed adjacent to global attackers, they experience from significant communication transparency as they inject dummy traffic or send messages in a globally synchronized method. As a result, they devour a lot of energy to maintain a required privacy level that craft the network lifetime diminutive. We propose an energy-efficient source location privacy preserving solution, handle the Energy Efficient Location Privacy method beside global attackers (E-LPG). E-LPG hides inventive source locations through a spatial scatter of messages with stealthy wormholes and owing to a temporal scatter using random setback when endorsed With a imperfect number of wormholes, E-LPG can accomplish a high privacy level lacking incurring further communication overhead. We evaluated the effectiveness and efficiency of E-LPG owing to theoretical analysis and general simulations. We have shown that E-LPG also generate dramatic synergistic consequence when used among other privacy schemes accompaniment.
Authors and Affiliations
Himasri. P| Student of M.Tech (CSE) and Department of Computer Science Engineering, AITAM, Tekkali, Srikakulam, M. v. b. Chandhra sekhar| Asst.Prof in Department of Computer Science Engineering, AITAM, Tekkali, Srikakulam
A New Approach to Intra-Sub-Cluster File Searching implemented in p2p File System
In internet p2p file sharing system generates more traffic. To get better file query performance cluster the common interested peers based on physical proximity. In this project proposing a proximity aware interest â...
The paper proposes the current online multi-modal distance metric learning (OMDML) with another component of expansion to illuminate the Image equivocalness issue utilizing Conditional Random Field (CRF) Algorithm. T...
Confidential Data with Safeguard Access Control in distributed Cloud Computing
Cloud computing is a safeguard technology which means that privileging permissions for the users and stowing of data on world wide web. Mainly cloud computing focus on Protection and mystery represent major concerns...
Efficiency of Text Mining of Accident Narratives By Accessing Predictive Performance
This work portrays the utilization of content mining with a mix of methods to naturally find accident attributes that can educate a superior comprehension of the supporters of the accidents. The review assesses the v...
Designing of Double Input Integrated Buck-Boost Converter
In this paper, two-input integrated dc-dc converter analysis and control strategies useful to photovoltaic (PV) applications is presented. This dc-dc converter is basically combination of individual buck and buck-boos...