Privacy Preserving from global eavesdropper in Wireless Sensor Network Using Routing Technique
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 4
Abstract
Various sensor network security schemes care for the content of messages, while the related information is left defenceless by divulge the location of the monitored objects. Preserving location privacy is essential and one of the largely challenging problems in lots of mission crucial sensor network applications. Previous solutions are principally designed to defend privacy from regional attackers who eavesdrop on traffic in a petite region at a moment. However, they can be effortlessly defeated by abundantly motivated global attackers that be able to trace the entire network’s communication proceedings. Although a few topical privacy solutions are proposed adjacent to global attackers, they experience from significant communication transparency as they inject dummy traffic or send messages in a globally synchronized method. As a result, they devour a lot of energy to maintain a required privacy level that craft the network lifetime diminutive. We propose an energy-efficient source location privacy preserving solution, handle the Energy Efficient Location Privacy method beside global attackers (E-LPG). E-LPG hides inventive source locations through a spatial scatter of messages with stealthy wormholes and owing to a temporal scatter using random setback when endorsed With a imperfect number of wormholes, E-LPG can accomplish a high privacy level lacking incurring further communication overhead. We evaluated the effectiveness and efficiency of E-LPG owing to theoretical analysis and general simulations. We have shown that E-LPG also generate dramatic synergistic consequence when used among other privacy schemes accompaniment.
Authors and Affiliations
Himasri. P| Student of M.Tech (CSE) and Department of Computer Science Engineering, AITAM, Tekkali, Srikakulam, M. v. b. Chandhra sekhar| Asst.Prof in Department of Computer Science Engineering, AITAM, Tekkali, Srikakulam
The ever-increasing integration of highly diverse enabled data generating technologies in medical, biomedical and healthcare fields and the growing availability of data at the central location that can be used in nee...
A Study to Learn Robust and Discriminative Representation to Tackle Cyber bullying Detection
We build up another content portrayal display in view of a variation of SDA: marginalized stacked denoising autoencoders (mSDA), which receives straight rather than nonlinear projection to quicken preparing and minim...
We propose a novel answer for cross-site cold-start item suggestion, which intends to we show a nonspecific information genealogy structure GDP(Generic Data Protection) for information stream over different elements...
The Evolution of Microprocessor Chip: A historic overview of development
In this paper we aredescribing the more interesting segments like, external structure of microprocessor chip(the birth of microprocessor) from silicon element becausemost of IT student does not have knowledge about t...
Early detection of Knee Osteoarthritis using SVM Classifier
Osteoarthritis of Knee (KOA) is the most commonly found arthritis types. It is distinguished by wearing away of cartilage which is meant to ensure smooth movement between bones in joints. As a result of the wearing a...