Privacy Preserving from global eavesdropper in Wireless Sensor Network Using Routing Technique
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 4
Abstract
Various sensor network security schemes care for the content of messages, while the related information is left defenceless by divulge the location of the monitored objects. Preserving location privacy is essential and one of the largely challenging problems in lots of mission crucial sensor network applications. Previous solutions are principally designed to defend privacy from regional attackers who eavesdrop on traffic in a petite region at a moment. However, they can be effortlessly defeated by abundantly motivated global attackers that be able to trace the entire network’s communication proceedings. Although a few topical privacy solutions are proposed adjacent to global attackers, they experience from significant communication transparency as they inject dummy traffic or send messages in a globally synchronized method. As a result, they devour a lot of energy to maintain a required privacy level that craft the network lifetime diminutive. We propose an energy-efficient source location privacy preserving solution, handle the Energy Efficient Location Privacy method beside global attackers (E-LPG). E-LPG hides inventive source locations through a spatial scatter of messages with stealthy wormholes and owing to a temporal scatter using random setback when endorsed With a imperfect number of wormholes, E-LPG can accomplish a high privacy level lacking incurring further communication overhead. We evaluated the effectiveness and efficiency of E-LPG owing to theoretical analysis and general simulations. We have shown that E-LPG also generate dramatic synergistic consequence when used among other privacy schemes accompaniment.
Authors and Affiliations
Himasri. P| Student of M.Tech (CSE) and Department of Computer Science Engineering, AITAM, Tekkali, Srikakulam, M. v. b. Chandhra sekhar| Asst.Prof in Department of Computer Science Engineering, AITAM, Tekkali, Srikakulam
Evalauation Of Heat Transfer Characteristics Of Titanium Nitride And Titanium Carbide Nano Fluids In Shell & Tube Heat Exchanger
The Shell and tube heat exchangers signify the most widely used vehicle for the transfer of heat in industrial process and applications. Shell and tube heat exchangers have the capability to transfer huge amounts of...
Dynamic Data Security Assurance In Cloud Computing
Dynamic data security assurance very difficult task in cloud worlds. In general we are using meta clouds for secure communication with secrecy of data management on clouds. But clouds are having heavy difficulties wi...
Harmonics Reduction of a Single Phase Half Bridge Inverter
This paper displays a way to deal with minimize the sounds contained in the output of a solitary stage half scaffold inverter. With a perspective to decreasing Harmonic a LC low pass filter is utilized which hinders...
We show another fine-grained two-factor Authentication (2FA) get the opportunity to control system for electronic conveyed processing organizations. Specifically, in our proposed 2FA access control structure, a quali...
Distributed File System Supporting Parallel Access To Multiple Storage Devices
Our audit of the current Kerberos-based protocol demonstrates that it has various impediments: (i) a metadata server encouraging key trade between the customers and the storage devices has substantial workload that l...