Privacy Preserving from global eavesdropper in Wireless Sensor Network Using Routing Technique
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 4
Abstract
Various sensor network security schemes care for the content of messages, while the related information is left defenceless by divulge the location of the monitored objects. Preserving location privacy is essential and one of the largely challenging problems in lots of mission crucial sensor network applications. Previous solutions are principally designed to defend privacy from regional attackers who eavesdrop on traffic in a petite region at a moment. However, they can be effortlessly defeated by abundantly motivated global attackers that be able to trace the entire network’s communication proceedings. Although a few topical privacy solutions are proposed adjacent to global attackers, they experience from significant communication transparency as they inject dummy traffic or send messages in a globally synchronized method. As a result, they devour a lot of energy to maintain a required privacy level that craft the network lifetime diminutive. We propose an energy-efficient source location privacy preserving solution, handle the Energy Efficient Location Privacy method beside global attackers (E-LPG). E-LPG hides inventive source locations through a spatial scatter of messages with stealthy wormholes and owing to a temporal scatter using random setback when endorsed With a imperfect number of wormholes, E-LPG can accomplish a high privacy level lacking incurring further communication overhead. We evaluated the effectiveness and efficiency of E-LPG owing to theoretical analysis and general simulations. We have shown that E-LPG also generate dramatic synergistic consequence when used among other privacy schemes accompaniment.
Authors and Affiliations
Himasri. P| Student of M.Tech (CSE) and Department of Computer Science Engineering, AITAM, Tekkali, Srikakulam, M. v. b. Chandhra sekhar| Asst.Prof in Department of Computer Science Engineering, AITAM, Tekkali, Srikakulam
Design & Simulation of 11-level Cascaded H-bridge Grid-tied Inverter for the application of Solar Panels
This paper presents, the design and simulation of 11-level Cascaded H-bridge DC-AC Grid-tied Inverter for the application of solar panels. A 200w solar panel connected to each inverter bridge. OPALRT lab was used as...
A Complete System To Securely Outsource Log Records To A Cloud Provider
In View Of The Fact That Log Files Hold Record Of Most System Events Including User Activities They Turn Out To Be An Important Target For Malicious Attackers. An Attacker Breaking Into A System Normally Would Try No...
Controller Implementation for PV Interconnection Based ThreePhase UPS Systems Operating Under Highly Nonlinear Loads
This paper presents the design of a PV interconnection system based three-phase uninterruptible power supply (UPS) systems that are operating under highly nonlinear loads. The classical high-performance sinusoidal pu...
Scattered simultaneous and autonomous access to scrambled cloud databases
Cloud data environments square measure unpleasantly tempting for the preparing of tremendous scale applications owing to their amazingly ascendible and offered foundation. Data as a Service (DBaaS) model is utilized...
Efficient Solution For Searchable Data Sharing In Public Cloud
Cloud storage providing more facilities like on demand access and convenient Sharing of data by internet. This cloud storage suffers from security as well as data leakage. The main challenging problem is designing ef...