Privacy Preserving from global eavesdropper in Wireless Sensor Network Using Routing Technique
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 4
Abstract
Various sensor network security schemes care for the content of messages, while the related information is left defenceless by divulge the location of the monitored objects. Preserving location privacy is essential and one of the largely challenging problems in lots of mission crucial sensor network applications. Previous solutions are principally designed to defend privacy from regional attackers who eavesdrop on traffic in a petite region at a moment. However, they can be effortlessly defeated by abundantly motivated global attackers that be able to trace the entire network’s communication proceedings. Although a few topical privacy solutions are proposed adjacent to global attackers, they experience from significant communication transparency as they inject dummy traffic or send messages in a globally synchronized method. As a result, they devour a lot of energy to maintain a required privacy level that craft the network lifetime diminutive. We propose an energy-efficient source location privacy preserving solution, handle the Energy Efficient Location Privacy method beside global attackers (E-LPG). E-LPG hides inventive source locations through a spatial scatter of messages with stealthy wormholes and owing to a temporal scatter using random setback when endorsed With a imperfect number of wormholes, E-LPG can accomplish a high privacy level lacking incurring further communication overhead. We evaluated the effectiveness and efficiency of E-LPG owing to theoretical analysis and general simulations. We have shown that E-LPG also generate dramatic synergistic consequence when used among other privacy schemes accompaniment.
Authors and Affiliations
Himasri. P| Student of M.Tech (CSE) and Department of Computer Science Engineering, AITAM, Tekkali, Srikakulam, M. v. b. Chandhra sekhar| Asst.Prof in Department of Computer Science Engineering, AITAM, Tekkali, Srikakulam
A Structure of Adaptive Portable Video Streaming and Efficient Social Video Distribution in the Clouds
Recently there have been many studies on how to improve the service quality of mobile video streaming on cloud computing. Resilience against cloud provider failure and temporary unavailabilityUse multiple cloud provi...
In FSW, a rotating cylindrical pin tool is forced to plunge in to the plates to be welded and moved along their contact line. The tool penetrates into the work pieces. During this operation, frictional heat that is g...
Monitoring and minimizing the Total Energy consumption in Mobile Nodes at the end-to-end Quality of Service
In general mobile networks are highly unpredictable at the end-to-end quality-ofservice (QoS) and the scale of the individual node. Due to its high requirement and complicated security issues researchers concentrated...
Results Search from Web Databases using automatic Annotation Wrapper
Web database technologies define the way that these forms canconnect to and retrieve data from database servers.Now a day’s countlessdatabases have become web accessible through HTML form-based search interfaces. A...
DESIGN AND OPTIMIZATION OF FIN TUBE EVAPORATOR BY VARYING DIFFERENT PARAMETERS
An evaporator is use in an air-conditioning system or refrigeration system to allow a compressed cooling chemical, such as Freon or R-22, to evaporate from liquid to gas while enthralling heat in the process. It is a...