Open Access Open Access  Restricted Access Subscription Access

Advanced Source Location Privacy Protection Scheme for Wireless Sensor Networks

Prasanth .

Abstract


Remote Sensor Organization (WSN) is framework less. This is mostly utilized for target checking, target location by setting in an impromptu style. Thus, in a remote organization target need to be secured. However, the organization can't conceal source forever yet it is fit for expanding the wellbeing time. The two information protection and area protection are mean a lot to WSN security. On account of information security there are many scrambling calculation to safeguard information. Yet, it is unimaginable on account of source area protection. While taking source area security there is source area protection and sink area security. Source area security procedures will fall by and large by following back by the aggressor. Concealing the source area is a vital test in WSNs since the area of a source sensor gives relevant data about an occasion. In WSNs, different methodologies are used to protect the source area. One of these techniques covered the source areas by utilizing counterfeit sources. Apparition hubs were used in one more strategy to safeguard the source area. Albeit the ongoing frameworks work pretty well with the utilization of phony sources and ghost hubs. The effective method for safeguarding source area protection is utilizing of both ghost hubs and phony hubs. There is assurance of phony source to shield from enemy which is picked by arbitrarily. So deciding phony sources by way augmentation which assists with expanding the wellbeing time. PEM is finished after the underlying phony not entirely settled, every one of them will pick another phony source from its neighbor. There by can expand the wellbeing time.

 


Full Text:

PDF

References


Bradbury, M., Jhumka, A., & Leeke, M. (2018). Hybrid online protocols for source location privacy in wireless sensor networks. Journal of Parallel and Distributed Computing, 115, 67-81.

Chen, J., Lin, Z., Hu, Y., & Wang, B. (2015). Hiding the source based on limited flooding for sensor networks. Sensors, 15(11), 29129-29148.

Han, G., Miao, X., Wang, H., Guizani, M., & Zhang, W. (2019). CPSLP: A cloud-based scheme for protecting source location privacy in wireless sensor networks using multi-sinks. IEEE Transactions on Vehicular Technology, 68(3), 2739-2750.

Wang, H., Han, G., Zhang, W., Guizani, M., & Chan, S. (2019). A probabilistic source location privacy protection scheme in wireless sensor networks. IEEE Transactions on Vehicular Technology, 68(6), 5917-5927.

Ozturk, C., Zhang, Y., & Trappe, W. (2004, October). Source-location privacy in energy-constrained sensor network routing. In Proceedings of the 2nd ACM workshop on Security of Ad hoc and Sensor Networks (pp. 88-93).

Thomason, A., Leeke, M., Bradbury, M., & Jhumka, A. (2013, July). Evaluating the impact of broadcast rates and collisions on fake source protocols for source location privacy. In 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (pp. 667-674). IEEE.

Long, J., Dong, M., Ota, K., & Liu, A. (2014). Achieving source location privacy and network lifetime maximization through tree-based diversionary routing in wireless sensor networks. IEEE Access, 2, 633-651.

Roy, P. K., Singh, J. P., Kumar, P., & Singh, M. P. (2015). Source location privacy using fake source and phantom routing (FSAPR) technique in wireless sensor networks. Procedia Computer Science, 57, 936-941.

Mutalemwa, L. C., & Shin, S. (2020). Secure routing protocols for source node privacy protection in multi-hop communication wireless networks. Energies, 13(2), 292.

Laikin, J. F., Bradbury, M., Gu, C., & Leeke, M. (2016, December). Towards fake sources for source location privacy in wireless sensor networks with multiple sources. In 2016 IEEE international conference on communication systems (ICCS) (pp. 1-6). IEEE.


Refbacks

  • There are currently no refbacks.