CFP last date
20 May 2024
Reseach Article

A Deviated Location and Updated Node Identity based Security Scheme for Preserving Source Node Location Privacy in Wireless Sensor Network

by Neha Sahu, Sanjay Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 100 - Number 18
Year of Publication: 2014
Authors: Neha Sahu, Sanjay Sharma
10.5120/17622-8360

Neha Sahu, Sanjay Sharma . A Deviated Location and Updated Node Identity based Security Scheme for Preserving Source Node Location Privacy in Wireless Sensor Network. International Journal of Computer Applications. 100, 18 ( August 2014), 1-8. DOI=10.5120/17622-8360

@article{ 10.5120/17622-8360,
author = { Neha Sahu, Sanjay Sharma },
title = { A Deviated Location and Updated Node Identity based Security Scheme for Preserving Source Node Location Privacy in Wireless Sensor Network },
journal = { International Journal of Computer Applications },
issue_date = { August 2014 },
volume = { 100 },
number = { 18 },
month = { August },
year = { 2014 },
issn = { 0975-8887 },
pages = { 1-8 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume100/number18/17622-8360/ },
doi = { 10.5120/17622-8360 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:30:16.008280+05:30
%A Neha Sahu
%A Sanjay Sharma
%T A Deviated Location and Updated Node Identity based Security Scheme for Preserving Source Node Location Privacy in Wireless Sensor Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 100
%N 18
%P 1-8
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With a increased area of the applications of WSN, the security mechanisms are rising issue of outmost concern. The most important challenges threatening the successful installation of sensor systems is its privacy. Many privacy-related issues has been addressed by security mechanisms, but one sensor network privacy issue that cannot be adequately addressed by network security is source-location privacy One important class of sensor-driven applications is to monitor a valuable resources. For instance, sensors will be deployed in places like natural habitats to monitor the activities of endangered animals, or may be used in military purposes. In these asset monitoring applications, it is important to provide security to the source sensor's location. In this paper, we had proposed security scheme for preserving source node location privacy. We had developed a model assuming that attacker can monitor traffic in small area instead of whole network. Finally, we proposed a deviated location and updated node identity based scheme for efficiently protecting source node from hotspot locating attack. The protection scheme has shown the better performance which is proved by simulation results. The protection scheme has recovered the network performance in presence of attacker and provides attack free environment.

References
  1. Chris Karlof, David Wagner, "Secure Routing in Wireless Sensor Networks", Attacks and Countermeasures", Ad Hoc Networks (elsevier), Page: 299-302, 2003.
  2. C. Y. Chong and S. P. Kumar, "Sensor networks: Evolution, opportunities, and challenges," in IEEE Proceedings, pp. 1247–1254, Aug. 2003.
  3. Santi, P. "Topology control in wireless ad hoc and sensor networks" Chichester, England: John Wiley & Sons, 2005.
  4. Jun Zheng and Abbas Jamalipour, "Wireless Sensor Networks: A Networking Perspective", a book published by A John & Sons, Inc, and IEEEE, 2009.
  5. Ipsita Panda "A Survey on Routing Protocols of MANETs by Using QoS Metrics" International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 10, pp. 121-129, 2012.
  6. Mohamed M. E. A. Mahmoud and Xuemin (Sherman) Shen, " A Cloud-Based Scheme for Protecting Source-Location Privacy against Hotspot-Locating Attack in Wireless Sensor Networks" IEEE Transactions On Parallel And Distributed Systems, Vol. 23, No. 10, pp. 1805-1818, October 2012.
  7. M. Mahmoud and X. Shen, "Lightweight Privacy-Preserving Routing and Incentive Protocol for Hybrid Ad Hoc Wireless Networks," Proc. IEEE INFOCOM '11-Int'l Workshop Security in Computers, Networking, and Comm. (SCNC), pp. 1006-1011, Apr. 2011
  8. Y. Jian, S. Chen, Z. Zhang, and L. Zhang, "Protecting Receiver-Location Privacy in Wireless Sensor Networks," Proc. IEEE INFOCOM, pp. 1955-1963, May 2007.
  9. J. Deng, R. Han, and S. Mishra, "Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks," Proc. Int'l Conf. Security and Privacy for Emerging Areas in Comm. Networks (SecureComm), pp. 113-126, Sept. 2005.
  10. C. Ozturk, Y. Zhang, and W. Trappe, "Source-Location Privacy in Energy Constrained Sensor Network Routing," Proc. Second ACM Workshop Security of Ad Hoc and Sensor Networks (SASN '04), pp. 88-93, 2004
  11. K. Pongaliur and L. Xiao, "Maintaining Source Privacy Under Eavesdropping and Node Compromise Attacks," Proc. IEEE INFOCOM, Apr. 2011.
  12. R. Lu, X. Lin, H. Zhu, and X. Shen, "TESP2: Timed Efficient Source Privacy Preservation Scheme for Wireless Sensor Networks," Proc. IEEE Int'l Conf. Comm. , May 2010.
  13. Network Simulator- ns-2. http://www. isi. edu/ nsnam /ns/
Index Terms

Computer Science
Information Sciences

Keywords

Hotspot Locating Attack DREAM Hunter Node identity