A Deviated Location and Updated Node Identity based Security Scheme for Preserving Source Node Location Privacy in Wireless Sensor Network

International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 100 - Number 18
Year of Publication: 2014
Neha Sahu
Sanjay Sharma

Neha Sahu and Sanjay Sharma. Article: A Deviated Location and Updated Node Identity based Security Scheme for Preserving Source Node Location Privacy in Wireless Sensor Network. International Journal of Computer Applications 100(18):1-8, August 2014. Full text available. BibTeX

	author = {Neha Sahu and Sanjay Sharma},
	title = {Article: A Deviated Location and Updated Node Identity based Security Scheme for Preserving Source Node Location Privacy in Wireless Sensor Network},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {100},
	number = {18},
	pages = {1-8},
	month = {August},
	note = {Full text available}


With a increased area of the applications of WSN, the security mechanisms are rising issue of outmost concern. The most important challenges threatening the successful installation of sensor systems is its privacy. Many privacy-related issues has been addressed by security mechanisms, but one sensor network privacy issue that cannot be adequately addressed by network security is source-location privacy One important class of sensor-driven applications is to monitor a valuable resources. For instance, sensors will be deployed in places like natural habitats to monitor the activities of endangered animals, or may be used in military purposes. In these asset monitoring applications, it is important to provide security to the source sensor's location. In this paper, we had proposed security scheme for preserving source node location privacy. We had developed a model assuming that attacker can monitor traffic in small area instead of whole network. Finally, we proposed a deviated location and updated node identity based scheme for efficiently protecting source node from hotspot locating attack. The protection scheme has shown the better performance which is proved by simulation results. The protection scheme has recovered the network performance in presence of attacker and provides attack free environment.


  • Chris Karlof, David Wagner, "Secure Routing in Wireless Sensor Networks", Attacks and Countermeasures", Ad Hoc Networks (elsevier), Page: 299-302, 2003.
  • C. Y. Chong and S. P. Kumar, "Sensor networks: Evolution, opportunities, and challenges," in IEEE Proceedings, pp. 1247–1254, Aug. 2003.
  • Santi, P. "Topology control in wireless ad hoc and sensor networks" Chichester, England: John Wiley & Sons, 2005.
  • Jun Zheng and Abbas Jamalipour, "Wireless Sensor Networks: A Networking Perspective", a book published by A John & Sons, Inc, and IEEEE, 2009.
  • Ipsita Panda "A Survey on Routing Protocols of MANETs by Using QoS Metrics" International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 10, pp. 121-129, 2012.
  • Mohamed M. E. A. Mahmoud and Xuemin (Sherman) Shen, " A Cloud-Based Scheme for Protecting Source-Location Privacy against Hotspot-Locating Attack in Wireless Sensor Networks" IEEE Transactions On Parallel And Distributed Systems, Vol. 23, No. 10, pp. 1805-1818, October 2012.
  • M. Mahmoud and X. Shen, "Lightweight Privacy-Preserving Routing and Incentive Protocol for Hybrid Ad Hoc Wireless Networks," Proc. IEEE INFOCOM '11-Int'l Workshop Security in Computers, Networking, and Comm. (SCNC), pp. 1006-1011, Apr. 2011
  • Y. Jian, S. Chen, Z. Zhang, and L. Zhang, "Protecting Receiver-Location Privacy in Wireless Sensor Networks," Proc. IEEE INFOCOM, pp. 1955-1963, May 2007.
  • J. Deng, R. Han, and S. Mishra, "Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks," Proc. Int'l Conf. Security and Privacy for Emerging Areas in Comm. Networks (SecureComm), pp. 113-126, Sept. 2005.
  • C. Ozturk, Y. Zhang, and W. Trappe, "Source-Location Privacy in Energy Constrained Sensor Network Routing," Proc. Second ACM Workshop Security of Ad Hoc and Sensor Networks (SASN '04), pp. 88-93, 2004
  • K. Pongaliur and L. Xiao, "Maintaining Source Privacy Under Eavesdropping and Node Compromise Attacks," Proc. IEEE INFOCOM, Apr. 2011.
  • R. Lu, X. Lin, H. Zhu, and X. Shen, "TESP2: Timed Efficient Source Privacy Preservation Scheme for Wireless Sensor Networks," Proc. IEEE Int'l Conf. Comm. , May 2010.
  • Network Simulator- ns-2. http://www. isi. edu/ nsnam /ns/