DocumentCode :
3723726
Title :
Source location privacy using multiple-phantom nodes in WSN
Author :
Prabhat Kumar;J.P Singh;Prateek Vishnoi;M.P Singh
Author_Institution :
Computer Science and Engineering, National Institute of Technology Patna, Bihar, India
fYear :
2015
Firstpage :
1
Lastpage :
6
Abstract :
The ever increasing integration of sensor-driven application into our lives has led to sensor privacy becoming an important issue. The locational information of sensor nodes has to be hidden from adversary for the sake of privacy. An adversary may trace traffic and try to figure out the location of the source node. This work attempts to improve the Source Location Privacy by using two phantom nodes, selection of neighbors based on random based approach and random walk upto phantom nodes. Two phantom nodes are selected for each source node in such a way that no two phantom nodes of the same triplet are co-linear with the sink. The proposed protocol can keep the adversary confused within the sensor networks as it generates different paths for different packets for the same source. Here, we are distracting the adversary by creating alternate paths. This results in minimizing the hit-ratio, thereby maximizing the privacy. Analysis of the present work shows that this protocol tends to achieve more privacy and greater safety period as compared to single phantom routing protocol. Flooding techniques and dummy packets have not been used in working phase for the sake of energy efficiency and network congestion.
Keywords :
"Analytical models","Floods","Wireless sensor networks","Communication system security","Wireless communication"
Publisher :
ieee
Conference_Titel :
TENCON 2015 - 2015 IEEE Region 10 Conference
ISSN :
2159-3442
Print_ISBN :
978-1-4799-8639-2
Electronic_ISBN :
2159-3450
Type :
conf
DOI :
10.1109/TENCON.2015.7372969
Filename :
7372969
Link To Document :
بازگشت