CFP last date
20 December 2024
Reseach Article

Protection of Source and Sink in Wireless Sensor Networks

by Prabhjot Kaur, Mandeep Kaur
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 121 - Number 10
Year of Publication: 2015
Authors: Prabhjot Kaur, Mandeep Kaur
10.5120/21579-4644

Prabhjot Kaur, Mandeep Kaur . Protection of Source and Sink in Wireless Sensor Networks. International Journal of Computer Applications. 121, 10 ( July 2015), 34-37. DOI=10.5120/21579-4644

@article{ 10.5120/21579-4644,
author = { Prabhjot Kaur, Mandeep Kaur },
title = { Protection of Source and Sink in Wireless Sensor Networks },
journal = { International Journal of Computer Applications },
issue_date = { July 2015 },
volume = { 121 },
number = { 10 },
month = { July },
year = { 2015 },
issn = { 0975-8887 },
pages = { 34-37 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume121/number10/21579-4644/ },
doi = { 10.5120/21579-4644 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:08:07.119303+05:30
%A Prabhjot Kaur
%A Mandeep Kaur
%T Protection of Source and Sink in Wireless Sensor Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 121
%N 10
%P 34-37
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The deliberation of interloper is to interrupt the communication or to invade the location of sender and receiver. One of the primary concerns of wireless sensor networks is the privacy of sender and receiver. There is always a threat of eavesdropper. The chief objective of this paper is to achieve a high degree of security for both source and sink. Due to an open characteristic of wireless sensor network an adversary can easily detect the location of source or sink by eavesdropping on the sensor nodes. In this paper four protection schemes are discussed that can protect the location of both sink and source. These schemes are forward random walk, bidirectional tree scheme, dynamic bidirectional tree scheme and zigzag bidirectional tree scheme. Also in this paper problems associated with both these scheme are also discussed

References
  1. Honglong chen and Wei lou, "On protecting end to end location privacy against local eavesdropper in wireless sensor networks", Pervasive and mobile computing, 2012, Vol. 30.
  2. Chin-fan hsin and Mingyan liu, "Hitting time analysis fo a class of rndom packet forwarding schemes in ad hoc networks", science direct, 11 july 2008, Vol. 7, pp. 500-513.
  3. Kavita D, hanabaratti and Rashmi Jodand, "Design of an efficient rndom walk routing protocol for wireless sensor networks", International Journal of Electronics and Communication Technology, 2011, Vol. 2,Issue 4 pp. 95-98.
  4. Ning wang and George Pavlou, "Scalable sender access control for didirectional multicast routing", Science direct, 2003, pp. 539-555.
  5. Samson Raja T, S. Satheesbabu. and Dr. K. Balasubadra, "Bidirectional location privacy scheme against internaladversary in ireless sensor networks", International Journal of Science and research, 2014, Vol. 3,Issue 11, pp. 2611-2615.
  6. Pavitha N and S. N. Shelke, "Protecting source and sink node's location against adversaries in sensor network", International journal of engineering research and general science, 2014, Vol. 2,Issue 4, pp. 319-325.
  7. Jun Long, Mainxiong ong, Kroo otc and Anfeng liu, "Achieving source location privacy and network lifetime maximization through tree based diversionary routing in wireless sensor networks", Proc. IEEE, 2014, Vol. 2, pp. 633-651.
  8. Deewakar Samajdar and Toran Verma, "A Survey on location privacy in wireless sensor natworks",Journal of Emerging Technologies and Innovative Research (JETIR), March 2015, Volume 2, Issue 3,pp. 623-627.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Source Sink Eavesdropper Tree Privacy