Author : A.O.Shini 1
Date of Publication :7th July 2016
Abstract: One of the major challenges in real-time event-monitoring applications such as military surveillance or monitoring of endangered species of Wireless Sensor Network (WSN), is that of context privacy in terms of location of source node. When a source node senses and forwards a packet to the target, adversaries can eavesdrop on network and trace source node from base station. The concept of introducing phantom node is to act as intermediate nodes between actual sources and sink, so that the privacy of source node is preserved. Phantom nodes can thus help in achieving privacy. But while trying to achieve this, it is also essential to ensure that the lifetime of sensors are not affected due to resource constraints in the sensor nodes. This paper attempts to use an energy efficient algorithm for establishing phantom node so as to improve network lifetime of sensors while achieving source location privacy.
Reference :
-
- Genita gautam, biswaraj sen, department of computer sc & engineering sikkim manipal institute of technology, sikkim manipal university,sikkim, design and simulation of wireless sensor network in ns2, international journal of computer applications (0975 – 8887) volume 113 – no. 16, march 2015
- C. Ozturk, y. Zhang, and w. Trappe, ``source-location privacy in energy-constrained sensor network routing,'' in proc. 2nd acmworkshop securityad hoc sensor netw. (sasn), vol. 4. 2004, pp. 88_93.
- Y. Li and j. Ren, ``preserving source-location privacy in wireless sensor networks,'' in proc. 6th annu. Ieee commun. Soc. Conf. Sens. Mesh adhoc commun. Netw., jun. 2009, pp. 1_9.
- H.wang, b. Sheng, and q. Li, ``privacy-aware routing in sensor networks,'' comput. Netw., vol. 53, no. 9, pp. 1512_1529, 2009.
- K. Bicakci, h. Gultekin, b. Tavli, and i. E. Bagci, ``maximizing lifetime of event-unobservable wireless sensor networks,'' comput. Standards interf.,vol. 33, no. 4, pp. 401_410, 2011.
- K. Bicakci, i. E. Bagci, and b. Tavli, ``lifetime bounds of wireless sensor networks preserving perfect sink unobservability,'' ieee commun. Lett., vol. 15, no. 2, pp. 205_207, feb. 2011.
- M. Shao, y. Yang, s. Zhu, and g. Cao, ``towards statistically strong source anonymity for sensor networks,'' in proc. 27th conf. Comput. Commun.ieee infocom, phoenix, az, usa, apr. 2008, pp. 51_55
- Pandurangkamat, yanyong zhang, wade trappe, celalozturk,”enhancing source-location privacy in sensor network routing”, proceedings of the 25th ieee international conference on distributed computing systems(icscs’05), 2005
- http://www.tutorialsweb.com/ns2/ns2-1.htm
- f. Shebli, i. Dayoub and j.m. Rouvaen, “minimizing energy consumption within wireless sensors networks”, university of valenciennes (iemn, umr cnrs 8520)
- Ju ren, yaoxue zhang, kang liu, “an energy-efficient cyclic diversionary routing strategy against global eavesdroppers in wireless sensor networks”
- Jun long, mianxiong dong, kaoru ota, anfeng liu, “achieving source location privacy and network lifetime maximization through tree-based diversionary routing in wireless sensor networks”, ieee 2014
- Leron lightfoot, yun li, jian ren, “preserving sourcelocation privacy in wireless sensor network using star routing”, ©2010 ieee
- Sajalk.das, bhavanithuraisingham, na li, nan zhang “privacy preservation in wireless sensor networks :a state of the art survey, adhocnetworks 7(2009) 1501- 1514
- G. Tan,w. Li, and j. Song, ``enhancing source location privacy in energy-constrained wireless sensor networks,'' in proc. Int. Conf. Comput. Sci. Inf.technol., 2014, pp. 279_289.
- K.mehta, d. Liu, and m. Wright, ``location privacy in sensor networks against a global eavesdropper,'' in proc. Ieee int. Conf. Netw. Protocols (icnp), oct. 2007, pp. 314_323.
- H. Chen and w. Lou. (2014),”on protecting end-to-end location privacy against local eavesdropper in wireless sensor networks”, pervas.mobilecomput.[online].
- A. Jhumka, m. Bradbury, and m. Leeke,”fake sourcebased source location privacy in wireless sensor networks”,concurrencycomput.,pract.experience[online]. available: http://onlinelibrary.wiley.com/doi/10.1002/cpe.3242/pdf
- http://ns2blogger.blogspot.in/p/n.html
- Zhiwen zeng, xiaoyan hu, zhigang chen,”preserving source-location privacy in wireless sensor networks against a global eavesdropper”, int'l conf. Wireless networks | icwn'15
- Xin wu, yufei xu, da teng, “an improved method based on self-adjusting directed random walk approach for preserving source-location privacy in wireless sensor network”