Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Maximizing Lifetime through Phantom Node for Privacy Preservation in WSN

Author : A.O.Shini 1 Dr. Satish Devane 2

Date of Publication :7th July 2016

Abstract: One of the major challenges in real-time event-monitoring applications such as military surveillance or monitoring of endangered species of Wireless Sensor Network (WSN), is that of context privacy in terms of location of source node. When a source node senses and forwards a packet to the target, adversaries can eavesdrop on network and trace source node from base station. The concept of introducing phantom node is to act as intermediate nodes between actual sources and sink, so that the privacy of source node is preserved. Phantom nodes can thus help in achieving privacy. But while trying to achieve this, it is also essential to ensure that the lifetime of sensors are not affected due to resource constraints in the sensor nodes. This paper attempts to use an energy efficient algorithm for establishing phantom node so as to improve network lifetime of sensors while achieving source location privacy.

Reference :

    1. Genita gautam, biswaraj sen, department of computer sc & engineering sikkim manipal institute of technology, sikkim manipal university,sikkim, design and simulation of wireless sensor network in ns2, international journal of computer applications (0975 – 8887) volume 113 – no. 16, march 2015
    2. C. Ozturk, y. Zhang, and w. Trappe, ``source-location privacy in energy-constrained sensor network routing,'' in proc. 2nd acmworkshop securityad hoc sensor netw. (sasn), vol. 4. 2004, pp. 88_93.
    3. Y. Li and j. Ren, ``preserving source-location privacy in wireless sensor networks,'' in proc. 6th annu. Ieee commun. Soc. Conf. Sens. Mesh adhoc commun. Netw., jun. 2009, pp. 1_9.
    4. H.wang, b. Sheng, and q. Li, ``privacy-aware routing in sensor networks,'' comput. Netw., vol. 53, no. 9, pp. 1512_1529, 2009.
    5. K. Bicakci, h. Gultekin, b. Tavli, and i. E. Bagci, ``maximizing lifetime of event-unobservable wireless sensor networks,'' comput. Standards interf.,vol. 33, no. 4, pp. 401_410, 2011. 
    6. K. Bicakci, i. E. Bagci, and b. Tavli, ``lifetime bounds of wireless sensor networks preserving perfect sink unobservability,'' ieee commun. Lett., vol. 15, no. 2, pp. 205_207, feb. 2011.
    7. M. Shao, y. Yang, s. Zhu, and g. Cao, ``towards statistically strong source anonymity for sensor networks,'' in proc. 27th conf. Comput. Commun.ieee infocom, phoenix, az, usa, apr. 2008, pp. 51_55
    8. Pandurangkamat, yanyong zhang, wade trappe, celalozturk,”enhancing source-location privacy in sensor network routing”, proceedings of the 25th ieee international conference on distributed computing systems(icscs’05), 2005
    9. http://www.tutorialsweb.com/ns2/ns2-1.htm
    10. f. Shebli, i. Dayoub and j.m. Rouvaen, “minimizing energy consumption within wireless sensors networks”, university of valenciennes (iemn, umr cnrs 8520)
    11. Ju ren, yaoxue zhang, kang liu, “an energy-efficient cyclic diversionary routing strategy against global eavesdroppers in wireless sensor networks”
    12. Jun long, mianxiong dong, kaoru ota, anfeng liu, “achieving source location privacy and network lifetime maximization through tree-based diversionary routing in wireless sensor networks”, ieee 2014
    13. Leron lightfoot, yun li, jian ren, “preserving sourcelocation privacy in wireless sensor network using star routing”, ©2010 ieee
    14. Sajalk.das, bhavanithuraisingham, na li, nan zhang “privacy preservation in wireless sensor networks :a state of the art survey, adhocnetworks 7(2009) 1501- 1514
    15. G. Tan,w. Li, and j. Song, ``enhancing source location privacy in energy-constrained wireless sensor networks,'' in proc. Int. Conf. Comput. Sci. Inf.technol., 2014, pp. 279_289.
    16. K.mehta, d. Liu, and m. Wright, ``location privacy in sensor networks against a global eavesdropper,'' in proc. Ieee int. Conf. Netw. Protocols (icnp), oct. 2007, pp. 314_323.
    17. H. Chen and w. Lou. (2014),”on protecting end-to-end location privacy against local eavesdropper in wireless sensor networks”, pervas.mobilecomput.[online].
    18. A. Jhumka, m. Bradbury, and m. Leeke,”fake sourcebased source location privacy in wireless sensor networks”,concurrencycomput.,pract.experience[online]. available: http://onlinelibrary.wiley.com/doi/10.1002/cpe.3242/pdf
    19. http://ns2blogger.blogspot.in/p/n.html
    20. Zhiwen zeng, xiaoyan hu, zhigang chen,”preserving source-location privacy in wireless sensor networks against a global eavesdropper”, int'l conf. Wireless networks | icwn'15
    21. Xin wu, yufei xu, da teng, “an improved method based on self-adjusting directed random walk approach for preserving source-location privacy in wireless sensor network”

Recent Article