Providing Location Privacy against a Global Adversary in Wireless Sensor Networks ⋆

نویسندگان

  • Liming Zhou
  • Qiaoyan Wen
چکیده

Wireless sensor networks are widely used in our daily life. It consists of various sensors which collect different information containing the identity, status, and location of an object or any other business, social or privately relevant information. But we pay attention to some issues related to sensor’s location privacy. In this paper, we focus on protecting the sensor’s location by introducing suitable modifications to sensor routing to make it difficult for an eavesdropper to find the original location. And we propose a Multi-source and Multi-routing scheme, which is a flexible routing strategy to protect the sensor’s location. Our strategy can efficiently reduce the chance of packets being detected. And the adversary can find it difficult to find the exact location of the source node or the base station.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Location Privacy in Wireless Sensor Networks

The insecure atmospheres makes easy for an adversary to eavesdrop the network in a wireless sensor network. An eclectic collection of protocols are available for providing content privacy but the contextual information remains unprotected. So an adversary can use this contextual information to carry out attack on source node or the sink node in sensor network. The current approaches for locatio...

متن کامل

Preserving Source-Location Privacy in Wireless Sensor Networks against a Global Eavesdropper

While many works to date in wireless sensor networks (WSNs) security have focused on providing confidentiality for message contents, contextual information usually remains exposed. Thus the adversary especially the global eavesdropper can easily obtain the sensitive information such as the location of a target object in a monitoring application, which is critical to the mission of the sensor ne...

متن کامل

Secured Approaches to Sink Location Privacy Protection in Wireless Sensor Network

Wireless Sensor Network (WSN) is a broad network consisting of a number of sensor nodes in it. WSN is used mainly for monitoring and data aggregation purpose. A best plan of opponent may to attack the sink node which is the aggregation point for the whole network. So, first there comes a need to secure the sink node from adversary. There are previous work are done by providing location privacy ...

متن کامل

Sink Location Privacy Protection in Wireless Sensor Network

Wireless Sensor Network (WSN) is a broad network consisting of a number of sensor nodes in it. WSN is used mainly for monitoring and data aggregation purpose. A best plan of opponent may attack the sink node which is the aggregation point for the whole network. So, first there comes a need to secure the sink node from adversary. There are previous work are done by providing location privacy to ...

متن کامل

Security for Source Node Privacy in Wireless Sensor Network

Source location privacy is one of the most challenging topics in security WSN. Wireless Sensor Networks have been widely used in many areas for various infrastructure monitoring, tracking and information collection. We are generated more fake node, fake packet and to create anonymity node for source location privacy. They are providing privacy to the event detecting, tracking sensor node and in...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013