A Novel Approach for Conserving Spring Location Privacy in Wireless Sensor Networks

G. Narendran

Abstract


In wireless sensor network, adversaries try to kill the monitored object by use of traffic information. In this paper, we first define hotspot event that causes a clear variation in the network traffic pattern due to large volume of packets generating from a small area. And then using realistic adversary model, we introduce a hotspot-locating attack where the adversary analyse the traffic information to locate hotspots. Finally, we introduce a cloud-based scheme for preserving source node location privacy against hotspot-locating attack by creating a cloud with an irregular shape of fake traffic and hide the source node in the nodes forming the cloud. Due to reduce the energy cost, the clouds are active only during data transmission and the intersection of clouds creates a larger merged cloud, to reduce the number of fake packets and also strong privacy preservation. In this scheme can provide stronger privacy protection than routing based scheme and requires much less energy than global-adversary based schemes.

In wireless sensor network, adversaries try to kill the monitored object by use of traffic information. In this paper, we first define hotspot event that causes a clear variation in the network traffic pattern due to large volume of packets generating from a small area. And then using realistic adversary model, we introduce a hotspot-locating attack where the adversary analyse the traffic information to locate hotspots. Finally, we introduce a cloud-based scheme for preserving source node location privacy against hotspot-locating attack by creating a cloud with an irregular shape of fake traffic and hide the source node in the nodes forming the cloud. Due to reduce the energy cost, the clouds are active only during data transmission and the intersection of clouds creates a larger merged cloud, to reduce the number of fake packets and also strong privacy preservation. In this scheme can provide stronger privacy protection than routing based scheme and requires much less energy than global-adversary based schemes.


Full Text:

PDF

Refbacks

  • There are currently no refbacks.