Time Orient Trust Based Hook Selection Algorithm for Efficient Location Protection in Wireless Sensor Networks Using Frequency Measures

Authors

  • D Prasanna
  • R Santhosh

DOI:

https://doi.org/10.14419/ijet.v7i3.27.17966

Published:

2018-08-15

Keywords:

WSN, Eavesdrop attack, location protection, hook selection, trust based selection, frequency measures, QoS.

Abstract

The presence of heavy adversary in the sensor network threats the quality of service hugely. To overcome the problem of location threat, a time orient trust based approach is presented in this paper. The method handles both source and sinks privacy by selecting random hook points around the region. The method identifies the list of sensors around its location and selects a single sensor as hook point based on the trust measure. The trust measure is estimated based on the participation of the sensor in other transmission and according to the energy parameters of the sensor node. The method uses two way protocols for route discovery.In the route discovery the hook point sends the route reply to the source node, which denotes a different route to be used. Similarly, the hook point fluctuates at each interval according to the frequency measures. For each hook point, the method computes the frequency measure based on the number of transmissions involved and the amount of data being received. The dynamic changing of hook point reduces the impact of heavy Eavesdroppers and improves the QoS of the network.

 

 

References

[1] Mehta K, Liu D & Wright, M, “Protecting location privacy in sensor networks against a global eavesdropperâ€, IEEE Transactions on Mobile Computing, Vol.11, No.2, (2012), pp.320-336.

[2] Conti M, Willemsen J & Crispo B, “Providing source location privacy in wireless sensor networks: A surveyâ€, IEEE Communications Surveys & Tutorials, Vol.15, No.3, (2013), pp.1238-1280.

[3] Li Y & Ren J, “Preserving source-location privacy in wireless sensor networksâ€, 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, (2009), pp.1-9.

[4] Zhang JD & Chow CY, “REAL: a reciprocal protocol for location privacy in wireless sensor networksâ€, IEEE Transactions on Dependable and Secure Computing, Vol.12, No.4, (2015), pp.458-471.

[5] George CM & Kumar M, “Cluster based Location privacy in Wireless Sensor Networks against a universal adversaryâ€, IEEE International Conference on Information Communication and Embedded Systems (ICICES), (2013), pp.288-293.

[6] Zhou L, Wan C, Huang J, Pei B & Chen C, “The location privacy of wireless sensor networks: Attacks and countermeasuresâ€, IEEE Ninth International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA), (2014), pp.64-71.

[7] Lightfoot L, Li Y & Ren, J, “Preserving source-location privacy in wireless sensor network using STaR routingâ€, IEEE Global Telecommunications Conference (GLOBECOM 2010), (2010), pp.1-5.

[8] Chow CY, Mokbel MF & He T, “A privacy-preserving location monitoring system for wireless sensor networksâ€, IEEE Transactions on Mobile Computing, Vol.10, No.1, (2011), pp.94-107.

[9] Luo X, Ji X & Park MS, “Location privacy against traffic analysis attacks in wireless sensor networksâ€, IEEE International Conference on Information Science and Applications (ICISA), (2010), pp.1-6.

[10] Jhumka A, Bradbury M & Leeke M, “Towards understanding source location privacy in wireless sensor networks through fake sourcesâ€, IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, (2012), 760-768.

[11] Lopez J, Rios R & Cuellar J, “Preserving receiver-location privacy in wireless sensor networksâ€, International Conference on Information Security Practice and Experience, (2014), pp.15-27.

[12] Yao L, Kang L, Shang P & Wu G, “Protecting the sink location privacy in wireless sensor networksâ€, Personal and ubiquitous computing, Vol.17, No.5, (2013), pp.883-893.

[13] Di Ying B, Makrakis D & Mouftah HT, “Anti-traffic analysis attack for location privacy in WSNsâ€, EURASIP Journal on Wireless Communications and Networking, (2014).

[14] Li Y, Ren J & Wu J, “Quantitative measurement and design of source-location privacy schemes for wireless sensor networksâ€, IEEE Transactions on Parallel and Distributed Systems, Vol.23, No.7, (2012), pp.1302-1311.

[15] Mahmoud MM & Shen X, “A cloud-based scheme for protecting source-location privacy against hotspot-locating attack in wireless sensor networksâ€, IEEE Transactions on Parallel and Distributed Systems, Vol.23, No.10, (2012), pp.1805-1818.

[16] G Abilbakieva, M Knissarina, K Adanov, S Seitenova, G Bekeshova (2018). Managerial competence of future specialists of the education system (Preschool education and upbringing) and medicine in the comparative aspect. Opción, Año 33, No. 85. 44-62.

Akhpanov, S. Sabitov, R. Shaykhadenov (2018). Criminal pre-trial proceedings in the Republic of Kazakhstan: Trend of the institutional transformations. Opción, Año 33. 107-125.

View Full Article: