Time Orient Trust Based Hook Selection Algorithm for Efficient Location Protection in Wireless Sensor Networks Using Frequency Measures
Keywords:WSN, Eavesdrop attack, location protection, hook selection, trust based selection, frequency measures, QoS.
The presence of heavy adversary in the sensor network threats the quality of service hugely. To overcome the problem of location threat, a time orient trust based approach is presented in this paper. The method handles both source and sinks privacy by selecting random hook points around the region. The method identifies the list of sensors around its location and selects a single sensor as hook point based on the trust measure. The trust measure is estimated based on the participation of the sensor in other transmission and according to the energy parameters of the sensor node. The method uses two way protocols for route discovery.In the route discovery the hook point sends the route reply to the source node, which denotes a different route to be used. Similarly, the hook point fluctuates at each interval according to the frequency measures. For each hook point, the method computes the frequency measure based on the number of transmissions involved and the amount of data being received. The dynamic changing of hook point reduces the impact of heavy Eavesdroppers and improves the QoS of the network.
 Mehta K, Liu D & Wright, M, â€œProtecting location privacy in sensor networks against a global eavesdropperâ€, IEEE Transactions on Mobile Computing, Vol.11, No.2, (2012), pp.320-336.
 Conti M, Willemsen J & Crispo B, â€œProviding source location privacy in wireless sensor networks: A surveyâ€, IEEE Communications Surveys & Tutorials, Vol.15, No.3, (2013), pp.1238-1280.
 Li Y & Ren J, â€œPreserving source-location privacy in wireless sensor networksâ€, 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, (2009), pp.1-9.
 Zhang JD & Chow CY, â€œREAL: a reciprocal protocol for location privacy in wireless sensor networksâ€, IEEE Transactions on Dependable and Secure Computing, Vol.12, No.4, (2015), pp.458-471.
 George CM & Kumar M, â€œCluster based Location privacy in Wireless Sensor Networks against a universal adversaryâ€, IEEE International Conference on Information Communication and Embedded Systems (ICICES), (2013), pp.288-293.
 Zhou L, Wan C, Huang J, Pei B & Chen C, â€œThe location privacy of wireless sensor networks: Attacks and countermeasuresâ€, IEEE Ninth International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA), (2014), pp.64-71.
 Lightfoot L, Li Y & Ren, J, â€œPreserving source-location privacy in wireless sensor network using STaR routingâ€, IEEE Global Telecommunications Conference (GLOBECOM 2010), (2010), pp.1-5.
 Chow CY, Mokbel MF & He T, â€œA privacy-preserving location monitoring system for wireless sensor networksâ€, IEEE Transactions on Mobile Computing, Vol.10, No.1, (2011), pp.94-107.
 Luo X, Ji X & Park MS, â€œLocation privacy against traffic analysis attacks in wireless sensor networksâ€, IEEE International Conference on Information Science and Applications (ICISA), (2010), pp.1-6.
 Jhumka A, Bradbury M & Leeke M, â€œTowards understanding source location privacy in wireless sensor networks through fake sourcesâ€, IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, (2012), 760-768.
 Lopez J, Rios R & Cuellar J, â€œPreserving receiver-location privacy in wireless sensor networksâ€, International Conference on Information Security Practice and Experience, (2014), pp.15-27.
 Yao L, Kang L, Shang P & Wu G, â€œProtecting the sink location privacy in wireless sensor networksâ€, Personal and ubiquitous computing, Vol.17, No.5, (2013), pp.883-893.
 Di Ying B, Makrakis D & Mouftah HT, â€œAnti-traffic analysis attack for location privacy in WSNsâ€, EURASIP Journal on Wireless Communications and Networking, (2014).
 Li Y, Ren J & Wu J, â€œQuantitative measurement and design of source-location privacy schemes for wireless sensor networksâ€, IEEE Transactions on Parallel and Distributed Systems, Vol.23, No.7, (2012), pp.1302-1311.
 Mahmoud MM & Shen X, â€œA cloud-based scheme for protecting source-location privacy against hotspot-locating attack in wireless sensor networksâ€, IEEE Transactions on Parallel and Distributed Systems, Vol.23, No.10, (2012), pp.1805-1818.
 G Abilbakieva, M Knissarina, K Adanov, S Seitenova, G Bekeshova (2018). Managerial competence of future specialists of the education system (Preschool education and upbringing) and medicine in the comparative aspect. OpciÃ³n, AÃ±o 33, No. 85. 44-62.Akhpanov, S. Sabitov, R. Shaykhadenov (2018). Criminal pre-trial proceedings in the Republic of Kazakhstan: Trend of the institutional transformations. OpciÃ³n, AÃ±o 33. 107-125.