Development of Hybrid Approach for Receiver Location Privacy in WSN

  • Authors

    • Premananda B.S
    • Sindhudhar K.L
    2018-12-13
    https://doi.org/10.14419/ijet.v7i4.39.23822
  • Energy, Location privacy, Contextual Information, Sink node, Wireless Sensor Networks.
  • The various security protocols in wireless sensor networks (WSNs) provide confidentiality for the content of message but the contextual information remains exposed. The exposed contextual information can be utilized by the adversary to deliver attack or derive the sensitive information such as location of the sink nodes, source node and monitored objects. In applications such as military and research institutions the security is of greater importance and very crucial. In sensor network the base station (BS) acts as a gateway between the sensor nodes and the control unit. The vital data sensed by the sensor nodes finally reaches the BS. Hence, BS is a major target of attack. By knowing the physical location of the BS an attacker can alter or destroy the BS intern results in the failure of the entire sensor network. There is a need for routing algorithm which can effectively camouflage the location of the BS. In this paper a hybrid algorithm which provides location privacy of the BS has been proposed. The results infer that the proposed algorithm is independent of quantity of the traffic and an adversary will have less than 4 % chance of locating the physical location of the BS. The sensor nodes also exhibited limited energy consumption.

     

     
  • References

    1. [1] Ruben Rios del Pozo (2014), “Protecting Contextual Information in WSNs: Source- and Receiver-Location Privacy Solutionsâ€, Ph.D. Thesis, Academic Project, University of Malaga.

      [2] Sindhudhar K.L. and Premananda B.S. (2018), “Development of Hybrid Algorithm for Masquerading Sink Node Location in WSN†in Proceedings of the International Conference on Emerging Research in Electronics, Computer Science and Technology, ICERECT-2018, Mandya, India.

      [3] Pallavi S., and Kanika S. (2016), “Improved Development of Energy Efficient Routing Algorithm for Privacy Preservation of Sink in WSN,†International Research Journal of Engineering and Technology, vol. 3, pp. 21-27.

      [4] Vidyasagar Potdar, Atif Sharif and Elizabeth Chang (2009), “Wireless Sensor Networks: A Surveyâ€, in Proceedings of IEEE International Conference on Advanced Information Networking and Applications, vol. 5, pp. 12-19.

      [5] Fareed et al. (2012), “Optimal Number of Cluster Head Selection for Efficient Distribution of Sourcesâ€, in Proceedings of 7th International Conference on Broadband, Wireless Computing, Communication and Applications, vol. 3, pp. 21-28.

      [6] N. Baroutis and M. Younis (2015), “Using Fake Sinks and Deceptive Relays to Boost Base-Station Anonymity in Wireless Sensor Networkâ€, in Proceedings of IEEE 40th International Conference on Local Computer Networks, vol. 10, pp. 109-116.

      [7] Sangho Lee, Jong K., and Yoonho K. (2009), “Preserving Source and Sink-location Privacy in Sensor Networksâ€, International Journal on Computer Science and Information Systems, vol. 2, pp. 16-21.

      [8] Usha R., Premananda B.S., and Viswavardhan Reddy K. (2017), “Network Performance Analysis of MANET Routing Protocols with Various Mobility Models,†in Proceedings of 2nd IEEE International Conference on Recent Trends in Electronics, Information and Communication Technology, vol. 6, pp. 511-515.

      [9] Anu Dahiya and Vinit Kumar (2015), “Performance Measurement of Dijkstra using WSN: A Reviewâ€, International Journal of Engineering, Applied and Management Sciences Paradigms, vol. 12, pp. 741-753.

      [10] Yahya Kord Tamandani, Mohammad Ubaidullah Bokhari and Mohammad Zarif Kord (2016), “Computing Geometric Median to Locate the Sink Node with the Aim of Extending the Lifetime of Wireless Sensor Networksâ€, Journal of Egyptian Informatics, Cairo University, vol. 4, pp. 1-7.

      [11] L. Malathi, R.K. Gnanamurthy and Chandrasekaran (2015), “Energy Efficient Data Collection through Hybrid Unequal Clustering for Wireless Sensor Networksâ€, Elsevier Journal on Computer and Electrical Engineering, vol. 4, pp. 1-13.

      [12] Alejandro (2015), “Privacy of Contextual Information in Wireless Sensor Networks,†Ph.D. Thesis, Department of Electrical and Computer Science, University of Arizona.

  • Downloads

  • How to Cite

    B.S, P., & K.L, S. (2018). Development of Hybrid Approach for Receiver Location Privacy in WSN. International Journal of Engineering & Technology, 7(4.39), 123-127. https://doi.org/10.14419/ijet.v7i4.39.23822