作者
Prabhat Kumar, JP Singh, Prateek Vishnoi, MP Singh
发表日期
2015/11/1
研讨会论文
TENCON 2015-2015 IEEE Region 10 Conference
页码范围
1-6
出版商
IEEE
简介
The ever increasing integration of sensor-driven application into our lives has led to sensor privacy becoming an important issue. The locational information of sensor nodes has to be hidden from adversary for the sake of privacy. An adversary may trace traffic and try to figure out the location of the source node. This work attempts to improve the Source Location Privacy by using two phantom nodes, selection of neighbors based on random based approach and random walk upto phantom nodes. Two phantom nodes are selected for each source node in such a way that no two phantom nodes of the same triplet are co-linear with the sink. The proposed protocol can keep the adversary confused within the sensor networks as it generates different paths for different packets for the same source. Here, we are distracting the adversary by creating alternate paths. This results in minimizing the hit-ratio, thereby maximizing …
引用总数
201620172018201920202021202220232024617341631
学术搜索中的文章
P Kumar, JP Singh, P Vishnoi, MP Singh - TENCON 2015-2015 IEEE Region 10 Conference, 2015