High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

Source Location Privacy Preserving of Sensor Nodes using a Tree based Routing Technology for Increasing Network Lifetime in Wireless Sensor Networks

Author(s):

Rakesh S.Biradar , Secab Institute of engineering and technology, Bijapur; Atif Afzal .J, Secab institute of engineering and technology

Keywords:

Wireless Sensor networks (WSNs), Tree-Based Diversionary Routing

Abstract

In sensor networks, location plays a vital role during communication between the sensor nodes. Preserving security on location of Sensor nodes plays important role for preventing the node duplication attack. Sharing the location of sensor nodes with each other requires the nodes to be active and alive that is they have enough energy to communicate. Over the past few years researchers have been involved in conserving energy by designing and proposing techniques that consume less energy for location sharing. However, one critical challenge to WSNs implementation is source location privacy. In this project, we propose a novel tree-based diversionary routing scheme for preserving. The proposed scheme is able to maximize the network lifetime of WSNs. We propose quadrant based approach to preserver source location privacy using hide and seek strategy to create diversionary or decoy routes along the path to the sink from the real source, where the end of each diversionary route is a decoy (fake source node), which periodically emits fake events. Meanwhile, The main idea is that the lifetime of WSNs depends on the nodes with high energy consumption or hotspot, and then the proposed scheme minimizes energy consumption in hotspot and creates redundancy diversionary routes in nonhotspot regions with abundant energy. Hence, it achieves not only privacy preservation, but also network lifetime maximization. Furthermore, this can also provide security to data transfer using Elliptical curve Cryptography technique.

Other Details

Paper ID: IJSRDV3I31477
Published in: Volume : 3, Issue : 3
Publication Date: 01/06/2015
Page(s): 2574-2577

Article Preview

Download Article