Routing Efficient Method for Preserving Source Anonymity In Wireless Sensor Networks

Pallavi S. Patil, Prof. J. N. Nandimath


The emerging field of Wireless Sensor Networks combines computation, sensing , computation and communication into a single and tiny device. However, providing location privacy in a WSN is a challenging task. An adversary can easily intercept the network traffic due to the use of the broadcast nature of transmission. It can then perform traffic analysis and identify the source sensor that initiates the communication with the Base Station. Researchers have already presented various methods over WSN security, especially for privacy preservation. From the literature study, the privacy preserving security methods for WSN are having influence over the performance parameters like latency, energy efficiency, communication cost, throughput etc. WSNs are resource constrained, means sensor nodes having limited resources. Most existing methods use the PKI (public key infrastructure) for security purpose, but these methods consume more power of sensor nodes as well as not scalable. Thus to overcome these two limitations, recently the new privacy preservation method is introduced. This method proposed some criteria for the quantitative metrics source location privacy (SLP) for routing oriented methods in WSN. Using this method, the SLP is achieved with goal of efficient energy utilization via the two phase routing. It means SLP through the Routing to a randomly selected intermediate node (RSIN) and a network mixing ring (NMR). However this method is not scalable as required for most of real life applications, as well not evaluated for other performance metrics such as throughput, packet delivery ratio and end to end delay which are vital for any routing scheme in WSN. Therefore in this paper we are presenting the improved method with aim of achieving the network scalability and efficient routing performance while maintaining the source location privacy security.

Keywords: Ranked Cryptography; public key infrastructure; source location privacy; privacy preservation; sensor network ; NMR.

Full Text:




  • There are currently no refbacks.

Copyright (c) 2016 International Journal of Advanced Research in Computer Science