An Approach to Secure Sink Node's Location Privacy in Wireless Sensor Networks
Title | An Approach to Secure Sink Node's Location Privacy in Wireless Sensor Networks |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Shahare, P.C., Chavhan, N.A. |
Conference Name | Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on |
Date Published | April |
Keywords | anonymity, Base stations, Blast technique, Clustering algorithms, clustering mechanism, Computer science, continuous usage, data gathering, delays, energy consumption, environmental monitoring, external attacks, hostile environments, internal attacks, location privacy, packet delay, power consumption, privacy, Receivers, secure sink node, security, shortest path algorithm, Sink node location privacy, Wireless Sensor Network, Wireless sensor networks |
Abstract | Wireless Sensor Network has a wide range of applications including environmental monitoring and data gathering in hostile environments. This kind of network is easily leaned to different external and internal attacks because of its open nature. Sink node is a receiving and collection point that gathers data from the sensor nodes present in the network. Thus, it forms bridge between sensors and the user. A complete sensor network can be made useless if this sink node is attacked. To ensure continuous usage, it is very important to preserve the location privacy of sink nodes. A very good approach for securing location privacy of sink node is proposed in this paper. The proposed scheme tries to modify the traditional Blast technique by adding shortest path algorithm and an efficient clustering mechanism in the network and tries to minimize the energy consumption and packet delay. |
URL | http://ieeexplore.ieee.org/document/6821499/ |
DOI | 10.1109/CSNT.2014.157 |
Citation Key | 6821499 |
- hostile environments
- wireless sensor networks
- Wireless Sensor Network
- Sink node location privacy
- shortest path algorithm
- security
- secure sink node
- Receivers
- privacy
- power consumption
- packet delay
- location privacy
- internal attacks
- anonymity
- external attacks
- environmental monitoring
- energy consumption
- delays
- data gathering
- continuous usage
- computer science
- clustering mechanism
- Clustering algorithms
- Blast technique
- Base stations