AN OVERVIEW OF SOURCE LOCATION PRIVACY IN WIRELESS SENSOR NETWORKS AGAINST GLOBAL ADVERSARY

Full Article - PDF

Published: 2015-10-12

Page: 163-179


MOHAMMAD ALI NASSIRI ABRISHAMCHI

Faculty of Computing, Universiti Teknologi Malaysia, Skudai, Johor, Malaysia

HASSAN CHIZARI *

Faculty of Computing, Universiti Teknologi Malaysia, Skudai, Johor, Malaysia

*Author to whom correspondence should be addressed.


Abstract

Wireless Sensor Network (WSN) consists of a numbers of sensor nodes with the capability of sensing events, brief processing on collecting raw data and transmitting processed data by hop-by-hop approach to the predefined destination with the aim of realizing controlling goals. While there are many applications for WSN, in almost all of them security is in high priority. If an adversary is able to discover the location of event, then it can move there to capture the important items. In this situation the critical question is: how do we conceal the location of the nodes from the adversary? In this paper four categories, which can be applied for encountering with global attacker, have been studied. Extensive comparison between current solutions reveals that there is only one solution, which is special for defending against of global adversary, as network coding. Other categories that consist of three methods can be used against either local adversary or global adversary, but they are unable to provide strict defense.

Keywords: Wireless sensor network, location privacy, routing, global adversary


How to Cite

ABRISHAMCHI, M. A. N., & CHIZARI, H. (2015). AN OVERVIEW OF SOURCE LOCATION PRIVACY IN WIRELESS SENSOR NETWORKS AGAINST GLOBAL ADVERSARY. Asian Journal of Mathematics and Computer Research, 8(3), 163–179. Retrieved from https://ikprress.org/index.php/AJOMCOR/article/view/518

Downloads

Download data is not yet available.