International Journal of Recent Trends in Engineering & Research

online ISSN

Security for Efficient Data Transfer by Hiding the Location of Source

Publication Date : 15/05/2020

DOI : 10.23883/IJRTER.CONF.20200315.035.D8GQB

Author(s) :


Conference Name :
2nd International Conference on New Scientific Creations in Engineering and Technology - 2020

Abstract :

Wireless sensor networks (WSNs) are composed of a large number of smart devices that collaborate with each other to perform various tasks. Due to the developments in sensor technology, circuit engineering, and information techniques, WSNs have been widely used in many fields, including wild habitat monitoring, target tracing and military surveillance. The information passed has to be secured from external attacks and the packets have to be delivered properly. An anonymity cloud is to hide the location of the source node so that the adversary cannot distinguish the node. The sensor nodes contain large number of nodes that can communicate from one to another. Initially a message will be broken into multiple shares, each and every share will be provided by an identifier. K-means clustering algorithm is used to group the nodes. There are a group of real shares and the fake shares that will be passed based on some time delay to confuse the adversary. The cluster methodology is used to overcome the overhead caused by the fake shares. At the time a cloud will be formed to protect the source node. The phantom routing will help to easily route the packet throughout the network. A node may receive fake shares as well as real shares, once it receives a real share that particular node will be converted to fake node to confuse the adversary. A key will be provided to secure the sink transmission by some cryptographic method; this will give much more protection for the message transmitted. The message will be reconstructed only when a node obtains‘t’ shares.

No. of Downloads :




Traffic Stats

Total Visits : 3,327