International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395 -0056
Volume: 04 Issue: 04 | Apr -2017
p-ISSN: 2395-0072
www.irjet.net
Security for Source Node Privacy in Wireless Sensor Networks Lavanya Ranganath1, Kavya K S1, Priyanka B M1, Shruthi A M1, Dr C VidyaRaj2 1 BE,
Department of CSE, NIE Mysuru, Karnataka, India Professor, Department of CSE, NIE Mysuru, Karnataka, India ---------------------------------------------------------------------***--------------------------------------------------------------------2
Abstract -
Source location privacy is one of the most challenging topics in security WSN. Wireless Sensor Networks have been widely used in many areas for various infrastructure monitoring, tracking and information collection. The proposed system provides privacy to the tracking sensor node and integrity to the data gathered by the sensor node. Sensor Network uses random walk path to send packets. It may be difficult to trace packet and location for an adversary to detect real identity in environment. The system has been proposed to provides security from eavesdropping attack, black-hole node, misbehaving, and denial of service, compromise attack and packet spoofing. It provides source node privacy using random path approach. It optimizes packet delivery ratio, energy consumption, packet delay.
Key Words: WSN Privacy; Location Privacy; Safety Period; static Routing; Adversary
1. INTRODUCTION In recent years, the advancement in wireless communications has enabled the development of sensorbased networks. In comparison to the autonomous traditional networks, the WSN has become a new adopted network structure. WSN inherently based on the wireless communications, which is basically an open media. An unrestricted wireless communications are more prone to privacy and security threats than the wired one. In wireless domain, anybody equipped with a sufficient hardware can intercept and monitor the wireless network communication. An adversary may use high frequency radio transceivers to monitor the network communications from a distance. It is very likely that the source location can be easily identified by the adversary through tracing its messages Privacy in WSN can be classified into two categories: Context privacy and Content privacy [4]. Context privacy focuses on hiding the unique identity and location of the nodes and the flow of the messages transmitted within the network. An adversary can misuse the contextual information of the nodes such as its location. While content privacy deals with providing the freshness, integrity, non-repudiation of the Š 2017, IRJET
|
Impact Factor value: 5.181
|
messages and maintain its confidentiality. It deals with the data content exchanged within the network, which can be violated through data and traffic analysis attacks. Wireless sensor network have significant to different field military surveillance application, personal health monitoring, tracking endangered species and civilian application. It has limited storage, computing power, and battery life.WSN nodes can be categorized as source node, sink node and intermediate nodes depending upon functionality in environment. Context source node is that node to transmission of some kind of information as reaction to some event occurring in its sensing range. Intermediate node is used as data forwarders in multi hop communication. Sink node is control all over node that node present in sensing range and Sink gathers the sensed data from the entire nearby node for final processing. Sensor network may be categorized broadly into Content privacy and context privacy threats. Content privacy threats generate due to the ability of the adversary to track, observe and manipulate the exact content of packet being sent over on sensor network. Context privacy can be used for location of the source node. Random path model is protects the source location privacy under traffic monitoring.
Fig 1.1 Privacy in wireless sensor networks The proposed system is interested in tracking and monitoring application, such as tracking animal activity. Source privacy is generally compromised by Meta and contextual information on source node through packet. Adversary node can send packet at real node and try to find credential information for misuse purpose. Source location ISO 9001:2008 Certified Journal
| Page 1307