Protection of Source and Sink in Wireless Sensor Networks

作者: Prabhjot Kaur , Mandeep Kaur

DOI: 10.5120/21579-4644

关键词:

摘要: In wireless sensor networks messages are sent from source to sink, but it sometime becomes a risky communication way because of presence eavesdropper. During transfer packet or message sink an eavesdropper may attack on the network and creates problem for sender receiver, as trace path detect location very easily. Because this security is always remained concern topic in networks. Different techniques introduced time protection I n paper we have also scheme privacy. This technique especially effective when will try locate by using DREAM protocol. deviate information false identity nodes provided which can confuse attacker protects our well sink. The these having identical capabilities energy called homogeneous (8). These types be again classified into flat hierarchy topology. topology that sensors close static consumes more than at margin network. drawbacks overcome hierarchical i.e., clusters. this, group forms lower layer cluster heads higher (4). Cluster head, collects data layers then forwards head acts aggregation point. Since collecting nodes, other nodes. So, rotated dynamically avoid consumption. Heterogeneous small number resource rich large limited basic powerful transceivers batteries. heads. capabilities. Mobile Data Gathering consists one Collectors (MC's) collector device equipped with transceiver high battery power. It gathers short-range communications. MC roams over sensing field while moving pause some points its sensors. To attain maximum saving, mobile must travel transmission range each node field. helps collect packets single hop. random planned. mobility reduces consumption

参考文章(18)
Milan Erdelj, Mobile wireless sensor network architecture: Applications to mobile sensor deployment Université des Sciences et Technologie de Lille - Lille I. ,(2013)
Md. Golam Murshed, Energy efficient data gathering in wireless sensor networks University of Aberdeen. ,(2013)
Igor Stubailo, Martin Lukac, Robert Clayton, Richard Guy, Deborah Estrin, Paul Davis, Victor Aguilar Puruhuaya, First-class meta-data: a step towards a highly reliable wireless seismic network in Peru Association for Computing Machinery. ,(2009)
Rubia. R, SivanArulSelvan, A Survey on Mobile Data Gathering in Wireless Sensor Networks - Bounded Relay arXiv: Networking and Internet Architecture. ,(2014) , 10.14445/22315381/IJETT-V7P247
Srinivas K, Sowmya M, Literature Survey on Wireless Sensor Networks International journal of engineering research and technology. ,vol. 3, ,(2014)
Aarti Arjun Andhale, B.N. Jagdale, Light Weight Security Protocol for Wireless Sensor Network’s (WSN) International journal of engineering research and technology. ,vol. 3, ,(2014)
Honglong Chen, Wei Lou, On protecting end-to-end location privacy against local eavesdropper in Wireless Sensor Networks Pervasive and Mobile Computing. ,vol. 16, pp. 36- 50 ,(2015) , 10.1016/J.PMCJ.2014.01.006
Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J. D. Tygar, SPINS Proceedings of the 7th annual international conference on Mobile computing and networking - MobiCom '01. pp. 189- 199 ,(2001) , 10.1145/381677.381696
Bhavna Pise, Nekita Chavhan, Strategy of SinkTrail protocol for energy efficient data gathering in wireless sensor network international conference on information communication and embedded systems. pp. 1- 6 ,(2014) , 10.1109/ICICES.2014.7034147