Techniques for Protecting Location Privacy of Source and Sink Node Against Global Adversaries in Sensor Network

Pavitha N, S. N. Shelke

Abstract


The exposed environment of a sensor network makes relatively easy for an adversary to eavesdrop and trace packet movement in the network in order to capture the source and destination physically.

Keywords


intervallic gathering, source imitation, sink imitation, location privacy

Full Text:

PDF




Copyright (c) 2014 Pavitha N, S. N. Shelke

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

 

All published Articles are Open Access at  https://journals.pen2print.org/index.php/ijr/ 


Paper submission: ijr@pen2print.org