Title | CONTEXT OF SOURCE AND END NODE PRIVACY PERPETUATION TECHNIQUES IN WIRELESS SENSOR NETWORKS |
Publication Type | Journal Article |
Year of Publication | 2020 |
Authors | Mary, G. Chinnu, and S. R. Reeja |
Journal | International Journal of Advanced Research in Engineering and Technology |
Volume | 11 |
Pagination | 2480-2485 |
Date Published | 2020 |
Type of Article | Journal |
ISBN Number | 0976-6499 (ISSN) |
Keywords | Computer Science and Engineering, Scopus, WoS |
Abstract | Privacy protection is of high importance to both the source node and the end node. The sensor nodes collect information from the hostile environment and send to the base node so privacy is of high concern. The attacker being a global eavesdropper can use back tracking / traffic analysis and disrupt the network. Since the source and sink form the connection between the antenna and the user, a complete sensor system or a part of it can be said to be uselessif the base station orthe end node is comprised. This Scenario makes the base very susceptible and creates a solitary point of failure, thereby making it a priority when it comes to providing location privacy. Energy being another major primary concern in WSNs, so it is important to be concerned of the energy consumption while proposing a new method to protect the privacy. Another factor to be considered is the delay as one of the factor in sensor networks we necessitate to keep the delay as low so as to make sure the data being received at the sink node The paper here analysis the various privacy preservation techniques at the source node and sink node. © IAEME Publication |
DOI | 10.34218/IJARET.11.12.2020.234 |
Short Title | © IAEME Publication |