You are here

CONTEXT OF SOURCE AND END NODE PRIVACY PERPETUATION TECHNIQUES IN WIRELESS SENSOR NETWORKS

TitleCONTEXT OF SOURCE AND END NODE PRIVACY PERPETUATION TECHNIQUES IN WIRELESS SENSOR NETWORKS
Publication TypeJournal Article
Year of Publication2020
AuthorsMary, G. Chinnu, and S. R. Reeja
JournalInternational Journal of Advanced Research in Engineering and Technology
Volume11
Pagination2480-2485
Date Published2020
Type of ArticleJournal
ISBN Number0976-6499 (ISSN)
KeywordsComputer Science and Engineering, Scopus, WoS
Abstract

Privacy protection is of high importance to both the source node and the end node. The sensor nodes collect information from the hostile environment and send to the base node so privacy is of high concern. The attacker being a global eavesdropper can use back tracking / traffic analysis and disrupt the network. Since the source and sink form the connection between the antenna and the user, a complete sensor system or a part of it can be said to be uselessif the base station orthe end node is comprised. This Scenario makes the base very susceptible and creates a solitary point of failure, thereby making it a priority when it comes to providing location privacy. Energy being another major primary concern in WSNs, so it is important to be concerned of the energy consumption while proposing a new method to protect the privacy. Another factor to be considered is the delay as one of the factor in sensor networks we necessitate to keep the delay as low so as to make sure the data being received at the sink node The paper here analysis the various privacy preservation techniques at the source node and sink node. © IAEME Publication

DOI10.34218/IJARET.11.12.2020.234
Short Title© IAEME Publication