International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020


IJSTR >> Volume 2- Issue 9, September 2013 Edition

International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616

Providing An Efficient Way To Maintain Anonymity In Wireless Sensor Networks Based On Bogus Data

[Full Text]



Hafez Rousta Sekehravani, Homayun Motamani, Babak Shirazi



Index Terms: Anonymity, Bogus data, Security, Wireless sensor networks.



Abstract: Wireless sensor networks can be used to supervise sensitive data or to monitor moving objects in a military environment. Anonymity in wireless sensor networks has become one of the major problems in the network since node localization data sender is crucial in these environments. However, lack of resources in wireless sensor networks present new challenges and create a network of anonymous. This paper attempts to provide a lightweight and efficient method to create anonymity for a wireless network and their nodes and compare and analyze the characteristics and advantages of the proposed method.



[1] M. Shao, Y. Yang, S. Zhu, and G. Cao," Toward s Statistically Strong Source Anonymity for Sensor Networks," in Proc. of the IEEE INFOCOM 2008, pp. 51-55, 20

[2] M. Shao, W. Hu, S. Zhu, G. Cao, S. Krishnamurth,and T. La Porta, "Cross-Layer Enhanced Source Location Privacy in Sensor Networks," in Proc. of the IEEE SECON '09, pp. 1-9, 2009

[3] Y. Yang, M. Shao, S. Zhu, B. Urgaonkar, and G.Cao, "Towards Event Source Unobservability withMinimum Network Traffic in Sensor Networks," in Proc. of the ACM WiSec, Mar. 2008, pp. 77-88

[4] U. Acharya, M. Younis, Increasing base-station anonymity in wireless sensor networks, Ad Hoc Networks, Volume 8 Issue 8, November, 2010,Pages 791-809

[5] P. Rindl, Du. Xiaojiang, K. Nygard, “Light weight Source Anonymity in Wireless Sensor Networks ”,Global Telecommunications Conference (GLOBECOM 2011), 2011 IEE

[6] M. PejanovićĐurišić, Z. Tafa,G. Dimić, andV.Milutinović, A Survey of MilitaryApplicationsof Wireless Sensor Networks,MECO, Bar Montenegro, June 19, 2012

[7] Jun Zheng, Abbas Jamalipour, Wireless Sensor Networks: A Networking Perspective, John Wiley& Sons, England ,2009 ,page 229

[8] Michael Winkler, Michael Street, Klaus-DieterTuchs, KonradWrona, Wireless Sensor Networksfor Military Purposes, Autonomous SensorNetworks Springer Series on Chemical Sensors and Biosensors Volume 13, 2013, pp 365-39

[9] C. Karlof, N. Sastry, and D. Wagner, "TinySec: a link layer security architecture for wireless sensornetworks," in Proc. of the 2nd International Conference on Embedded Networked Sensor Systems, pp. 162-175, 2004.

[10] CelalOzturk, Yanyong Zhang, and Wade Trappe. Source-location pri-vacy in energy-constrained sensor network routing. In SASN '04: Pro-ceedings of the 2nd ACM workshop on Security of ad hoc and sensornetworks, pages 88{93, New York, NY, USA, 2010

[11] Alomair, B., Clark, A. ; Cuellar, J. ; PoovendranR., Toward a Statistical Framework for Source Anonymity in Sensor Networks, Mobile Computing, IEEE Transactions on Volume:12 , Issue: 2 , Feb. 2013

[12] Joy Iong-Zong Chen, Chu-Hsing Lin, Algorithms for promoting anonymity of BS and for prolonging network lifetime of WSN, Peer-to-Peer Networking and Applications, January 2013

[13] Introduction to NS-2, Dr. Donald C. Wunsch II, Dr.Larry Pyeatt, Tae-hyung Kim, Department ofElectrical Computer Engineering University of Missouri-Rolla, USA,2006