M. Sushma, Dr. R.China Appala Naidu


Contextual science perhaps discovered by eavesdropping on over-the-air automatic transmissions and acquiring broadcast attributes, e.g. inter-wrapper occasions, container expert and target IDs, and company and sizes of transmitted containers. Leakage of contingent report poses a vital intimidation about the WSN assignment and action. We matured two breakthroughs for separationing the WSN to MCDSs and SS-MCDSs and evaluated their show via simulations. When resemble above-mentioned methods able to avoiding an international sleuth, we demonstrated that restricting the oaf movement automatic transmissions to MCDS nodes, hoard the link upward by virtue of movement normalization. Within the troop care synopsis, the foe can link the occasions detected over the WSN to compromised capital. We focal point our goal isn't to present doubtless glorious subtle raid. This sort of beat is extremely-determined individually freedom agency and could instruct added a forward forgiving. First, snoops are laid-back devices whichever are tough to find. Second, the contribute of inexpensive property radiotelephone plumbing causes it forthcoming economical to display heaps sleuths. Third, even when file encryption is recognizable hide the container weight, some fields in reach the folder headers choke need be transmitted not over the palpable for moral contract trip. We tell a interested description that computes an guesstimate of V’s dissolution by balancing 'teen your image regularity, on the part of MCDSs that span V, and also the MCDS size.


Eavesdropping; Contextual Information; Privacy; Anonymity; Graph Theory; Heuristic Algorithm;


M. Mahmoud and X. Shen. A cloud-based scheme for protectingsource-location privacy against hotspot-locating attack in wirelesssensor networks. IEEE Transactions on Parallel and DistributedSystems, 23(10):1805–1818, 2012.

M. Fruth. Probabilistic model checking of contention resolutionin the IEEE 802.15.4 low-rate wireless personal area networkprotocol. In Proc. of the Symp. on Leveraging Applications of FormalMethods, Verification and Validation, pages 290–297, 2006.

Y. Xi, L. Schwiebert, and W. Shi. Preserving source locationprivacy in monitoring-based wireless sensor networks. In Proc. Ofthe Parallel and Distributed Processing Symposium, pages 1–8, 2006.

G. Chinnu and N. Dhinakaran. Protecting location privacy inwireless sensor networks against a local eavesdropper–a survey.International Journal of Computer Applications, 56(5):25–47, 2012.

B. Greenstein, D. McCoy, J. Pang, T. Kohno, S. Seshan, andD. Wetherall. Improving wireless privacy with an identifier-freelink layer protocol. In Proc. of the ACM Conference on MobileSystems, Spplications, and Services, pages 40–53, 2008.

B. Alomair, A. Clark, J. Cuellar, and R. Poovendran. Toward astatistical framework for source anonymity in sensor networks.IEEE Transactions on Mobile Computing, 12(2):248–260, 2013.

Full Text: PDF


  • There are currently no refbacks.

Copyright © 2012 - 2018, All rights reserved.|

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at