95
Views
1
CrossRef citations to date
0
Altmetric
Original Articles

Virtual Source-Based Location Privacy for Wireless Sensor Networks

&
 

ABSTRACT

Sensor networks are used in wild life habitat monitoring and military-related object tracking applications. Due to the open nature of wireless communication, the information related to the packet movement is exposed to the adversary. So, the adversary easily traces the packet movement in the sensor network and compromises the source location. This paper describes how the adversary is prevented from tracing the packet movement based on virtual source. The proposed technique is analysed using percentage of event detection, latency, privacy, communication cost, and packet delivery ratio.

Additional information

Notes on contributors

R. Altis Raja

R. Altis Raja completed 5 years integrated course in MSc. Software engineering and ME in computer science and engineering from Anna University, Chennai, Tamil Nadu, India in 2009 and 2011 respectively. Currently he is pursuing his full-time PhD in the Department of Computer Science and Engineering, Anna University, Chennai, Tamil Nadu, India. His research interests include wireless sensor networks and network security.

E-mail: [email protected]

S. Valli

S. Valli received her BE and ME degrees in computer science and engineering from Government College of Technology, Coimbatore, Tamil Nadu, India in 1990 and December 1991 respectively. She got her PhD degree from the Department of Computer Science and Engineering, Anna University, Chennai, India in 2000. She is currently working as a professor in the Department of Computer Science and Engineering, Anna University, Chennai. Her research interests include compilers, software engineering, image processing, operating system and network security.

E-mail: [email protected]

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.