SlideShare a Scribd company logo
1 of 16
PRAKASHAM ENGINEERING
COLLEGE
DEPARTMENT OF MCA
ACADEMIC PROJECT (2017-2020)
PROJECT TITLE
A PROBABILISTIC SOURCE LOCATION PRIVACY
PROTECTION SCHEME IN WIRELESS SENSOR NETWORKS
PRESENTED BY:
T. SAI LAKSHMI
17F91F0026
ABSTRACT:
With the recent developments of Wireless Sensor Networks (WSNs),
computing and communication have experienced huge
Meanwhile, security has not received the same attention to go
such developments. In this paper, we focus on the source location
problem in WSNs, a hot research topic in security, and propose a
probabilistic source location privacy protection scheme (PSLP) for
A more powerful adversary, which can use Hidden Markov Model
(HMM) to estimate the state of the source, is considered in this
study.To cope with this type of adversary, phantom nodes and fake
sources, which are responsible to mimic the behavior of the source,
are utilized to diversify the routing path.
Then, the weight of each node is calculated as a criteria to select the
next-hop candidate. In addition, two transmission modes are designed
to transmit real packets.The simulation results demonstrate that the
proposed PSLP scheme improves the safety time without
compromising the energy consumption.
EXISTINGSYSTEM
There are many techniques, like secure routing, fake sources phantom
nodes, fake cloud, and cluster, that can be applied to protect the secure
location privacy.
Mayank et al. used the data mule to protect the source location privacy,
data mule worked as the mobile data collection unit and collected data
when the source was in its communication radius in this condition the
source location privacy was changed into the protection of the mule’s
moving track,
Then the authors proposed three extended versions of angle based
scheme to protect the source location, however since the mule moved
grid by grid the protection of the mule was not given enough attention
there was still a lot of research space in reducing the time correlation.
DISADVANTAGES OF EXISTING SYSTEM
Fake sources were related to the relative location of rhe source annd
the sink, sensors nodes in a specific area might exhaust energy
The number of converged routing paths was not clearly defined and the
energy collected by nodes around the sink might be less than the
energy costed by transmitting packets.
PROPOSED SYSTEM
We focus on the source location privacy, which is an emerging research
topic in the field of security.
We propose a probabilistic source location privacy protection scheme
(PSLP), which adopts phantom nodes and fake sources for the reason
that these two techniques can diversify the routing path.
Two types of packets exist in the transmission, which are the real
packets and the fake packets. real packets are generated by the source
while fake packets are generated by fake sources
ADVANTAGES OF PROPOSED SYSTEM
The proposed PSLP has exhibited a better performance than two other
recent schemes in our simulations with regard to increasing the safety
time while balancing the energy consumption
Both phantom nodes and fake sources are integrated into the proposed
PSLP, which enhance the source location privacy
SYSTEM ARCHITECTURE:
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
System : Pentium Dual Core.
Hard Disk : 120 GB.
Monitor : 15’’ LED
Input Devices : Keyboard, Mouse
RAM : 1 GB
SYSTEM REQUIREMENTS:
SOFTWARE REQUIREMENTS:
Operating system : UBUNTU/Windows XP/7
Implementation : NS2 NS2 Version : NS2.2.28
Front End : OTCL (Object Oriented Tool
Command Language)
Tool : Cygwin (To simulate in
CONCLUSION:
FLEXIBILITY AND FAULT TOLERANCE CREATE EXCITING NEW
APPLICATIONS FOR REMOTE SENSING
IN FUTURE THE WIDE RANGE OF APPLICATIONS WILL MAKE SENSOR
NETWORKS AN INTEGRAL PART OF OUR LIVES
THANKYOU

More Related Content

What's hot

Energy efficient wireless sensor networks using linear programming optimizati...
Energy efficient wireless sensor networks using linear programming optimizati...Energy efficient wireless sensor networks using linear programming optimizati...
Energy efficient wireless sensor networks using linear programming optimizati...LogicMindtech Nologies
 
Convergence of desynchronization primitives in wireless sensor networks a sto...
Convergence of desynchronization primitives in wireless sensor networks a sto...Convergence of desynchronization primitives in wireless sensor networks a sto...
Convergence of desynchronization primitives in wireless sensor networks a sto...ieeeprojectsbangalore
 
Estimating coverage holes and enhancing coverage in mixed sensor networks or
Estimating coverage holes and enhancing coverage in mixed sensor networks orEstimating coverage holes and enhancing coverage in mixed sensor networks or
Estimating coverage holes and enhancing coverage in mixed sensor networks ormarwaeng
 
009_20150201_Structural Inference for Uncertain Networks
009_20150201_Structural Inference for Uncertain Networks009_20150201_Structural Inference for Uncertain Networks
009_20150201_Structural Inference for Uncertain NetworksHa Phuong
 
Efficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsEfficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsambitlick
 
PhD Projects in Cognitive Radio Networks Research Help
PhD Projects in Cognitive Radio Networks Research HelpPhD Projects in Cognitive Radio Networks Research Help
PhD Projects in Cognitive Radio Networks Research HelpPhD Services
 
IEEE 2014 JAVA NETWORKING PROJECTS Snapshot and continuous data collection in...
IEEE 2014 JAVA NETWORKING PROJECTS Snapshot and continuous data collection in...IEEE 2014 JAVA NETWORKING PROJECTS Snapshot and continuous data collection in...
IEEE 2014 JAVA NETWORKING PROJECTS Snapshot and continuous data collection in...IEEEGLOBALSOFTSTUDENTPROJECTS
 
Secure Data Aggregation in Wireless Sensor Networks Using Randomized Dispersi...
Secure Data Aggregation in Wireless Sensor Networks Using Randomized Dispersi...Secure Data Aggregation in Wireless Sensor Networks Using Randomized Dispersi...
Secure Data Aggregation in Wireless Sensor Networks Using Randomized Dispersi...IOSR Journals
 
Efficient Query Evaluation of Probabilistic Top-k Queries in Wireless Sensor ...
Efficient Query Evaluation of Probabilistic Top-k Queries in Wireless Sensor ...Efficient Query Evaluation of Probabilistic Top-k Queries in Wireless Sensor ...
Efficient Query Evaluation of Probabilistic Top-k Queries in Wireless Sensor ...ijceronline
 
Delaunay based two-phase algorithm for connected cover in WSNs
Delaunay based two-phase algorithm for connected cover in WSNsDelaunay based two-phase algorithm for connected cover in WSNs
Delaunay based two-phase algorithm for connected cover in WSNsMaynooth University
 
Analytic comparison between x ray fluorescence ct and k-edge ct
Analytic comparison between x ray fluorescence ct and k-edge ctAnalytic comparison between x ray fluorescence ct and k-edge ct
Analytic comparison between x ray fluorescence ct and k-edge ctieeepondy
 
BigData_MultiDimensional_CaseStudy
BigData_MultiDimensional_CaseStudyBigData_MultiDimensional_CaseStudy
BigData_MultiDimensional_CaseStudyvincentlaulagnet
 
Cramér–rao lower bounds of rss based localization with anchor position uncert...
Cramér–rao lower bounds of rss based localization with anchor position uncert...Cramér–rao lower bounds of rss based localization with anchor position uncert...
Cramér–rao lower bounds of rss based localization with anchor position uncert...LogicMindtech Nologies
 

What's hot (13)

Energy efficient wireless sensor networks using linear programming optimizati...
Energy efficient wireless sensor networks using linear programming optimizati...Energy efficient wireless sensor networks using linear programming optimizati...
Energy efficient wireless sensor networks using linear programming optimizati...
 
Convergence of desynchronization primitives in wireless sensor networks a sto...
Convergence of desynchronization primitives in wireless sensor networks a sto...Convergence of desynchronization primitives in wireless sensor networks a sto...
Convergence of desynchronization primitives in wireless sensor networks a sto...
 
Estimating coverage holes and enhancing coverage in mixed sensor networks or
Estimating coverage holes and enhancing coverage in mixed sensor networks orEstimating coverage holes and enhancing coverage in mixed sensor networks or
Estimating coverage holes and enhancing coverage in mixed sensor networks or
 
009_20150201_Structural Inference for Uncertain Networks
009_20150201_Structural Inference for Uncertain Networks009_20150201_Structural Inference for Uncertain Networks
009_20150201_Structural Inference for Uncertain Networks
 
Efficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsEfficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secrets
 
PhD Projects in Cognitive Radio Networks Research Help
PhD Projects in Cognitive Radio Networks Research HelpPhD Projects in Cognitive Radio Networks Research Help
PhD Projects in Cognitive Radio Networks Research Help
 
IEEE 2014 JAVA NETWORKING PROJECTS Snapshot and continuous data collection in...
IEEE 2014 JAVA NETWORKING PROJECTS Snapshot and continuous data collection in...IEEE 2014 JAVA NETWORKING PROJECTS Snapshot and continuous data collection in...
IEEE 2014 JAVA NETWORKING PROJECTS Snapshot and continuous data collection in...
 
Secure Data Aggregation in Wireless Sensor Networks Using Randomized Dispersi...
Secure Data Aggregation in Wireless Sensor Networks Using Randomized Dispersi...Secure Data Aggregation in Wireless Sensor Networks Using Randomized Dispersi...
Secure Data Aggregation in Wireless Sensor Networks Using Randomized Dispersi...
 
Efficient Query Evaluation of Probabilistic Top-k Queries in Wireless Sensor ...
Efficient Query Evaluation of Probabilistic Top-k Queries in Wireless Sensor ...Efficient Query Evaluation of Probabilistic Top-k Queries in Wireless Sensor ...
Efficient Query Evaluation of Probabilistic Top-k Queries in Wireless Sensor ...
 
Delaunay based two-phase algorithm for connected cover in WSNs
Delaunay based two-phase algorithm for connected cover in WSNsDelaunay based two-phase algorithm for connected cover in WSNs
Delaunay based two-phase algorithm for connected cover in WSNs
 
Analytic comparison between x ray fluorescence ct and k-edge ct
Analytic comparison between x ray fluorescence ct and k-edge ctAnalytic comparison between x ray fluorescence ct and k-edge ct
Analytic comparison between x ray fluorescence ct and k-edge ct
 
BigData_MultiDimensional_CaseStudy
BigData_MultiDimensional_CaseStudyBigData_MultiDimensional_CaseStudy
BigData_MultiDimensional_CaseStudy
 
Cramér–rao lower bounds of rss based localization with anchor position uncert...
Cramér–rao lower bounds of rss based localization with anchor position uncert...Cramér–rao lower bounds of rss based localization with anchor position uncert...
Cramér–rao lower bounds of rss based localization with anchor position uncert...
 

Similar to A probabilistic source location privacy protection scheme in wireless sensor networks

ENERGY CONSUMPTION AND LOCALITY OF SENSOR NETWORKS
ENERGY CONSUMPTION AND LOCALITY OF SENSOR NETWORKSENERGY CONSUMPTION AND LOCALITY OF SENSOR NETWORKS
ENERGY CONSUMPTION AND LOCALITY OF SENSOR NETWORKSpharmaindexing
 
M phil-computer-science-wireless-communication-projects
M phil-computer-science-wireless-communication-projectsM phil-computer-science-wireless-communication-projects
M phil-computer-science-wireless-communication-projectsVijay Karan
 
M.Phil Computer Science Wireless Communication Projects
M.Phil Computer Science Wireless Communication ProjectsM.Phil Computer Science Wireless Communication Projects
M.Phil Computer Science Wireless Communication ProjectsVijay Karan
 
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...ijcsa
 
M.E Computer Science Wireless Communication Projects
M.E Computer Science Wireless Communication ProjectsM.E Computer Science Wireless Communication Projects
M.E Computer Science Wireless Communication ProjectsVijay Karan
 
IEEE Wireless communication 2016 Title and Abstract
IEEE Wireless communication 2016 Title and AbstractIEEE Wireless communication 2016 Title and Abstract
IEEE Wireless communication 2016 Title and Abstracttsysglobalsolutions
 
Energy Conservation in Wireless Sensor Networks Using Cluster-Based Approach
Energy Conservation in Wireless Sensor Networks Using Cluster-Based ApproachEnergy Conservation in Wireless Sensor Networks Using Cluster-Based Approach
Energy Conservation in Wireless Sensor Networks Using Cluster-Based ApproachIJRES Journal
 
Cost aware s ecure routing (caser) protocol
Cost aware s ecure routing (caser) protocolCost aware s ecure routing (caser) protocol
Cost aware s ecure routing (caser) protocoljpstudcorner
 
Energy aware model for sensor network a nature inspired algorithm approach
Energy aware model for sensor network  a nature inspired algorithm approachEnergy aware model for sensor network  a nature inspired algorithm approach
Energy aware model for sensor network a nature inspired algorithm approachijdms
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsVijay Karan
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsVijay Karan
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) inventionjournals
 
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 Implementation on Data Security Approach in Dynamic Multi Hop Communication Implementation on Data Security Approach in Dynamic Multi Hop Communication
Implementation on Data Security Approach in Dynamic Multi Hop CommunicationIJCSIS Research Publications
 
Multiple optimal path identification using ant colony optimisation in wireles...
Multiple optimal path identification using ant colony optimisation in wireles...Multiple optimal path identification using ant colony optimisation in wireles...
Multiple optimal path identification using ant colony optimisation in wireles...ijwmn
 
M phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projectsM phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projectsVijay Karan
 
M phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projectsM phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projectsVijay Karan
 

Similar to A probabilistic source location privacy protection scheme in wireless sensor networks (20)

ENERGY CONSUMPTION AND LOCALITY OF SENSOR NETWORKS
ENERGY CONSUMPTION AND LOCALITY OF SENSOR NETWORKSENERGY CONSUMPTION AND LOCALITY OF SENSOR NETWORKS
ENERGY CONSUMPTION AND LOCALITY OF SENSOR NETWORKS
 
M phil-computer-science-wireless-communication-projects
M phil-computer-science-wireless-communication-projectsM phil-computer-science-wireless-communication-projects
M phil-computer-science-wireless-communication-projects
 
M.Phil Computer Science Wireless Communication Projects
M.Phil Computer Science Wireless Communication ProjectsM.Phil Computer Science Wireless Communication Projects
M.Phil Computer Science Wireless Communication Projects
 
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
 
M.E Computer Science Wireless Communication Projects
M.E Computer Science Wireless Communication ProjectsM.E Computer Science Wireless Communication Projects
M.E Computer Science Wireless Communication Projects
 
IEEE Wireless communication 2016 Title and Abstract
IEEE Wireless communication 2016 Title and AbstractIEEE Wireless communication 2016 Title and Abstract
IEEE Wireless communication 2016 Title and Abstract
 
Energy Conservation in Wireless Sensor Networks Using Cluster-Based Approach
Energy Conservation in Wireless Sensor Networks Using Cluster-Based ApproachEnergy Conservation in Wireless Sensor Networks Using Cluster-Based Approach
Energy Conservation in Wireless Sensor Networks Using Cluster-Based Approach
 
Cost aware s ecure routing (caser) protocol
Cost aware s ecure routing (caser) protocolCost aware s ecure routing (caser) protocol
Cost aware s ecure routing (caser) protocol
 
Secure and Efficient Transmission Using Jammer and Relay Networks
Secure and Efficient Transmission Using Jammer and Relay NetworksSecure and Efficient Transmission Using Jammer and Relay Networks
Secure and Efficient Transmission Using Jammer and Relay Networks
 
Energy aware model for sensor network a nature inspired algorithm approach
Energy aware model for sensor network  a nature inspired algorithm approachEnergy aware model for sensor network  a nature inspired algorithm approach
Energy aware model for sensor network a nature inspired algorithm approach
 
Ba24345348
Ba24345348Ba24345348
Ba24345348
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 Projects
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 Projects
 
Dy4301752755
Dy4301752755Dy4301752755
Dy4301752755
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 Implementation on Data Security Approach in Dynamic Multi Hop Communication Implementation on Data Security Approach in Dynamic Multi Hop Communication
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Multiple optimal path identification using ant colony optimisation in wireles...
Multiple optimal path identification using ant colony optimisation in wireles...Multiple optimal path identification using ant colony optimisation in wireles...
Multiple optimal path identification using ant colony optimisation in wireles...
 
M phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projectsM phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projects
 
M phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projectsM phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projects
 

Recently uploaded

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Recently uploaded (20)

Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

A probabilistic source location privacy protection scheme in wireless sensor networks

  • 1. PRAKASHAM ENGINEERING COLLEGE DEPARTMENT OF MCA ACADEMIC PROJECT (2017-2020) PROJECT TITLE A PROBABILISTIC SOURCE LOCATION PRIVACY PROTECTION SCHEME IN WIRELESS SENSOR NETWORKS PRESENTED BY: T. SAI LAKSHMI 17F91F0026
  • 2. ABSTRACT: With the recent developments of Wireless Sensor Networks (WSNs), computing and communication have experienced huge Meanwhile, security has not received the same attention to go such developments. In this paper, we focus on the source location problem in WSNs, a hot research topic in security, and propose a probabilistic source location privacy protection scheme (PSLP) for
  • 3. A more powerful adversary, which can use Hidden Markov Model (HMM) to estimate the state of the source, is considered in this study.To cope with this type of adversary, phantom nodes and fake sources, which are responsible to mimic the behavior of the source, are utilized to diversify the routing path.
  • 4. Then, the weight of each node is calculated as a criteria to select the next-hop candidate. In addition, two transmission modes are designed to transmit real packets.The simulation results demonstrate that the proposed PSLP scheme improves the safety time without compromising the energy consumption.
  • 5. EXISTINGSYSTEM There are many techniques, like secure routing, fake sources phantom nodes, fake cloud, and cluster, that can be applied to protect the secure location privacy.
  • 6. Mayank et al. used the data mule to protect the source location privacy, data mule worked as the mobile data collection unit and collected data when the source was in its communication radius in this condition the source location privacy was changed into the protection of the mule’s moving track,
  • 7. Then the authors proposed three extended versions of angle based scheme to protect the source location, however since the mule moved grid by grid the protection of the mule was not given enough attention there was still a lot of research space in reducing the time correlation.
  • 8. DISADVANTAGES OF EXISTING SYSTEM Fake sources were related to the relative location of rhe source annd the sink, sensors nodes in a specific area might exhaust energy The number of converged routing paths was not clearly defined and the energy collected by nodes around the sink might be less than the energy costed by transmitting packets.
  • 9. PROPOSED SYSTEM We focus on the source location privacy, which is an emerging research topic in the field of security. We propose a probabilistic source location privacy protection scheme (PSLP), which adopts phantom nodes and fake sources for the reason that these two techniques can diversify the routing path.
  • 10. Two types of packets exist in the transmission, which are the real packets and the fake packets. real packets are generated by the source while fake packets are generated by fake sources
  • 11. ADVANTAGES OF PROPOSED SYSTEM The proposed PSLP has exhibited a better performance than two other recent schemes in our simulations with regard to increasing the safety time while balancing the energy consumption Both phantom nodes and fake sources are integrated into the proposed PSLP, which enhance the source location privacy
  • 13. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS: System : Pentium Dual Core. Hard Disk : 120 GB. Monitor : 15’’ LED Input Devices : Keyboard, Mouse RAM : 1 GB
  • 14. SYSTEM REQUIREMENTS: SOFTWARE REQUIREMENTS: Operating system : UBUNTU/Windows XP/7 Implementation : NS2 NS2 Version : NS2.2.28 Front End : OTCL (Object Oriented Tool Command Language) Tool : Cygwin (To simulate in
  • 15. CONCLUSION: FLEXIBILITY AND FAULT TOLERANCE CREATE EXCITING NEW APPLICATIONS FOR REMOTE SENSING IN FUTURE THE WIDE RANGE OF APPLICATIONS WILL MAKE SENSOR NETWORKS AN INTEGRAL PART OF OUR LIVES