SlideShare a Scribd company logo
1 of 1
Impulse Technologies
                                      Beacons U to World of technology
        044-42133143, 98401 03301,9841091117 ieeeprojects@yahoo.com www.impulse.net.in
      A Cloud-Based Scheme for Protecting Source-Location
    Privacy against Hotspot-Locating Attack in Wireless Sensor
                            Networks
   Abstract:
          In wireless sensor networks, adversaries can make use of the traffic
   information to locate the monitored objects, e.g., to hunt endangered animals or
   kill soldiers. In this paper, we first define a hotspot phenomenon that causes an
   obvious inconsistency in the network traffic pattern due to the large volume of
   packets originating from a small area. Second, we develop a realistic adversary
   model, assuming that the adversary can monitor the network traffic in multiple
   areas, rather than the entire network or only one area. Using this model, we
   introduce a novel attack called Hotspot-Locating where the adversary uses traffic
   analysis techniques to locate hotspots. Finally, we propose a cloud-based scheme
   for efficiently protecting source nodes’ location
   Privacy against Hotspot-Locating attack by creating a cloud with an irregular shape
   of fake traffic, to counteract the inconsistency in the traffic pattern and camouflage
   the source node in the nodes forming the cloud. To reduce the energy cost, clouds
   are active only during data transmission and the intersection of clouds creates a
   larger merged cloud, to reduce the number of fake packets and also boost privacy
   preservation. Simulation and analytical results demonstrate that our scheme can
   provide stronger privacy protection than routing-based schemes and requires much
   less energy than global-adversary-based schemes.




  Your Own Ideas or Any project from any company can be Implemented
at Better price (All Projects can be done in Java or DotNet whichever the student wants)
                                                                                          1

More Related Content

What's hot

A modified approach for secure routing and power aware in mobile ad hoc network
A modified approach for secure routing and power aware in mobile ad hoc networkA modified approach for secure routing and power aware in mobile ad hoc network
A modified approach for secure routing and power aware in mobile ad hoc networkDiksha Katiyar
 
Efficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsEfficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsambitlick
 
Dotnet modeling and optimizing the performance- security tradeoff on d-ncs u...
Dotnet  modeling and optimizing the performance- security tradeoff on d-ncs u...Dotnet  modeling and optimizing the performance- security tradeoff on d-ncs u...
Dotnet modeling and optimizing the performance- security tradeoff on d-ncs u...Ecway Technologies
 
transmission-efficient clustering method for wireless sensor networks using c...
transmission-efficient clustering method for wireless sensor networks using c...transmission-efficient clustering method for wireless sensor networks using c...
transmission-efficient clustering method for wireless sensor networks using c...swathi78
 
AWS re:Invent 2016: Serverless to 32 XLarge: A Unified Security Approach To A...
AWS re:Invent 2016: Serverless to 32 XLarge: A Unified Security Approach To A...AWS re:Invent 2016: Serverless to 32 XLarge: A Unified Security Approach To A...
AWS re:Invent 2016: Serverless to 32 XLarge: A Unified Security Approach To A...Amazon Web Services
 

What's hot (10)

9
99
9
 
Network Research Project Topics
Network Research Project TopicsNetwork Research Project Topics
Network Research Project Topics
 
18
1818
18
 
A modified approach for secure routing and power aware in mobile ad hoc network
A modified approach for secure routing and power aware in mobile ad hoc networkA modified approach for secure routing and power aware in mobile ad hoc network
A modified approach for secure routing and power aware in mobile ad hoc network
 
Efficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsEfficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secrets
 
Dotnet modeling and optimizing the performance- security tradeoff on d-ncs u...
Dotnet  modeling and optimizing the performance- security tradeoff on d-ncs u...Dotnet  modeling and optimizing the performance- security tradeoff on d-ncs u...
Dotnet modeling and optimizing the performance- security tradeoff on d-ncs u...
 
31
3131
31
 
transmission-efficient clustering method for wireless sensor networks using c...
transmission-efficient clustering method for wireless sensor networks using c...transmission-efficient clustering method for wireless sensor networks using c...
transmission-efficient clustering method for wireless sensor networks using c...
 
AWS re:Invent 2016: Serverless to 32 XLarge: A Unified Security Approach To A...
AWS re:Invent 2016: Serverless to 32 XLarge: A Unified Security Approach To A...AWS re:Invent 2016: Serverless to 32 XLarge: A Unified Security Approach To A...
AWS re:Invent 2016: Serverless to 32 XLarge: A Unified Security Approach To A...
 
Data Applied:Forecast
Data Applied:ForecastData Applied:Forecast
Data Applied:Forecast
 

Similar to Protect Source Location Privacy Against Hotspot Attacks

Mitigation of sink hole attack in manet using aco
Mitigation of sink hole attack in manet using acoMitigation of sink hole attack in manet using aco
Mitigation of sink hole attack in manet using acoIJARIIT
 
Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.Rahul Kumar
 
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...IOSR Journals
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Robust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networksRobust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networksijdpsjournal
 
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...IJARIIT
 
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOPReactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOPIOSR Journals
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Investigation of detection & prevention sinkhole attack in manet
Investigation of detection & prevention sinkhole attack in manetInvestigation of detection & prevention sinkhole attack in manet
Investigation of detection & prevention sinkhole attack in manetijctet
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksIntegrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksEditor IJMTER
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 
Network coding combined with onion routing for anonymous and secure communica...
Network coding combined with onion routing for anonymous and secure communica...Network coding combined with onion routing for anonymous and secure communica...
Network coding combined with onion routing for anonymous and secure communica...IJCNCJournal
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) inventionjournals
 
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...IJMER
 

Similar to Protect Source Location Privacy Against Hotspot Attacks (20)

N0704075079
N0704075079N0704075079
N0704075079
 
Mitigation of sink hole attack in manet using aco
Mitigation of sink hole attack in manet using acoMitigation of sink hole attack in manet using aco
Mitigation of sink hole attack in manet using aco
 
Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.
 
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Robust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networksRobust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networks
 
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
 
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOPReactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
 
F33022028
F33022028F33022028
F33022028
 
F33022028
F33022028F33022028
F33022028
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
D0952126
D0952126D0952126
D0952126
 
Investigation of detection & prevention sinkhole attack in manet
Investigation of detection & prevention sinkhole attack in manetInvestigation of detection & prevention sinkhole attack in manet
Investigation of detection & prevention sinkhole attack in manet
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksIntegrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 
Network coding combined with onion routing for anonymous and secure communica...
Network coding combined with onion routing for anonymous and secure communica...Network coding combined with onion routing for anonymous and secure communica...
Network coding combined with onion routing for anonymous and secure communica...
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
 

More from Technology_solution (20)

17
1717
17
 
16
1616
16
 
15
1515
15
 
25
2525
25
 
24
2424
24
 
22
2222
22
 
21
2121
21
 
20
2020
20
 
19
1919
19
 
18
1818
18
 
17
1717
17
 
16
1616
16
 
15
1515
15
 
14
1414
14
 
13
1313
13
 
12
1212
12
 
11
1111
11
 
10
1010
10
 
9
99
9
 
8
88
8
 

Protect Source Location Privacy Against Hotspot Attacks

  • 1. Impulse Technologies Beacons U to World of technology 044-42133143, 98401 03301,9841091117 ieeeprojects@yahoo.com www.impulse.net.in A Cloud-Based Scheme for Protecting Source-Location Privacy against Hotspot-Locating Attack in Wireless Sensor Networks Abstract: In wireless sensor networks, adversaries can make use of the traffic information to locate the monitored objects, e.g., to hunt endangered animals or kill soldiers. In this paper, we first define a hotspot phenomenon that causes an obvious inconsistency in the network traffic pattern due to the large volume of packets originating from a small area. Second, we develop a realistic adversary model, assuming that the adversary can monitor the network traffic in multiple areas, rather than the entire network or only one area. Using this model, we introduce a novel attack called Hotspot-Locating where the adversary uses traffic analysis techniques to locate hotspots. Finally, we propose a cloud-based scheme for efficiently protecting source nodes’ location Privacy against Hotspot-Locating attack by creating a cloud with an irregular shape of fake traffic, to counteract the inconsistency in the traffic pattern and camouflage the source node in the nodes forming the cloud. To reduce the energy cost, clouds are active only during data transmission and the intersection of clouds creates a larger merged cloud, to reduce the number of fake packets and also boost privacy preservation. Simulation and analytical results demonstrate that our scheme can provide stronger privacy protection than routing-based schemes and requires much less energy than global-adversary-based schemes. Your Own Ideas or Any project from any company can be Implemented at Better price (All Projects can be done in Java or DotNet whichever the student wants) 1