IJSDR
IJSDR
INTERNATIONAL JOURNAL OF SCIENTIFIC DEVELOPMENT AND RESEARCH
International Peer Reviewed & Refereed Journals, Open Access Journal
ISSN Approved Journal No: 2455-2631 | Impact factor: 8.15 | ESTD Year: 2016
open access , Peer-reviewed, and Refereed Journals, Impact factor 8.15

Issue: April 2024

Volume 9 | Issue 4

Impact factor: 8.15

Click Here For more Info

Imp Links for Author
Imp Links for Reviewer
Research Area
Subscribe IJSDR
Visitor Counter

Copyright Infringement Claims
Indexing Partner
Published Paper Details
Paper Title: A REVIEW ON LOCATION PRIVACY PRESERVING TECHNIQUES IN WSN
Authors Name: DEEPIKA H.T , VYBHAVI P , CHINNASWAMY C.N
Unique Id: IJSDR1804025
Published In: Volume 3 Issue 4, April-2018
Abstract: Abstract-Wireless Sensor Networks (WSN) is one of the main zone of research and it has been more well known in the real life difficulties by giving minimal effort arrangements. The system comprises of little sensor nodes capable for detecting, handling, computation and communication. The system comprises of various sorts of assault, the most harming assault is sinkhole assault. In this kind of assault, the sinkhole node tries to draw in information to itself by transmitting counterfeit data to neighbor nodes and henceforth it interferes with the usefulness of such systems. Thusly with a specific end goal to overcome from this sort of assault giving security is critical. In this paper we are proposing sink and also source area protection systems. With a specific end goal to give more protection these procedures like forward random walk (FRW) and BLAST (Base station location anonymity and security technique) is utilized. On account of forward random walk conspire requires every node to acquire its hop count to the sink, which can be accomplished by utilizing a sink-based flooding. Toward the starting, the sink will start a flooding, after which every node can get the both its neighbors hop count to the sink. On account of BLAST conspire the center thought is to change the transmission scope of an arrangement of some chose sensors around the base to befuddle the assailant. Through this procedure, we can make an arrangement of fake base stations which can't be recognized by a solid assailant.
Keywords: Keywords-Wireless Sensor Networks (WSN), Base station Location Anonymity and Security Technique (BLAST), Forward Random Walk (FRW), Edge Based Strain Smoothing Technique, 2-Phantom Angle Based Routing (2PAR).
Cite Article: "A REVIEW ON LOCATION PRIVACY PRESERVING TECHNIQUES IN WSN", International Journal of Science & Engineering Development Research (www.ijsdr.org), ISSN:2455-2631, Vol.3, Issue 4, page no.147 - 155, April-2018, Available :http://www.ijsdr.org/papers/IJSDR1804025.pdf
Downloads: 000337071
Publication Details: Published Paper ID: IJSDR1804025
Registration ID:180133
Published In: Volume 3 Issue 4, April-2018
DOI (Digital Object Identifier):
Page No: 147 - 155
Publisher: IJSDR | www.ijsdr.org
ISSN Number: 2455-2631

Click Here to Download This Article

Article Preview

Click here for Article Preview







Major Indexing from www.ijsdr.org
Google Scholar ResearcherID Thomson Reuters Mendeley : reference manager Academia.edu
arXiv.org : cornell university library Research Gate CiteSeerX DOAJ : Directory of Open Access Journals
DRJI Index Copernicus International Scribd DocStoc

Track Paper
Important Links
Conference Proposal
ISSN
DOI (A digital object identifier)


Providing A digital object identifier by DOI
How to GET DOI and Hard Copy Related
Open Access License Policy
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
Creative Commons License
This material is Open Knowledge
This material is Open Data
This material is Open Content
Social Media
IJSDR

Indexing Partner