Counterfeit Clones A Novel Technique for Source and Sink Location Privacy in Wireless Sensor Networks


The Internet of Things cannot function properly without Wireless Sensor Networks, also known as WSNs (IoT). In WSNs, sensors are positioned in a haphazard manner in hostile environments for the purposes of monitoring. If only the content protection mechanisms that are currently available are used in such an environment, then wireless sensor networks will be susceptible to unauthorized interception by both global and local adversaries. Because a potential adversary could use contextual data to pinpoint either the source or the sink, protecting the privacy of context is an essential component of WSN privacy that simply cannot be ignored. WSN is put to use in a wide variety of applications and is able to send confidential information. It is necessary to provide protection techniques in order to prevent the adversary from breaching the system and revealing the location of the source and sink in order to ensure the confidentiality of sensitive information. In previous works, the emphasis was placed on safeguarding the location at the routing level; however, an adversary could easily circumvent this measure and locate the nodes by capturing frames and determining the source and destination addresses. In this paper, we propose the Counterfeit Clones (CC) scheme as a way to protect the privacy of nodes' locations at the data link layer. This is accomplished by employing a lightweight one-way hash function in order to conceal the MAC address. At the routing level, fake sources and sinks are utilized in order to conceal the identity of the node that is the source of the traffic and the node that is the destination of the traffic. The findings of the performance analysis indicate that the CC technique has a longer period of time during which it is safe to operate while consuming less energy in comparison to some of the other options that are currently available. In contrast to other algorithms, CC has the ability to shorten the amount of time it takes for an accident to occur, as well as maintain the source's and sink's right to privacy regarding their locations, all while ensuring faster packet transmission to the base station.

Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here

PROJECT TITLE : Low-Latency and Fresh Content Provision in Information-Centric Vehicular Networks ABSTRACT: The paper investigates the content service provision of information-centric vehicular networks (ICVNs) from the perspective
PROJECT TITLE : Novel Multi-Level Cell TFT Memory With an In–Ga–Zn-O Charge Storage Layer and Channel ABSTRACT: For the first time, multi-level cell memory applications using amorphous indium-gallium-zinc oxide (a-IGZO) thin-film
PROJECT TITLE : WeDea A New EEG-based Framework for Emotion Recognition ABSTRACT: Electroencephalography (EEG) is a technique that has been actively developed and put to use in a variety of fields, including automobiles, robotics,
PROJECT TITLE : A Novel Deep Reinforcement Learning based Relay Selection for Broadcasting in Vehicular Ad hoc Networks ABSTRACT: It is believed that VANETs, also known as Vehicular Ad hoc NETworks, are among the largest networks
PROJECT TITLE : New Blockchain Based Special Keys Security Model with Path Compression Algorithm for Big Data ABSTRACT: In recent years, following the introduction of the IoT (Internet of Things) into our lives and thanks to

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry