An improved packet forwarding approach for source location privacy in wireless sensor networks

Privacy is one of the major concerns in dealing with information, either transmission or storage. The adversaries attempt to launch the variety of attacks against a system to capture their needed information. Sometimes content of information is their target and other times the context of information...

Full description

Saved in:
Bibliographic Details
Main Author: Abrishamchi, Mohammad Ali Nassiri
Format: Thesis
Published: 2014
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Privacy is one of the major concerns in dealing with information, either transmission or storage. The adversaries attempt to launch the variety of attacks against a system to capture their needed information. Sometimes content of information is their target and other times the context of information such as timing and location can be the aim of the attack. The wireless sensors network is established based on affairs related to information. Depending on the application of this type of networks, different security considerations should be taken. This research focuses on the source location privacy where the attacker tries to discover the origin sender of packets to achieve the under monitor assets by backtracking the received signals. The final aim is improving the safety period for source node and it means the prolonging the discovering duration of the exact location of source node for adversary. This study concentrates on solutions based on random walk method as a core technique and tries to present an idea to improve the results. The proposed approach named Isolated Adversary Zone is a solution for packet forwarding within wireless sensor network. In this study some of the existing methods are investigated in terms of safety period. These solutions have been implemented by simulating in MATLAB. From this knowledge, the author proposes a packet forwarding approach which can improve the safety period for source node. The proposed approach is tested and some future works are suggested at the end of this study