{"title":"Bypassing using directional transceivers: A design for anti-tracking source location privacy protection in WSNs","authors":"Abhishek Das, L. Moharana","doi":"10.1109/ICRCICN.2016.7813548","DOIUrl":null,"url":null,"abstract":"Wireless sensor networks are “exciting emerging domain of deeply networked systems of low power wireless motes with a tiny amount of CPU and memory and large federated networks for high resolution sensing of the environment”. Wireless sensor networks have verities of applications including endangered animals monitoring, military applications like tracking positions of soldiers. Important points to be considered in this application are to secure the location of monitored objects. In presence of object sensor nodes sends event reporting messages periodically. Attackers can back track those messages to reach at source to capture the object. Different kind of techniques have been developed to protect the object from adversary like “Phantom routing”, Cyclic entrapping method (CEM) and Path extension method (PEM) which provides source location privacy in some extend but not provides 100 percent safety to the source. In this Paper a new method called Bypassing using Directional Transceivers (BDT) is introduced which performs well in case of safety, energy consumption and throughput analysis. Within a sensor network instead of using single transceiver in this new method four directional transceivers are used to provide better safety. Backtracking by adversary can be delayed by changing the direction of original path away from adversary.","PeriodicalId":254393,"journal":{"name":"2016 Second International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 Second International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICRCICN.2016.7813548","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
Wireless sensor networks are “exciting emerging domain of deeply networked systems of low power wireless motes with a tiny amount of CPU and memory and large federated networks for high resolution sensing of the environment”. Wireless sensor networks have verities of applications including endangered animals monitoring, military applications like tracking positions of soldiers. Important points to be considered in this application are to secure the location of monitored objects. In presence of object sensor nodes sends event reporting messages periodically. Attackers can back track those messages to reach at source to capture the object. Different kind of techniques have been developed to protect the object from adversary like “Phantom routing”, Cyclic entrapping method (CEM) and Path extension method (PEM) which provides source location privacy in some extend but not provides 100 percent safety to the source. In this Paper a new method called Bypassing using Directional Transceivers (BDT) is introduced which performs well in case of safety, energy consumption and throughput analysis. Within a sensor network instead of using single transceiver in this new method four directional transceivers are used to provide better safety. Backtracking by adversary can be delayed by changing the direction of original path away from adversary.