{"title":"An energy efficient flooding protocol for enhanced security in Wireless Sensor Networks","authors":"Johnu Celestine, Keerthi Vallepalli, Tushar Vinayaraj, Jasim Almotir, Abdelshakour A. Abuzneid","doi":"10.1109/LISAT.2015.7160203","DOIUrl":null,"url":null,"abstract":"There have been a plethora of researches focusing on providing privacy for the base station in Wireless Sensor Networks. One of the proposed solutions is to use dummy data sources, where dummy traffic is introduced to obfuscate the real traffic. This makes the adversary no longer able to see difference between real and fake traffic. In this solution, every node becomes a dummy data source and sends dummy packets to neighbor nodes, which create dummy traffic and hide the real packet from adversary. This technique uses flooding method for routing. Every node sends the received packet to all its neighbor nodes except the one which initiated the process. However, this technique has several disadvantages, most important, large bandwidth and energy consumption. In this paper, we propose a novel protocol which uses dummy data sources with variable packet size to provide security and conserve energy in WSN.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 Long Island Systems, Applications and Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/LISAT.2015.7160203","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6
Abstract
There have been a plethora of researches focusing on providing privacy for the base station in Wireless Sensor Networks. One of the proposed solutions is to use dummy data sources, where dummy traffic is introduced to obfuscate the real traffic. This makes the adversary no longer able to see difference between real and fake traffic. In this solution, every node becomes a dummy data source and sends dummy packets to neighbor nodes, which create dummy traffic and hide the real packet from adversary. This technique uses flooding method for routing. Every node sends the received packet to all its neighbor nodes except the one which initiated the process. However, this technique has several disadvantages, most important, large bandwidth and energy consumption. In this paper, we propose a novel protocol which uses dummy data sources with variable packet size to provide security and conserve energy in WSN.