Abstract
In wireless sensor networks messages are sent from source to sink, but it sometime becomes a risky communication way because of presence of eavesdropper. During transfer of packet or message from source to sink an eavesdropper may attack on the network and creates problem for the sender or receiver, as the eavesdropper may trace the path and detect the location of source or sink very easily. Because of this security is always remained a concern topic in wireless sensor networks. Different techniques introduced time to time for the protection of source and sink in wireless sensor networks. I n this paper we have also introduced a scheme for the location privacy. This technique especially effective when eavesdropper will try to locate the location of source or sink by using DREAM protocol. In this scheme deviate location information and false identity of sensor nodes is provided to the eavesdropper which can confuse the attacker and protects our source as well as sink. The nodes in these networks having identical capabilities and energy in a network is called homogeneous network (8). These types of networks can be again classified into flat and hierarchy topology. In the flat topology that the sensors close to the static sink consumes more energy than the sensors at the margin of the network. The drawbacks of flat topology can be overcome by using hierarchical topology i.e., clusters. In this, the group of nodes that forms the lower layer and the cluster heads at the higher layer (4). Cluster head, which collects data from the lower layers and then forwards it to the sink. Cluster head can acts as an aggregation point. Since the cluster head is collecting data from lower nodes, it consumes more energy than other nodes. So, the sensor nodes can be rotated dynamically to avoid the energy consumption. The Heterogeneous networks having small number of resource rich nodes and large number of resource limited basic nodes. The resource rich nodes are having powerful transceivers and batteries. The resource rich nodes can acts as cluster heads. The resource limited basic nodes having limited communication capabilities. Mobile Data Gathering is a technique that consists of one or more Mobile Collectors (MC's) (4). Mobile collector is a device equipped with powerful transceiver and high battery power. It gathers the data in short-range communications. MC roams over the sensing field to collects the data while moving or pause at some points on its moving path from the sensors. To attain the maximum energy saving, a mobile collector must travel the transmission range of each sensor node in the field. It helps the mobile collector to collect the data packets in a single hop. The path of the mobile collector in the sensing field may be random or planned. The mobility of the collector reduces the energy consumption in the
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.