SlideShare a Scribd company logo
PRAKASHAM ENGINEERING
COLLEGE
DEPARTMENT OF MCA
ACADEMIC PROJECT (2017-2020)
PROJECT TITLE
A PROBABILISTIC SOURCE LOCATION PRIVACY
PROTECTION SCHEME IN WIRELESS SENSOR NETWORKS
PRESENTED BY:
T. SAI LAKSHMI
17F91F0026
ABSTRACT:
With the recent developments of Wireless Sensor Networks (WSNs),
computing and communication have experienced huge
Meanwhile, security has not received the same attention to go
such developments. In this paper, we focus on the source location
problem in WSNs, a hot research topic in security, and propose a
probabilistic source location privacy protection scheme (PSLP) for
A more powerful adversary, which can use Hidden Markov Model
(HMM) to estimate the state of the source, is considered in this
study.To cope with this type of adversary, phantom nodes and fake
sources, which are responsible to mimic the behavior of the source,
are utilized to diversify the routing path.
Then, the weight of each node is calculated as a criteria to select the
next-hop candidate. In addition, two transmission modes are designed
to transmit real packets.The simulation results demonstrate that the
proposed PSLP scheme improves the safety time without
compromising the energy consumption.
EXISTINGSYSTEM
There are many techniques, like secure routing, fake sources phantom
nodes, fake cloud, and cluster, that can be applied to protect the secure
location privacy.
Mayank et al. used the data mule to protect the source location privacy,
data mule worked as the mobile data collection unit and collected data
when the source was in its communication radius in this condition the
source location privacy was changed into the protection of the mule’s
moving track,
Then the authors proposed three extended versions of angle based
scheme to protect the source location, however since the mule moved
grid by grid the protection of the mule was not given enough attention
there was still a lot of research space in reducing the time correlation.
DISADVANTAGES OF EXISTING SYSTEM
Fake sources were related to the relative location of rhe source annd
the sink, sensors nodes in a specific area might exhaust energy
The number of converged routing paths was not clearly defined and the
energy collected by nodes around the sink might be less than the
energy costed by transmitting packets.
PROPOSED SYSTEM
We focus on the source location privacy, which is an emerging research
topic in the field of security.
We propose a probabilistic source location privacy protection scheme
(PSLP), which adopts phantom nodes and fake sources for the reason
that these two techniques can diversify the routing path.
Two types of packets exist in the transmission, which are the real
packets and the fake packets. real packets are generated by the source
while fake packets are generated by fake sources
ADVANTAGES OF PROPOSED SYSTEM
The proposed PSLP has exhibited a better performance than two other
recent schemes in our simulations with regard to increasing the safety
time while balancing the energy consumption
Both phantom nodes and fake sources are integrated into the proposed
PSLP, which enhance the source location privacy
SYSTEM ARCHITECTURE:
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
System : Pentium Dual Core.
Hard Disk : 120 GB.
Monitor : 15’’ LED
Input Devices : Keyboard, Mouse
RAM : 1 GB
SYSTEM REQUIREMENTS:
SOFTWARE REQUIREMENTS:
Operating system : UBUNTU/Windows XP/7
Implementation : NS2 NS2 Version : NS2.2.28
Front End : OTCL (Object Oriented Tool
Command Language)
Tool : Cygwin (To simulate in
CONCLUSION:
FLEXIBILITY AND FAULT TOLERANCE CREATE EXCITING NEW
APPLICATIONS FOR REMOTE SENSING
IN FUTURE THE WIDE RANGE OF APPLICATIONS WILL MAKE SENSOR
NETWORKS AN INTEGRAL PART OF OUR LIVES
THANKYOU

More Related Content

PDF
Dotnet distributed processing of probabilistic top-k queries in wireless sen...
PDF
Ace an accurate and efficient multi entity device-free wlan localization system
DOCX
transmission-efficient clustering method for wireless sensor networks using c...
PPTX
Clustering in wireless sensor networks with compressive sensing
DOCX
Wireless sensor networks simulation
PPT
Wsn ppt
PDF
Multivariate visibility graphs for fMRI data
Dotnet distributed processing of probabilistic top-k queries in wireless sen...
Ace an accurate and efficient multi entity device-free wlan localization system
transmission-efficient clustering method for wireless sensor networks using c...
Clustering in wireless sensor networks with compressive sensing
Wireless sensor networks simulation
Wsn ppt
Multivariate visibility graphs for fMRI data

What's hot (13)

DOCX
Energy efficient wireless sensor networks using linear programming optimizati...
DOCX
Convergence of desynchronization primitives in wireless sensor networks a sto...
PDF
Estimating coverage holes and enhancing coverage in mixed sensor networks or
PDF
009_20150201_Structural Inference for Uncertain Networks
DOCX
Efficient spread spectrum communication without pre shared secrets
PPTX
PhD Projects in Cognitive Radio Networks Research Help
DOCX
IEEE 2014 JAVA NETWORKING PROJECTS Snapshot and continuous data collection in...
PDF
Secure Data Aggregation in Wireless Sensor Networks Using Randomized Dispersi...
PDF
Efficient Query Evaluation of Probabilistic Top-k Queries in Wireless Sensor ...
PPTX
Delaunay based two-phase algorithm for connected cover in WSNs
DOCX
Analytic comparison between x ray fluorescence ct and k-edge ct
PDF
BigData_MultiDimensional_CaseStudy
DOCX
Cramér–rao lower bounds of rss based localization with anchor position uncert...
Energy efficient wireless sensor networks using linear programming optimizati...
Convergence of desynchronization primitives in wireless sensor networks a sto...
Estimating coverage holes and enhancing coverage in mixed sensor networks or
009_20150201_Structural Inference for Uncertain Networks
Efficient spread spectrum communication without pre shared secrets
PhD Projects in Cognitive Radio Networks Research Help
IEEE 2014 JAVA NETWORKING PROJECTS Snapshot and continuous data collection in...
Secure Data Aggregation in Wireless Sensor Networks Using Randomized Dispersi...
Efficient Query Evaluation of Probabilistic Top-k Queries in Wireless Sensor ...
Delaunay based two-phase algorithm for connected cover in WSNs
Analytic comparison between x ray fluorescence ct and k-edge ct
BigData_MultiDimensional_CaseStudy
Cramér–rao lower bounds of rss based localization with anchor position uncert...
Ad

Similar to A probabilistic source location privacy protection scheme in wireless sensor networks (20)

PDF
ENERGY CONSUMPTION AND LOCALITY OF SENSOR NETWORKS
PDF
M phil-computer-science-wireless-communication-projects
PDF
M.Phil Computer Science Wireless Communication Projects
PDF
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
PDF
M.E Computer Science Wireless Communication Projects
PDF
IEEE Wireless communication 2016 Title and Abstract
PDF
Energy Conservation in Wireless Sensor Networks Using Cluster-Based Approach
DOCX
Cost aware s ecure routing (caser) protocol
PDF
Secure and Efficient Transmission Using Jammer and Relay Networks
PDF
Energy aware model for sensor network a nature inspired algorithm approach
PDF
Ba24345348
PDF
IEEE 2015 NS2 Projects
PDF
IEEE 2015 NS2 Projects
PDF
Dy4301752755
PDF
International Journal of Engineering and Science Invention (IJESI)
PDF
Implementation on Data Security Approach in Dynamic Multi Hop Communication
PDF
www.ijerd.com
PDF
Multiple optimal path identification using ant colony optimisation in wireles...
PDF
M.Phil Computer Science Secure Computing Projects
PDF
M phil-computer-science-secure-computing-projects
ENERGY CONSUMPTION AND LOCALITY OF SENSOR NETWORKS
M phil-computer-science-wireless-communication-projects
M.Phil Computer Science Wireless Communication Projects
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
M.E Computer Science Wireless Communication Projects
IEEE Wireless communication 2016 Title and Abstract
Energy Conservation in Wireless Sensor Networks Using Cluster-Based Approach
Cost aware s ecure routing (caser) protocol
Secure and Efficient Transmission Using Jammer and Relay Networks
Energy aware model for sensor network a nature inspired algorithm approach
Ba24345348
IEEE 2015 NS2 Projects
IEEE 2015 NS2 Projects
Dy4301752755
International Journal of Engineering and Science Invention (IJESI)
Implementation on Data Security Approach in Dynamic Multi Hop Communication
www.ijerd.com
Multiple optimal path identification using ant colony optimisation in wireles...
M.Phil Computer Science Secure Computing Projects
M phil-computer-science-secure-computing-projects
Ad

Recently uploaded (20)

PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Cloud computing and distributed systems.
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Encapsulation theory and applications.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Empathic Computing: Creating Shared Understanding
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
MYSQL Presentation for SQL database connectivity
Diabetes mellitus diagnosis method based random forest with bat algorithm
Review of recent advances in non-invasive hemoglobin estimation
Per capita expenditure prediction using model stacking based on satellite ima...
Cloud computing and distributed systems.
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Programs and apps: productivity, graphics, security and other tools
20250228 LYD VKU AI Blended-Learning.pptx
Encapsulation theory and applications.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Encapsulation_ Review paper, used for researhc scholars
Building Integrated photovoltaic BIPV_UPV.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
NewMind AI Weekly Chronicles - August'25 Week I
Empathic Computing: Creating Shared Understanding
“AI and Expert System Decision Support & Business Intelligence Systems”
Chapter 3 Spatial Domain Image Processing.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows

A probabilistic source location privacy protection scheme in wireless sensor networks

  • 1. PRAKASHAM ENGINEERING COLLEGE DEPARTMENT OF MCA ACADEMIC PROJECT (2017-2020) PROJECT TITLE A PROBABILISTIC SOURCE LOCATION PRIVACY PROTECTION SCHEME IN WIRELESS SENSOR NETWORKS PRESENTED BY: T. SAI LAKSHMI 17F91F0026
  • 2. ABSTRACT: With the recent developments of Wireless Sensor Networks (WSNs), computing and communication have experienced huge Meanwhile, security has not received the same attention to go such developments. In this paper, we focus on the source location problem in WSNs, a hot research topic in security, and propose a probabilistic source location privacy protection scheme (PSLP) for
  • 3. A more powerful adversary, which can use Hidden Markov Model (HMM) to estimate the state of the source, is considered in this study.To cope with this type of adversary, phantom nodes and fake sources, which are responsible to mimic the behavior of the source, are utilized to diversify the routing path.
  • 4. Then, the weight of each node is calculated as a criteria to select the next-hop candidate. In addition, two transmission modes are designed to transmit real packets.The simulation results demonstrate that the proposed PSLP scheme improves the safety time without compromising the energy consumption.
  • 5. EXISTINGSYSTEM There are many techniques, like secure routing, fake sources phantom nodes, fake cloud, and cluster, that can be applied to protect the secure location privacy.
  • 6. Mayank et al. used the data mule to protect the source location privacy, data mule worked as the mobile data collection unit and collected data when the source was in its communication radius in this condition the source location privacy was changed into the protection of the mule’s moving track,
  • 7. Then the authors proposed three extended versions of angle based scheme to protect the source location, however since the mule moved grid by grid the protection of the mule was not given enough attention there was still a lot of research space in reducing the time correlation.
  • 8. DISADVANTAGES OF EXISTING SYSTEM Fake sources were related to the relative location of rhe source annd the sink, sensors nodes in a specific area might exhaust energy The number of converged routing paths was not clearly defined and the energy collected by nodes around the sink might be less than the energy costed by transmitting packets.
  • 9. PROPOSED SYSTEM We focus on the source location privacy, which is an emerging research topic in the field of security. We propose a probabilistic source location privacy protection scheme (PSLP), which adopts phantom nodes and fake sources for the reason that these two techniques can diversify the routing path.
  • 10. Two types of packets exist in the transmission, which are the real packets and the fake packets. real packets are generated by the source while fake packets are generated by fake sources
  • 11. ADVANTAGES OF PROPOSED SYSTEM The proposed PSLP has exhibited a better performance than two other recent schemes in our simulations with regard to increasing the safety time while balancing the energy consumption Both phantom nodes and fake sources are integrated into the proposed PSLP, which enhance the source location privacy
  • 13. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS: System : Pentium Dual Core. Hard Disk : 120 GB. Monitor : 15’’ LED Input Devices : Keyboard, Mouse RAM : 1 GB
  • 14. SYSTEM REQUIREMENTS: SOFTWARE REQUIREMENTS: Operating system : UBUNTU/Windows XP/7 Implementation : NS2 NS2 Version : NS2.2.28 Front End : OTCL (Object Oriented Tool Command Language) Tool : Cygwin (To simulate in
  • 15. CONCLUSION: FLEXIBILITY AND FAULT TOLERANCE CREATE EXCITING NEW APPLICATIONS FOR REMOTE SENSING IN FUTURE THE WIDE RANGE OF APPLICATIONS WILL MAKE SENSOR NETWORKS AN INTEGRAL PART OF OUR LIVES