Anonymity-based intra–inter and multiple layer service dependent security-aware packet scheduling algorithm (AIIMLSDSPS)

被引:0
作者
Nandakumar R. [1 ]
Nirmala K. [2 ]
机构
[1] R & D Centre, Bharathiar University, Coimbatore
[2] Department of Computer Science and Engineering, Quaid-E-Millath College(W), Chennai
关键词
inter service dependency; intra service dependency; Packet scheduling; protocols;
D O I
10.1080/1206212X.2017.1396421
中图分类号
TK [能源与动力工程];
学科分类号
0807 ;
摘要
The concept of anonymity is included for enhancing the efficiency of security aware packet scheduling by introducing, Anonymity-based Intra and inter and multiple layer service dependent security aware packet scheduling algorithm (AIIMLSDSPS). The anonymity of the source locations are often violated by the intruders through traffic analysis and RF localization techniques. The proposed fake source-location method produces the fake sources into the network in order to confuse the intruder. When the original sources send event messages with secured routing policy, the fake sources are generated dynamically. Fake sources then construct several fake paths in the network. Thus, the proposed fake source-location method minimizes the chances of intrusion and reduces the packet loss with minimal latency and reduced overhead. However, as number of fake paths and fake messages increases, energy consumption of each source is also increases. © 2018, © 2018 Informa UK Limited, trading as Taylor & Francis Group.
引用
收藏
页码:383 / 391
页数:8
相关论文
共 13 条
  • [1] Gurjar A., Patial A.R., Evaluating the privacy measure of the source location privacy scheme in a wireless sensor network, Int J Comput Eng Res, 3, pp. 10-13, (2013)
  • [2] Dong M., Ota K., Liu A., Preserving source-location privacy through redundant fog loop for wireless sensor networks, pp. 1835-1842, (2015)
  • [3] Li Y., Ren J., Source-location privacy through dynamic routing in wireless sensor networks, pp. 1-9, (2010)
  • [4] Moe M.E.G., Quantification of anonymity for mobile ad hoc networks, Electron Notes Theor Comput Sci, 244, pp. 95-107, (2009)
  • [5] Zhu X., Guo H., Liang S., Et al., An improved security-aware packet scheduling algorithm in real-time wireless networks, Inf Process Lett, 112, 7, pp. 282-288, (2012)
  • [6] Qin X., Alghamdi M., Nijim M., Et al., Improving security of real-time wireless networks through packet scheduling [transactions letters], IEEE Trans Wirel Commun, 7, 9, (2008)
  • [7] Novotny P., Wolf A.L., Ko B.J., Discovering service dependencies in mobile ad hoc networks, pp. 527-533, (2013)
  • [8] Wang S., Capretz M.A., A dependency impact analysis model for web services evolution, pp. 359-365, (2009)
  • [9] Lawrence E., Michailidis G., Nair V., Et al., Network tomography: a review and recent developments, Ann Arbor, 1001, 48, pp. 109-1107, (2006)
  • [10] Tati S., Novotny P., Ko B.J., Et al., Performance diagnosis of services in scalable and dynamic networks, System, 5, (2011)