Integration of cloud-based scheme with industrial wireless sensor network for data publishing in privacy of point source

被引:1
作者
Ravindhar N.V. [1 ]
Sasikumar S. [2 ]
Bharathiraja N. [3 ]
机构
[1] Department of Computer Science and Engineering, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Tamil Nadu
[2] Department of Computer Science and Engineering, Saveetha Engineering College, Tamil Nadu
[3] Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab
关键词
cloud computing; privacy of point source; research; security; technology; wireless sensor networks; WSNs;
D O I
10.1504/IJCC.2024.137408
中图分类号
学科分类号
摘要
Wireless sensor networks (WSNs) are normally conveyed in arbitrary regions with no security. The source area uncovers significant data about targets. In this paper, a plan dependent on the cloud utilising data publishing in privacy of point source is proposed to resolve the issue of source area security. Then, at that point, a cloud-moulded phony area of interest is made to add counterfeit parcels into the WSN to confound the enemy and give a far-reaching protection area. Every important parcel is steered through a way that is very hard for the area of interest finding enemy to discover straightforwardly. Recreation results represent that the plan can forestall antagonistic catch and keep a significant degree of security insurance simultaneously. The energy utilisation in this plan applies restricted impact on the organisation lifetime contrasted and a cloud-based plan and an all-course irregular steering calculation conspire. Copyright © 2024 Inderscience Enterprises Ltd.
引用
收藏
页码:124 / 138
页数:14
相关论文
共 16 条
[1]  
Anand M., Antonidoss A., Balamanigandan R., Et al., Resourceful routing algorithm for mobile ad-hoc network to enhance energy utilization, Wireless Pers. Commun, (2021)
[2]  
Conti M., Willemsen J., Crispo B., Providing source location privacy in wireless sensor networks: a survey, IEEE Communications Surveys & Tutorials, 15, 3, pp. 1238-1280, (2013)
[3]  
Huang X., Yu R., Pan M., Shu L., Secure roadside unit hotspot against eavesdropping based traffic analysis in edge computing based internet of vehicles, IEEE Access, 6, pp. 62371-62383, (2018)
[4]  
Karakaya A., Akleylek S., A survey on security threats and authentication approaches in wireless sensor networks, 2018 6th International Symposium on Digital Forensic and Security (ISDFS), pp. 1-4, (2018)
[5]  
Long J., Dong M., Ota K., Liu A., Achieving source location privacy and network lifetime maximization through tree-based diversionary routing in wireless sensor networks, IEEE Access, 2, pp. 633-651, (2014)
[6]  
Mahmoud M.E., Shen X., A novel traffic-analysis back tracing attack for locating source nodes in wireless sensor networks, 2012 IEEE International Conference on Communications (ICC), pp. 939-943, (2012)
[7]  
Mutalemwa L.C., Shin S., Realizing source location privacy in wireless sensor networks through agent node routing, 2018 International Conference on Information and Communication Technology Convergence (ICTC), pp. 1283-1285, (2018)
[8]  
Nishikawa Y., Et al., Design of stable wireless sensor network for slope monitoring, 2018 IEEE Topical Conference on Wireless Sensors and Sensor Networks (WiSNet), pp. 8-11, (2018)
[9]  
Sasikumar B., Naveenraju D., Anand K., Hariharan S., Sudhakaran P., Bharathiraja N., Diabetes prediction using sensors by analysing skin temperature, Journal of Engineering Science and Technology, 15, 2, pp. 1357-1370, (2020)
[10]  
Sinha R., Patil S., Gomes L., Vyatkin V., A survey of static formal methods for building dependable industrial automation systems, IEEE Transactions on Industrial Informatics, 15, 7, pp. 3772-3783, (2019)