A Review of Routing Techniques in Location Source Privacy for Wireless Sensor Network
Yeni Yanti (a), Nasaruddin Nasaruddin(b*), Yuwaldi Away(b), Teuku Yuliar Arif (b)

a) Doctoral Program, School of Engineering, Syiah Kuala University, Darussalam Banda Aceh, Indonesia, 23111

b) Department of Electrical and Computer Engineering, Syiah Kuala University, Banda Aceh, Indonesia, 23111
*nasaruddin[at]unsyiah.ac.id

a) Department Engineering Department, Faculty of Engineering, Serambi Mekkah University, Banda Aceh, Indonesia, 23245


Abstract

In a wireless sensor network context, a wireless sensor network (WSN) is a collection of sensor nodes made up of small nodes with minimal energy resources and powered solely by batteries. Sensor nodes that collaborate in large-scale area networks with limited energy and unsupervised situations, as well as poor security. Sensor node communication becomes vulnerable, and attackers use various methods to gather information about the location of the transmission packet^s originating route. The WSN research community has taken notice of this issue. In order to protect and prevent attackers from finding the route of the source of packet delivery, the Location Source Privacy Scheme (LSP) was implemented. The LSP system employs a variety of routing mechanisms to shield the location of the route source transmitting packets from various types of attacks. In addition, because WSN energy sources are limited, the LSP routing approach is employed to reduce energy consumption. We present an in-depth assessment of current research on LSP routing strategies as route security currently utilized for WSNs in this paper, as well as some future perspectives that are still being developed

Keywords: Location source privacy- wireless sensor network- routing technique- transmission packet- attack

Topic: Signal Processing and Communication

ICICI 2022 Conference | Conference Management System