ICICI 2022
Conference Management System
Main Site
Submission Guide
Register
Login
User List | Statistics
Abstract List | Statistics
Poster List
Paper List
Reviewer List
Presentation Video
Online Q&A Forum
Access Mode
Ifory System
:: Abstract ::

<< back

A Review of Routing Techniques in Location Source Privacy for Wireless Sensor Network
Yeni Yanti (a), Nasaruddin Nasaruddin(b*), Yuwaldi Away(b), Teuku Yuliar Arif (b)

a) Doctoral Program, School of Engineering, Syiah Kuala University, Darussalam Banda Aceh, Indonesia, 23111

b) Department of Electrical and Computer Engineering, Syiah Kuala University, Banda Aceh, Indonesia, 23111
*nasaruddin[at]unsyiah.ac.id

a) Department Engineering Department, Faculty of Engineering, Serambi Mekkah University, Banda Aceh, Indonesia, 23245


Abstract

In a wireless sensor network context, a wireless sensor network (WSN) is a collection of sensor nodes made up of small nodes with minimal energy resources and powered solely by batteries. Sensor nodes that collaborate in large-scale area networks with limited energy and unsupervised situations, as well as poor security. Sensor node communication becomes vulnerable, and attackers use various methods to gather information about the location of the transmission packet^s originating route. The WSN research community has taken notice of this issue. In order to protect and prevent attackers from finding the route of the source of packet delivery, the Location Source Privacy Scheme (LSP) was implemented. The LSP system employs a variety of routing mechanisms to shield the location of the route source transmitting packets from various types of attacks. In addition, because WSN energy sources are limited, the LSP routing approach is employed to reduce energy consumption. We present an in-depth assessment of current research on LSP routing strategies as route security currently utilized for WSNs in this paper, as well as some future perspectives that are still being developed

Keywords: Location source privacy- wireless sensor network- routing technique- transmission packet- attack

Topic: Signal Processing and Communication

Plain Format | Corresponding Author (Yeni Yanti)

Share Link

Share your abstract link to your social media or profile page

ICICI 2022 - Conference Management System

Powered By Konfrenzi Ultimate 1.832M-Build6 © 2007-2025 All Rights Reserved