ugc approved journal list IJRTI Research Journal
International Journal for Research Trends and Innovation
An International Open Access Journal
Impact Factor: 4.87

Call For Paper

Issue: May 2019

Volume 4 | Issue 5

Impact Factor: 4.87

Submit Paper Online

Click Here For more Details

For Authors

Forms / Download

Editorial Board

Subscribe IJRTI

Facts & Figure

Impact Factor : 4.87

Issue per Year : 12

Volume Published : 4

Issue Published : 36

Article Submitted : 1542

Article Published : 923

Total Authors : 2498

Total Reviewer : 521

Total Pages : 147

Total Countries : 14

Visitor Counter

Indexing Partner

Published Paper Details
Paper Title: Location Privacy Preservation of sink through multi-path selection in wsn
Authors Name: Deepika HT , Chinnaswamy C.N , T.H Srinivas
Unique Id: IJRTI1805021
Published In: Volume 3 Issue 5, June-2018
Abstract: Wireless Sensor Networks (WSN) is one of the main zone of research and it has been more well known in the real life difficulties by giving minimal effort arrangements. The system comprises of little sensor nodes capable for detecting, handling, computation and communication. The system comprises of various sorts of assault, the most harming assault is sinkhole assault. In this kind of assault, the sinkhole node tries to draw in information to itself by transmitting counterfeit data to neighbor nodes and henceforth it interferes with the usefulness of such systems. Thusly with a specific end goal to overcome from this sort of assault giving security is critical. In this paper we are proposing sink and also source area protection systems. With a specific end goal to give more protection these procedures like forward random walk (FRW) and BLAST (Base station location anonymity and security technique) is utilized. On account of forward random walk conspire requires every node to acquire its hop count to the sink, which can be accomplished by utilizing a sink-based flooding. Toward the starting, the sink will start a flooding, after which every node can get the both its neighbors hop count to the sink. On account of BLAST conspire the center thought is to change the transmission scope of an arrangement of some chose sensors around the base to befuddle the assailant. Through this procedure, we can make an arrangement of fake base stations which can't be recognized by a solid assailant. Simulation results demonstrate these two techniques, Simulation is carried out using simulator NS3.
Keywords: Wireless Sensor Networks (WSN), Base station Location Anonymity and Security Technique (BLAST), Forward Random Walk (FRW), Location Protection Routing(LPR), Two phantom nodes.
Cite Article: "Location Privacy Preservation of sink through multi-path selection in wsn", International Journal of Science & Engineering Development Research (, ISSN:2455-2631, Vol.3, Issue 5, page no.107 - 113, June-2018, Available :
Downloads: 000827
Publication Details: Published Paper ID: IJRTI1805021
Registration ID:180185
Published In: Volume 3 Issue 5, June-2018
DOI (Digital Object Identifier):
ISSN Number: 2456 - 3315
Share Article:

Click Here to Download This Article

Article Preview

Major Indexing from
Google Scholar ResearcherID Thomson Reuters Mendeley : reference manager : cornell university library Research Gate CiteSeerX DOAJ : Directory of Open Access Journals
DRJI Index Copernicus International Scribd DocStoc

ISSN Details

DOI (A digital object identifier)

Providing A digital object identifier by DOI
How to GET DOI and Hard Copy Related


Conference Proposal

Latest News / Updates

Open Access License Policy

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License

Creative Commons License This material is Open Knowledge This material is Open Data This material is Open Content

Important Details

Social Media

Untitled Document