A Novel Privacy Preservation Schemes in Wireless Network

Mayur R. Tawalare, Sonali Nimbhorkar
2017 International Journal of Advanced Research in Computer Science and Software Engineering  
Wireless sensor network is used widely and it is a key technique in the application of military which are used in daily life. There is an some fundamental architectures that one from compromising a sensor and server and another is to compromising a sensor, server and a storage capacity nodes between the two tier architecture we have to evaluated the second type that have number of advantages in various terms that is energy usage, data transmission and the last one is data computation. As the
more » ... e two tier wireless sensor network have some advantages related to the security that is the major concern in the two tier architecture. The three main problems is the first, sensor that can located in unfavorable areas can be unauthorized will be replaced the third party that can send the fake data. Secondly, the malicious attacker could be installing new sensor node with a valid secret keys that send a fake data to the receiver node and distract the server. Third is to the receiver node that could be negotiating and expose data received from the sensor. So that's why the server must validate the sensors before acquire the data from them, recognize whether a key was deflect and determine the key which one and to handle the nearly all general queries while to preserve the data privacy received from the data storage node. We have to construct a novel solution that would be using a Non-Adaptive Group Testing that allow a sensor to execute that different task successfully and professionally. The overall conclusion is to protect with a very high probability in contrast to attack that get guess sensor data and to secure the data privacy.
doi:10.23956/ijarcsse/v7i4/0112 fatcat:guz45kwrhnf57lxelo7woce2gi