Reference Hub8
Efficient Routing Protocol for Location Privacy Preserving in Internet of Things

Efficient Routing Protocol for Location Privacy Preserving in Internet of Things

Rajwinder Kaur, Karan Verma, Shelendra Kumar Jain, Nishtha Kesswani
Copyright: © 2019 |Volume: 13 |Issue: 1 |Pages: 16
ISSN: 1930-1650|EISSN: 1930-1669|EISBN13: 9781522564607|DOI: 10.4018/IJISP.2019010106
Cite Article Cite Article

MLA

Kaur, Rajwinder, et al. "Efficient Routing Protocol for Location Privacy Preserving in Internet of Things." IJISP vol.13, no.1 2019: pp.70-85. http://doi.org/10.4018/IJISP.2019010106

APA

Kaur, R., Verma, K., Jain, S. K., & Kesswani, N. (2019). Efficient Routing Protocol for Location Privacy Preserving in Internet of Things. International Journal of Information Security and Privacy (IJISP), 13(1), 70-85. http://doi.org/10.4018/IJISP.2019010106

Chicago

Kaur, Rajwinder, et al. "Efficient Routing Protocol for Location Privacy Preserving in Internet of Things," International Journal of Information Security and Privacy (IJISP) 13, no.1: 70-85. http://doi.org/10.4018/IJISP.2019010106

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Internet of Things is a norm which has expanded very swiftly with high magnitude of heterogeneity and functionalities. Security and privacy became the prime factors of Internet of Things due to unsecured character of wireless communication. Thus, because of unsecured network, it is easy for invaders to trace and find the position of nodes during communication and leak the information. Issues related to location information may include sharing of information, storage, sensing, and processing which can be used by external entities in different contexts, i.e. contexts can be: technical, legal, and social. These issues make privacy a major concern. Here, the research this article presents notions of existing privacy models and the amplified techniques using a random path. The article then describes possible solutions to preserve the location of nodes with less transmission time. Results of proposed scheme depict effectual behavior of the approach.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.