International Journal of Computer Science and Mobile Computing (IJCSMC)
In some critical applications, the locations of events reported by a sensor network need to remain anonymous. Means that, when unauthorized observer monitor or analyze the network traffic, observer must be unable to seem the origin of such events which will be transmitted. And this is said to the source anonymity problem; this problem has emerged as an important topic in the security of wireless sensor networks, with variety of techniques based on different adversarial assumptions being proposed. In this, present a new structure for modeling means that to model for the network, analyzing means to analyze the network and evaluating anonymity in sensor networks.