The International Journal of Innovative Research in Computer and Communication Engineering
In network traffic pattern due to a large volume of packets originating from a small area. Develop a realistic adversary model, assuming that the adversary can monitor the network traffic in multiple area. Introducing a novel attack called hotspot-locating where the adversary uses traffic analysis techniques to locate hotspots. The mobile nodes which change their location to better characterize the sensing area, or to forward data from the source nodes to the sink. Using low-cost disposable mobile relays to reduce the total energy consumption of data intensive WSNs.