International Journal for Development of Computer Science & Technology (IJDCST)
Providing the confidentiality for the content of messages is the big concern. Hence, many of the protocols providing the confidentiality for the information in the sensor network, which refers as sensor, network security. Such information can be critical to the mission of the sensor network. Such as the location of a target object in a monitoring application and it is often important to protect this information as well as message content. There are several recent studies on providing the local privacy. There are existing approaches which assume a weak adversary model then the adversary sees only local network traffic.