J.Anbu selva, P.Bharat, S.Mathiyalagan J.Anand
Abrupt due to the open nature of the sensor network, the adversary can eavesdrop and track the information. In this paper, an algorithm called computer based image recognition is introduced to overcome such problem. Here the traffic is analysed using this method. In proposed scheme, the adversary model is considered where it is assumed that the adversary can monitor the small area or the entire network. Then introducing the hotspot-Locating attack, considering that through the network traffic the adversaries identify the object’s location. Finally for the effective source location privacy, the irregular shapes of fake packets are sent in the form of clouds. Insertion of cloud provides more privacy and it is made active only at the need of transmission