Font Size: a A A

Research On Privacy Protection Algorithms In Wireless Networks

Posted on:2018-01-11Degree:MasterType:Thesis
Country:ChinaCandidate:J L WanFull Text:PDF
GTID:2348330536481907Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the development of hardware manufacturing and wireless network technology,wireless communication has been applied in many fields,such as wireless sensor networks and RFID.Although these technologies have brought great convenience to our life,there is a critical problem in wireless communication---privacy protection.People do not want their privacy information to be eavesdropped when transferring highly sensitive information by wireless communication.Since the wireless medium has a sharing nature,adversaries have a chance to eavesdrop confidential information from the communication systems.To deal with the challenge,based on the conventional encryption methods,researchers proposed a new privacy protection strategy.They utilize artificial noises caused by friendly jammers as a feasible defensive technique against adversaries.This paper studies the schedule strategies of friendly jammers,which are randomly and redundantly deployed in a circumscribed geographical area and can be unrechargeable or rechargeable,to maximize the lifetime of the jammer networks and prevent the cracking of jamming effect made by the eavesdroppers,under the constraints of geographical area,energy consumption,transmission power,and threshold level.An approximation algorithm as baseline is first proposed using the integer linear programming model.Then a heuristic algorithm based on the greedy strategy that less consumption leads to longer lifetime is also proposed.We give detailed analysis to the complexity of both problem and algorithms,and also propose a pruning strategy to improve our algorithms.Finally,extensive simulation results show that the proposed algorithms are effective and efficient.
Keywords/Search Tags:wireless network, privacy, friendly jammer, integer linear programming, greedy algorithm, NP-hard
PDF Full Text Request
Related items