Font Size: a A A

Research On Privacy Protection Of Nodes’ Location And Data In Wireless Sensor Networks

Posted on:2016-01-09Degree:DoctorType:Dissertation
Country:ChinaCandidate:L M ZhouFull Text:PDF
GTID:1108330482957836Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the wide application of wireless sensor networks (WSN), a lot of sensed information is transmitted in the network, which users can easily gain. In WSN, various sensors monitor and collect a lot of information. And sensors achieve the intelligent analysis and management of information. However, WSN will face some new security challenges with the characteristic of openness and inclusiveness. The disclosure of user privacy information brings an enormous security challenge for the development of WSN. Privacy protection has become a very active research hot topic in the field of WSN and information security. Therefore, in this paper, we mainly focus on privacy protection of nodes’ location and data in WSN and research on the privacy protection of nodes’location, data query and data aggregation. And we aim to further establish and improve a safer, more efficient privacy protection scheme. The major contributions of the dissertation are as follows:1. We propose a source location privacy protection scheme in wireless sensor networks using ant colony optimization. Ant colony optimization provides a natural and intrinsic way of exploration of search space for preserving sensor’s location privacy. The packets are transmitted to next hop by adjusting the pheromones, which can efficiently prevent adversaries from tracing the packets in local area. The adversary cannot also infer the direction to the source node by following the movement of the packets because the packets are sent after random delay. Experiment results and performance analysis show that our scheme can efficiently preserve source location privacy and save energy of each node to prolong the network lifetime.2. We propose a multi-source and multi-path source location privacy protection scheme. We initial several source nodes which include fake source nodes and real source nodes. The fake source nodes send packets to the base station in the same way as the real source nodes. When an adversary analyzes traffic, he will find it difficult to distinguish the real source nodes from the fake source nodes and make a wrong decision. And the multi-paths consist of several nodes, which can decrease the transmission time. Then the packets can be quickly sent to the base station.3. We propose a proxy and interference area sink location privacy protection scheme. The interference area is a special area which includes several marked nodes around the base station. When a node in the interference area receives a packet, it will broadcast the packet to its neighbors which include the base station. If an adversary monitors the packet around the base station, he cannot find the accurate location of base station. Our scheme can efficiently protect the location privacy of receiver.4. We propose a multi-sink with interference area sink location privacy protection scheme. In our scheme, multi-sinks include real sinks and fake sinks. Each sink has an interference area. And the fake packets are transmitted regularly. The interference areas around real sinks filter fake packets and broadcast real packets. The interference areas around fake sinks broadcast fake packets and send real packets. Security analysis and experiment results show that our scheme can efficiently prevent adversaries from analyzing traffic and protect location privacy of sink.5. We propose a cluster-based privacy preservation query processing scheme in wireless sensor networks. When users query information, it will prevent from disclosing the sensitive data and privacy information. We use the anonymity method to prevent adversaries from obtaining query frequency of users and location information of sensors. Before transmitting the query results, we use prefix membership verification method to protect sensitive data. The sink can correctly process data queries over encoded data without knowing their real values, which can prevent adversaries from obtaining query results. Security analysis shows that our method can efficiently protect privacy of users and data.6. We propose an improved privacy protection data aggregation scheme. Liu et al. propose a probability slicing data aggregation method to reduce the communication overhead. We improve their method to increase the probability of small slice, which can further reduce the communication overhead and the probability of obtaining slice data by adversaries and improve the security of data aggregation and protect sensitive data. Security analysis and experiment results show that our method can efficiently reduce the communication and increase the security of data.
Keywords/Search Tags:wireless sensor networks, privacy protection, nodes’ location, data query, data aggregation
PDF Full Text Request
Related items