Font Size: a A A

The Research On Key Technologies In Preserving Location Privacy Based On Context In Wireless Sensor Network

Posted on:2019-10-18Degree:DoctorType:Dissertation
Country:ChinaCandidate:Q ZhouFull Text:PDF
GTID:1368330590966573Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of sensor chip,wireless communication,embedded system,circuit of MEMS technology,the modern wireless sensor function has become more and more intelligent,and sensors are able to collect various kinds of data within the monitoring range of perception in real time.Owing to the low-cost character which makes the industry mass-produced and widely applied,it promotes the rapid development of wireless sensor network.Sensor networks play an important role in providing strategic and real-time service of data information,both commercially and militarily.Location privacy in wireless sensor networks has been an important research topic both in China and abroad.If critical location is captured by enemy,it may cause immeasurable loss or fatal blow.Therefore,the privacy preserving protection mechanisms of wireless sensor network is very important in the design,deployment and applications,and they are also facing with an unavoidable challenge.In this dissertation,we focused on the location privacy protection problems in wireless sensor networks as our research object,which is closely related to several key technical issues against the use of contextual information by attackers.Based on deep analysis of the requirements of location privacy protection in the network and threats of different attackers,we carry out a comprehensive study on the privacy protection mechanisms,including node anonymous,source location privacy preserving against a local attacker,Sink location privacy preserving against a local attacker,location privacy against a global attacker.According to attack models,we propose corresponding solutions,algorithms and network protocols.Thus,we have made some research achievements,and the main contributions are as follows:(1)So as to hinder an attacker inferring the location privacy of the key asset in the network by using the context correlation,a novel Maze Circle Approach(MCA)is proposed in this dissertation based on hash.Compared with existing techniques,MCA is a secure routing protocol which can achieve both node anonymity and contextual privacy by one mechanism.As well as showing sound security performance,the results of analysis and comparison prove that MCA has the advantages of low latency and low energy consumption.(2)To enhance the privacy and reduce delay of packets,firstly we utilize sensors' ability to perceive the mobile attacker nearby,and propose SPA(Silent-Pool Approach)as one of our strategies,which is able to hinder or reduce the packets hunted by the attacker.In addition,we propose a novel DPIOP(Dummy Packet Injection Out Pool)method to entice the adversary far away from the transmission path without changing the original routing path.Through simulation studies and experiments,we demonstrate the outstanding performance of SPA and DPIOP in privacypreservation.Compared with the existing methods,our approach can save energy and reduce delay.(3)Attackers are easy to trace data packets by eavesdropping the traffic and capture the Sink nodes.The existing methods usually increases energy consumption by using false packets,raises the delay by probability-based forwarding,and reduces the delivery rate of packets.In order to protect the Sink location privacy,a novel Zoning Patrol Approach(ZPA)is proposed based on Kautz graph.Compared with the existing technologies,ZPA can not only make the network have higher privacy performance,but also increase the robustness of the network.Finally,the theoretical analysis and simulation experiments show that ZPA can reduce the delay and save the energy consumption significantly.(4)To resist global traffic analysis,dummy message injection approaches have been widely applied.In previous studies,a method in which all nodes in a global scope send packets periodically gains perfect privacy but fails to provide energy-efficient and low-latency service.We propose two novel schemes,DLSA(Dark-Light Stripe Alternation)and CBA(Chess-Board Alternation).Compared with state-of-the-art techniques,our methods can not only maintain perfect privacy but also reduce the communication overhead and the end-to-end latency largely.
Keywords/Search Tags:Sensor networks, context information, privacy protection, local attackers, global attackers, traffic analysis
PDF Full Text Request
Related items