Font Size: a A A

Research On Key Technologies For Privacy Protection Of Source Nodes In Wireless Sensor Networks

Posted on:2022-09-18Degree:DoctorType:Dissertation
Country:ChinaCandidate:D ChenFull Text:PDF
GTID:1488306560493524Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Wireless sensor networks have the characteristics of automatic networking and unattended.It is often used in fields such as national defense and military,industrial production,and animal protection,such as real-time monitoring of important targets or events.As the source node location privacy problem has severely restricted the deployment and application of the network,the research on the source node location privacy protection has become one of the hot spots in the field of wireless sensors.The computing and storage resources of the network are limited,and it is difficult to use traditional security mechanisms.At the same time,the open deployment method also brings more challenges to privacy protection research.Based on the above-mentioned problems,this paper takes the three-dimensional wireless sensor network as the research object.First,it analyzes the various privacy threats faced by the network,and proposes a strong enemy attack model and a privacy protection model based on the reality.Key technologies such as secret sharing protection methods,source node area concealment protection methods,and fully connected geographic routing protection methods have been studied in depth.Finally,an overall protection scheme for the location privacy of source nodes in wireless sensor networks in a three-dimensional environment is given.The main research results of this dissertation include the following aspects:(1)A multi-level secret sharing protection method based on Lagrange interpolation is proposed.Due to the imperfect network security mechanism,the attacker can intercept the data and analyze and decipher to obtain the location information of the source node.In this dissertation,the secret sharing method is applied to privacy protection to improve the ability to resist attack and decipher.In order to meet the needs of different application scenarios,based on the Lagrange interpolation method,two secret sharing modes,single-message lightweight and multi-message verifiable,are designed.The single-message lightweight mode can only send one message at a time.In the multi-message verifiable mode,each message can be set with an independent threshold,which further improves the security protection capability and transmission efficiency.Analysis results show that this method has high safety and energy saving.(2)A concealment protection method for the source node region based on three-dimensional convex hull is proposed.The closer to the source node in the network,the stronger the data transmission signal.When an attacker finds a suspicious area,he utilizes a global attack mode to monitor all signals in the area.This research designs a three-dimensional convex hull algorithm with the source node as the core for this attack mode.By constructing irregular areas,the algorithm is based on the fact that each node in the area continuously sends real data packets and fake data packets according to the pre-designed direction and frequency interval,so as to realize the indistinguishable concealment effect of hotspot signals inside the area.This method is different from the existing methods for sending the original message in that it utilizes a shorter secret sharing sub-segment.Through design experiment analysis,simulation results show that this method is superior to existing methods in terms of safety and energy saving.(3)A protection method for fully connected geographic routing based on Delaunay triangulation is proposed.The positional relationship between the source node and the sink node determines that the data is always transmitted in one direction,which provides convenience for local attackers to determine the direction of the next hop attack.In this dissertation,the physical connection and the connection calculated based on Delaunay triangulation are merged to construct a fully connected geographic routing method suitable for data transmission in three-dimensional space,based on this method,a peripheral defense structure is built around the sink node,and nodes with a specific distance are selected as relay nodes.These nodes will receive messages from the surrounding defense structure.Forwarding to the sink node makes it difficult for an attacker to accurately determine the next hop direction of a local attack.The simulation experiment results show that this method has a greater improvement in the transmission success rate compared with the existing methods.
Keywords/Search Tags:Wireless Sensor Network, Source Node Location Privacy, Multi-level Secret Sharing, Anonymity Protection Area, Geographic Route Protection
PDF Full Text Request
Related items