Font Size: a A A

Source Location Privacy Preservation Protocol In Wireless Sensor Networks Based On Phantom Routing

Posted on:2011-09-26Degree:MasterType:Thesis
Country:ChinaCandidate:S SuFull Text:PDF
GTID:2178330338479930Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
As a new technology, wireless sensor networks are widely used in objective monitoring. A hunter is able to monitor the wireless channel, and position the source node of a data packet reversely. As usually closest to the monitoring target, once the data source node is exposed, the hunter would capture the monitoring target. Therefore, there is the need for the data source node location privacy protection. Currently, algorithms for source location privacy in wireless sensor networks are: phantom routing, loop traps and GROW algorithm. Phantom Routing algorithm is simple, small cost, while providing better protection of the data source node's location privacy. However, the phantom source generated by current Phantom Routing algorithm concentrate in certain area, there are still large room for improvement. For this, this paper presents a number of improvements on existing methods and strategies.This paper describes phantom routing in source node location privacy protection problem in details. On the base of study and analysis of the current phantom routing algorithms, this paper proposed innovative distance based random walk routing algorithms. To avoid the generating of wasting path, this paper proposed feedback algorithm and re-flooding algorithm. A substantial increase in the safety performance of the algorithm is ensured under the premise of normal communication overhead.Specifically, this major research content and innovation are as follows:Firstly, review the protection of the source routing algorithm and the advantages and disadvantages of various phantom routing.Secondly, proposed distance based to the random routing strategy, the method can generate phantom sources far from the data source node with geographical diversity.Next, to avoid the generating of wasting path, this paper proposed feedback strategy and re-flood strategy. Both are able to avoid the cost of wasting path path. Experiments show that the feedback strategy and re-flood strategies prolong the safety period of the hunter trace to the data source node without increasing the communication overhead.Finally, according to the need of simulation on the wireless sensor network environment in this paper, we design and implement an event-level simulator. The simulator is the same in different applications, and has good scalability in wireless network simulation.
Keywords/Search Tags:Wireless Sensor Networks, location privacy, routing algorithm, limitary flooding, phantom routing
PDF Full Text Request
Related items