Font Size: a A A

Wireless Sensor Network Location Privacy Routing

Posted on:2013-05-30Degree:MasterType:Thesis
Country:ChinaCandidate:W X ZhengFull Text:PDF
GTID:2248330374986560Subject:Software engineering
Abstract/Summary:PDF Full Text Request
As the endlessly mature of theory and technology for wireless sensor networks, itsapplications have were extended from military domain to many domains, such asenvironment monitoring, traffic management, health and medical community,manufacturing, anti-terrorist, anti-disaster and so on. It make people can collectnumerous full and accurate, reliable information at any time, any location andenvironment. Wireless sensor network is a large-scale distributed network and it isusually deployed no-man maintain, condition foul environment. Sensor nodes are pricecheap, limited extremely resources wireless communication facilities for sensor node isusually used only one time. Security about wireless sensor networks is a verychallenging at integrated effect of many factors, such as intricate secure environment,various secure requirement and limited resources. It is crucial issue whether wirelesssensor networks can applied that a relative secure working atmosphere is built forwireless sensor networks. As applications of wireless sensor networks deeply embeddaily life domains, importance about protecting data privacy increase day by day. Ifproper privacy protection were not provided, wireless sensor networks are not used todaily life domains.It is very important reality significance and science worth that solved techniqueissues of security and privacy for wireless sensor networks, supplied technique supportof security and privacy for wireless sensor networks used to daily life domains, andmore, promote this research area development.This paper makes search on technique issues of security and privacy for wirelesssensor networks. The main works, contributions and features are as follows.1. A wireless sensor network security structure based on the public key encryptionhas been built. It is an important challenge to find out suitable cryptography for wirelesssensor networks due to limitations of energy, computation capability and storageresources. Considering this sensor feature on limitations of resources, a securityarchitecture based-on public key cryptography is proposed. The security architecture isbased on identity based cryptosystem, but not requires key handshaking. The analysis shows that the security architecture ensures a good level of security and is very muchsuitable for the resources constrained trend of wireless sensor network.2. Put forward the moving base station location privacy scheme based on thegreedy random walk and two-way greedy t random walk for wireless sensor network.When wireless sensor networks are used to battlefield, the privacy about sink-locationsbecome a crux issue. If sink location will be exposed to adversary, the consequence isinconceivable. Random data collection scheme has a problem that message latenciesbecome larger higher for protecting mobile-sink-location privacy. GROW (GreedyRandom Walk) and BDGW (Bidirection Greedy Walk) are proposed to preservemobile-sink-location privacy. In GROW, data are forwarded and stored at pass nodes inthe network, the sink move in greedy random-walk to collect data from the local nodesoccasionally, which prevents the attackers from predicting their locations andmovements. Compared to random data collection scheme, GROW has smaller messagelatencies, while providing satisfactory mobile-sink-location privacy. In BDGW, data areforwarded by greedy walk and stored at pass nodes in the network, the sink move inbidirection greedy walk to collect data from the local nodes occasionally, whichprevents the attackers from predicting their locations and movements. Compared torandom data collection scheme, BDGW has smaller message latencies, while providingsatisfactory mobile-sink-location privacy.3. The application about wireless sensor network in coal mine monitoring systemis discussed.China is the most main one of coal country in the world,more coal mine,distributes widely. Coal is basic energy and important raw materials strategic positionin our country. Involve wide and more employment personnel increased the difficultyof coal mine safety management in our country. In order to reduce accident rate, exceptin system standard and system perfect big time up and down outside, through the wideapplication of information communication technology to improve safety production incoal mine security mechanism, is a healthy, sustainable development path. In theinformatization to promote industrialization of big situation, the informationtechnology are introduced into coal mine safety production is the inevitable choice.The establishment of the mine sensor networks systems can improve the mine earlywarning mechanism of safety production underground coal, with strong practical significance and the application market.Based on the analysis of the demand about the mine sensor networks systems, thesystem design principle and thought, mine wireless sensor network sets up the existingproblems, system design, a sensor node software and hardware design, polymerizationnode software and hardware design, management node design are discussed.
Keywords/Search Tags:wireless sensor networks, security and privacy, privacy routing, privacyscheme
PDF Full Text Request
Related items