Font Size: a A A

Research Of Location Privacy In Wireless Sensor Networks

Posted on:2014-02-27Degree:MasterType:Thesis
Country:ChinaCandidate:L KangFull Text:PDF
GTID:2248330395499146Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development and proliferation of wireless sensor networks, the increasing serious privacy concerns have gradually restricted the deployment and application of WSNs. Once the privacy of wireless sensor networks is exposed, it will do significant harm to the entire network, it may even bring down the entire network. Therefore, the privacy problem in WSNs must be solved.In this paper, we focus on the location privacy in wireless sensor networks, namely the preserving the location privacy of source node and sink node. Source node is responsible for collecting data, then, the data is transmitted to the sink node through multiple hops. During the process, a transmission path is formed. The attackers may trace back to the source node from the sink node. Meanwhile, the sink node is the gateway of the networks, all data will be transmitted to it, so the traffic will have a significant asymmetry. The traffic analysis attacker can locate the sink node from traffic asymmetry. To defense the traceback attacker and traffic analysis attacker, we propose a location privacy protection scheme based on multi-shortest path to protect the sink node, and a source node location privacy preserving scheme is also proposed, which is based on multi-rings. In the sink node location privacy protection scheme, the packets are transferred in accordance with the shortest paths from the source to sink. While each source has several shortest paths to choose when transmitting packets, the cross node will inject fake packets to lead the attackers away from the sink. And in the source location privacy preserving scheme, the path diversification scheme and fake packet scheme are proposed based on the multi-rings network model. The source selects three parameters randomly, two rings and an angle, on which the source transmit the packets to sink based. The scheme can make the traffic evenness well and confuse the attackers well.Privacy analysis shows that our schemes protect both the source and sink well, and the experimental results prove the correctness of the theoretical analysis. Safe time is proportional to the energy consumption in the theoretical analysis, while the experiment proves this point. In addition, the sink location privacy protection scheme protects the sink well with short data transmission delay and higher data transfer rate. And the source location privacy preserving scheme preserves the source well with uniform network traffic.
Keywords/Search Tags:Wireless Sensor Networks, Location Privacy, Source Node, Sink Node
PDF Full Text Request
Related items