Font Size: a A A

Research On Base Station Location Protection In Wireless Sensor Networks

Posted on:2013-05-10Degree:MasterType:Thesis
Country:ChinaCandidate:F L LiFull Text:PDF
GTID:2268330392467978Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Wireless sensor networks has a wide range of applications both in the fieldof civil and military, such as for monitoring enemy movements in battle fieldenvironment, integrated home systems or monitoring rare wild animals. A typicalwireless sensor network consists of a base station and a large number of ordinarysensor nodes. The news collected by the sensor networks will eventually be sendto the network manager through the base station. Further, the network managerrelease new monitoring task through the base station to the network mangerthrough the base station. Further, the network manager releases new monitoringtask through the base station. As the message reception center and control centerof the wireless sensor networks, the base station is a key node in the wirelesssensor networks. Once the base station attacker attacks the base station, the entiresensor networks will stop working, and even paralysis. Therefore, protectlocation of the base station is very important. The attacker can get the location ofthe base station through track the data package flow, then attack the base stationand led to the failure of the entire network.This paper carried out the research against global flow analysis attacker,putted forward base station protection strategy based on adjust packet send ratedynamically (SRA) according to the characteristics of the global flow attacker.SRA control all sensor nodes in wireless sensor network send packet in the samesend rate through the base station, and node packet send rate adjust dynamicallyaccording to the number of source in sensor network. Since all nodes have thesame packet sending rate, the attacker could not locate the position of the basestation through observe the imbalance of traffic between the nodes in the network.Therefore, packet sending rate of sensor node dynamically adjust according tothe number of source nodes of the network. Theoretical analysis and simulationresults show that SRA, relative to the cycle collection methods can against theglobal flow analysis attacker more effectively, in the case of lower energyconsumption and the security improved.On the basis of the SRA, this paper further puts forward base stationprotection strategy GCR based on the greedy route choice. SRA set the node packet send rate based on the number of source nodes in the network, thetheoretical analysis shows that set the node packer send rate based on the shareddegrees of the network bottleneck node, can guarantee zero packet loss, zeromessage transmission latency, and the share degrees of the bottleneck node in thenetwork is used to less than or equal to the number of the source node in thenetwork. In the case of zero packet loss, no additional message delay, GCR, has asmaller energy consumption and the same security compared with SRA. Theexperiments show that compared with SRA, GCR, can effectively protect thebase station location privacy and have lower communication overhead.
Keywords/Search Tags:Wireless Sensor Networks, Base station location privacy protection, Dynamically adjust the node packet sending rate, Greedy route choice
PDF Full Text Request
Related items