Font Size: a A A

Location Privacy Protection In Wireless Sensor Networks

Posted on:2013-10-07Degree:MasterType:Thesis
Country:ChinaCandidate:Y LuFull Text:PDF
GTID:2268330425483714Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the rapid development of the chip system, wireless communication, lowpower embedded technology; it gives birth to the wireless sensor network technology.Wireless sensor network can be applied to military, aviation, explosion-proof, relief,environment, medical and health care, household, industrial, commercial and otherfields. As a result, wireless sensor network is believed to be the second largest afterthe Internet network in the world. Due to the wide application of wireless sensornetwork, it makes the information security of wireless sensor network particularlyimportant. In this paper we launch a series of research on the position privacyinformation of the wireless sensor network.This paper first studies the problem of wireless communication media locationprivacy protection in wireless sensor networks, and then summarizes some challengesthat the protection technology of wireless communication media location privacy isfacing with, studies the attacker model of source node protection and gathering nodeof the protection.Secondly, due to the lacking of the theory research on the relationship betweenthe attacking time and the length of forwarding path, this paper analyzes the theoreticmodel of packet tracing under the random forwarding strategies. By modeling therandom forwarding strategy, this paper analyses the relationship between the length offorward path and the forwarding probability, as well as the relationship betweensecurity time and forwarding probability. The theory model points out that it canimprove the safety time by reducing the maximum forward packets when packetarrival rate can be guaranteed. Subsequently, this paper verifies our method by usingthe Omnet++network simulation tools. The simulation results show that our methodis very near to the actual situation. The experimental results also show that theproposed algorithm can effectively estimate the relation between the attacker track oftime, forwarding paths and the resending probability in the random forward strategy.Thirdly, in distributed wireless sensor network, the ID of different nodes cannotbe updated at the same time, which brings hidden trouble to privacy and security ofthe position of the nodes. Using the idea of regional update, this paper designs a newrouting protocol to achieve more good location privacy effect and puts forward a newID exchange mechanism; the mechanism cannot be tracked by the attack method ofattack. The experimental results show that the new tracking method not only can effectively track node information, and can reach the best node location privacyprotection effect.
Keywords/Search Tags:wireless local area network, location privacy, Safety time
PDF Full Text Request
Related items