Font Size: a A A

Research On Source-Location Privacy Protection In Wireless Sensor Networks

Posted on:2015-01-11Degree:MasterType:Thesis
Country:ChinaCandidate:Q Q LiuFull Text:PDF
GTID:2268330428481753Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Wireless sensor network (WSN) is a kind of emerging network technology which collecting information sensing, data processing and Internet communications together, due to its low cost, self-organization, distributed collaboration it is often used in information collection and transmission in large areas and severe environment. The application prospect of wireless sensor network is promising, including military, medical, environmental monitoring, and industrial automation, etc. In recent years, with gradually stepping into the field of smart home, WSN goes more widely deep into People’s Daily life. However, the security of wireless sensor network has brought great challenges to its development, the position privacy of the source nodes in the network leaking directly threats to the entire network normal operation and safety of monitored objects.Source node is the nearest node to the monitored object in the network. In the transmission process of collected data information to base station by jumping forward, it will inevitably produce communication path or some traffic. Attackers can jump through by reverse tracking or analyzing the traffic flow of the monitor network, position the location of the source node, and then attack the monitored objects. Therefore, the source-location privacy protection is a problem to be solved.First of all, this paper puts forward three source-location privacy protection strategies in view of the attacker by jump backward tracking, based on random strategy: non-repeating random routing strategy and random delay strategy and random relay strategy. Then, model for random routing strategy, introduce the basic concept of the three strategies, theoretically analysis the performance, and carry out simulation experiment of the three random routing strategies using the Omnet++network simulator. The experimental results on security time, message latency, energy consumption, node participation, and delivery ratio are analyzed.Secondly, this paper makes mixture of the three random strategy and put forward enhanced source-location privacy protection strategies. Then, carry on the detailed description on the basic idea and algorithm analysis. Through the comparison analysis of the simulation experiment in safety time, message latency, power consumption, etc.Finally, this paper puts forward the source simulation strategy based on the periodic collection strategy in the view of the global flow analysis attacker. Although the periodic collection strategies is able to provide the best network source-location privacy safety performance, but it will produce great communication overhead, thus, the source simulation strategy is proposed in this paper and the basic idea of the strategy is described in detail, through the simulation experiment we carry on the comparison and analysis for the security, the communication overhead, message latency of the strategy and so on.
Keywords/Search Tags:wireless sensor network, source-location privacy protection, hop-tohop-tracing, traffic flow analysis, security
PDF Full Text Request
Related items