Font Size: a A A

Research On Source Node Location Privacy Protection In Wireless Sensor Networks

Posted on:2015-03-16Degree:MasterType:Thesis
Country:ChinaCandidate:G B TanFull Text:PDF
GTID:2268330428965395Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the development of science and technology, ICT(Information and commu-nication technology) has gradually penetrated in all aspects of production and life. A new type of wireless networks, which integrates with wireless communication tech-nology, sensor technology, embedded computer technology, and distributed infor-mation processing technology, emerged in the situation that acquiring, transmitting, processing and using information from the physical world have becomed the im-portant goal of ICT serving humanity. WSNs(Wireless Sensor Networks) have exten-sive application fields, such as military, industrial, agricultural, smart grid, medical and other related fields. However, while relevant technologies of WSNs have been fully developed, the problems of network privacy are difficult to solve for their speci-ficity. The problems of network privacy are gradually becoming the major bottleneck for development of WSNs, which restricts the large-scale development and applica-tion of WSNs. For the specificities of WSNs, such as resource-constrained, hash de-velopment environment, application relativity and so on, which make the network privacy problems of WSNs very different from that of traditional network. The pro-tection mechanisms for traditional network are not suitable for WSNs, and then De-signing protection schemes for WSNs is becoming compelling and challenging.In subject tracking and monitoring applications, the locations of monitored sub-jects are sensitive and need to be protected. If the locations exposed to adversaries, the security of monitored subjects will be threatened. For instance, a WSN can be de-ployed to monitor the habit and behavior of pandas in a wildlife habitat. The adver-sary may trace the packets in the WSN to seek out the source node which sensed the panda, and then catch the panda. Hence the question now is:how can we hide the lo-cation of the source node from the adversary? Likewise, there are several scenarios such as battlefield surveillance, patient monitoring and so on,are faced with this question. In other words, the problem is providing location privacy for the source node:source node location privacy which is the main issue of this treatise to be stud-ied.Source node location privacy in WSNs is the main research object of this treatise, the treatise will be concentrated on the key technologies of network privacy problem of WSNs.Firstly, the treatise introduces information of WSNs,such as concept, architec-ture, features, application fields and so on.Secondly, the treatise focuses on the network privacy problems of WSNs. The privacy problems in WSNs are analyzed and summarized in category. The models of adversaries in WSNs are analyzed,and then categorized which based on attacking technology and monitoring range. Solutions of source location privacy are introduced and classified. A key management protocol and anonymity communication scheme are introduced.Lastly, two effective solutions of source node location privacy are presented.The first solution is called EDROW(Enhanced direct random walk scheme). For the situation in DROW that some sensor nodes in the particular regions have no enough paths to sink, this solution introduces a ring which will create enough paths for the vulnerable sensor nodes. Every data packet in this solution will experience three phases:a directed random walk, and a subsequent ring route, lastly,the directed random walk. From the results of the simulation evaluation, this solution can provide sufficient source location privacy protection effectively.The second solution is called MRPFS(Multiple rings proxy filtering scheme).MRPFS can hide the real source node effectively by introducing fake data streams and filtering data streams. Ring proxies are deployed in network to filter fake data in MRPFS, it performances better than BASELINE in delay and cost.
Keywords/Search Tags:Wireless sensor networks, source node location privacy protection, identity privacy, anonymity, directed random walk, multiple filtering
PDF Full Text Request
Related items