Font Size: a A A

The Cloud Center Based Scheme With Redundancy Interference Routing Approach For Preseving Source Location Privacy In WSN

Posted on:2015-02-12Degree:MasterType:Thesis
Country:ChinaCandidate:Q LiFull Text:PDF
GTID:2298330431499342Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
Abstract:With the wide application of WSNs and the development and mature of its related technology, the increasingly serious privacy issues became an important factor which influences the deployment of wireless sensor networks. In real life, the pandas will get together due to the life habit, water, food and so on in a long time, so that the flow of the sensor node in the panda retention area, will be apparently higher than other places, and the attackers can track the pandas through hot attacks because the attackers could sense the place with high traffic. In addition, the attackers could also attack in the way of tracing hop by hop, space tracing to locate the source node. Some researchers proposed the cloud scheme to prevent the hot attacks that could efficiently defense the hot attacks, but on the other hand, it ignores that the attackers can still locate the source node through the attacking method of reverse tracing hop by hop.Aiming at this defect, this paper presents two improved measures: one is called improved cloud based scheme for preserving source location privacy (ICBS), that is to create a cloud with equal flow in each layer far from the sink, and the routing branches direction in the cloud is opposite with the cloud direction in the cloud scheme, so that it could efficiently defense the reserving tracing hop by hop utilizing the increasing interference branches in the cloud; the other is called redundancy interference routing approach for preserving source location privacy (RIRA), that is to increase interference ring and branched outside the cloud, to make the attackers hard to utilize the reverse tracing hop by hop to locate the source node.This two protocols’flow in each layer is equal, and the two protocols could ensure the efficiency of defacing hot attacks, meanwhile, increase the interference routings, which make the attackers astray to these interference and deviate the location of the source node. The simulation shows that, on the premise of guaranteeing network life, the protocols could greatly increase the safety of the network, and dramatically improve the source location privacy protection ability, compared with the existing source location privacy protection protocols.There are23figures,3tables,95expressions and57references in this paper.
Keywords/Search Tags:WSNs, Cloud, Redundancy interference routing, Optimal ne-twork lifetime, Source location privacy protection
PDF Full Text Request
Related items