Font Size: a A A

Research On Phantom Routing Based Source Location Privacy Preservation Protocols In Wireless Sensor Networks

Posted on:2015-12-21Degree:MasterType:Thesis
Country:ChinaCandidate:M L ZengFull Text:PDF
GTID:2298330434453440Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
The source location privacy protection is of vital importance for the reliability of WSNs that deployed in sensitive scenarios. For the purpose of keeping source location private while maintaining high energy efficiency, AZR protocol and DTRC protocol are proposed in this work.Layer-based AZR protocol, aimed at protecting the privacy of source location, is a phantom routing based protocol. It divides the whole network into a far-level part in which source nodes select node from current level as phantom source node randomly, and a near-level part whose phantom source nodes are selected from far-level. This strategy contributes to produce more phantom source nodes. And the adoption of annular zone routing and radial routing could extend the routing path from source node to the base station effectively and avoid the risk area, which enhances the privacy preservation of source node.Another source location privacy preservation protocol with dynamical control of transmission radius, i.e., DTRC is proposed in this paper. In the package routing process between the phantom source node and the base station, nodes in non-hotspot zone could adjust the transmission distance adaptively according to the remaining energy and the distance to the base station. Therefore, DTRC could keep well trade-off between the network lifetime and energy consumption, and it would be hard for the attackers to detect information beyond one hop.Extensive simulation results demonstrate that the proposed schemes could improve the energy efficiency significantly while ensure the location privacy of source node, from which the deployment and optimization for WSNs would incredibly benefit.
Keywords/Search Tags:wireless sensor, source location, privacy preservation, phantom source node, safety period, energy consumption ratio
PDF Full Text Request
Related items