Font Size: a A A

Research On The Data Source Location Privacy Protection Stratevgy Based On WSN

Posted on:2015-09-17Degree:MasterType:Thesis
Country:ChinaCandidate:W C XiaoFull Text:PDF
GTID:2298330467963126Subject:Information security
Abstract/Summary:PDF Full Text Request
With the rapid development of network technology, the Internet has expanded from the virtual world to the physical world. As an important part to connect the physical world, wireless sensor networks have been used in many fields. The network is easy to be deployed, low-cost in every node, and can work in harsh environment where people may not be involved. But with the increase of the business applications, research on the security problems of the wireless sensor networks is becoming rich. In recent years, data source location privacy is valued by people. Because of the data source location information are often related to the asset of users, and the disclosure would lead to serious consequences, so quickly, this problem draw the researchers’ attentions.Facing the security issue of data source location privacy, the work mainly included:1. Research on present protection strategies and key technologies of the location privacy. Now most protection mechanisms focus on network layer and application layer, these technologies satisfy different kinds of security requirements, and defend against different attackers. For each protection mechanism, we study the idea of the protection, and analyze the deficiencies.2. Give the "Privacy" a common definition. The concept of privacy is too abstract and general. It is not conducive to the design work of the protection strategy. So we need to accurately determine what information belongs to privacy and needs to be protected in applications, avoid the deviation of protections due to different understanding of the concept of privacy.3. Propose a dynamic dichotomy routing protection strategy, based on network layer. The strategy uses "Dynamic" and "Dichotomy" two ideas to achieve the balance between the randomness and directionality in routing.4. Propose a scheme named General Fake Source (GFS) against a global adversary, which can also supports the passive RFID. Because of the passive tags, both of the nodes cost and volume both can be reduced. At the same time, they can also extend the life time of the nodes. At last, through the simulation experiment we can see, the GFS strategy can effectively create false data source, protect the data source location privacy, and less in energy consumed.
Keywords/Search Tags:Wireless Sensor Network, data source location privacy, route, passive RFID, fake source
PDF Full Text Request
Related items