Font Size: a A A

Research And Implementation Of Location Privacy Protection Solution In Wireless Sensor Network

Posted on:2015-04-09Degree:MasterType:Thesis
Country:ChinaCandidate:Z F XuFull Text:PDF
GTID:2308330473954878Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Intelligent sensor nodes are widely used in personal cell phone, private cars, home security monitoring and other fields, It gave rise to the position of convenience meanwhile brings the issue of privacy. Research for location privacy protection has become increasingly active. In this paper, the wireless sensor network event monitoring as the research background to source node location privacy protection as research topic, presented a node location privacy protection security solutions. Focus on the phase of message oriented sent,physical modeling problem with path of source node sends a message, Collection program issues of intermediate node and facility location problem of intermediate node at the stage of intermediate node forwards random.The main contents are as follows:(1) On the basis of researching current location privacy protection method and studying relevant theoretical knowledge involved in location privacy protection, proposed messaging mechanism of class Brownian motion model. Analyzes the feasibility and prove the security of the proposed method.(2) For the problem of an attacker to retrospective source node based on communication link,presents a program of regular collection.And demonstrated the delayed of the message based on the queuing theory.(3) Avoid the message random forwarding in the network for a long time,the pivot node employs the mechanism of interception. But how to deploy intermediate node location is a NP-hard problem. In this paper, the problem is transformed into a local siting problem, and raise a new optimization algorithm.(4) According the location coordinates of the node,combine with the LSH division method of the Voronoi diagram,the network has been divided. To complete the configuration of the node and to verify the feasibility of the program.In summary, this paper proposed two methods.the one is directed path based on the Brownian motion.and the other is message forwards baesd on the node configurationof the pivot node. And finally simulate the proposed method and analysis of experimental results.
Keywords/Search Tags:Location privacy, Brownian motion, Messages regular collection, Voronoi diagram
PDF Full Text Request
Related items