Font Size: a A A

Privacy Protection Of Data Collection Based On Delay Tolerate Sensor Network

Posted on:2017-04-16Degree:MasterType:Thesis
Country:ChinaCandidate:P F LiFull Text:PDF
GTID:2308330488497109Subject:Software engineering
Abstract/Summary:PDF Full Text Request
As the foundation of Internet of Things, wireless sensor networks(WSNs), contacts the objective world with the virtual information world closely. The main task of the wireless sensor network(WSN) is efficient and secure data collection, and the sensor node will perceive within the scope of sensing range, and use the appropriate transport protocols to transmit data to the aggregation node. In the process of this transportation, the protocols must ensure the data security and reliability, which is more important for the delay tolerant network. Due to the constrains of limited energy, small volume, and the instability of multiple hops transmission, the design of the data privacy protection algorithm will be seriously affected. It is very important that the design of effective data privacy protection algorithm to guarantee the data transmission security.The state of art of the wireless sensor network(WSN) and delay tolerate sensor network are comprehensively studied in this dissertation, the structure of delay tolerate network and the related characteristics of sensor networks are analyzed, and the design of effective privacy-preserving algorithm is highlighted, consequently the following research content are concerned:(1) The main security issues in the current intelligent medical system are analyzed, and in terms of the characteristics of the Internet of things and privacy protection, the lightweight privacy homomorphism algorithm and DES encryption algorithm are designed.(2) In order to protect the source geographical location information, this dissertation proposes a privacy protection scheme of source location in the delay tolerance mobile network. The sensing area is divided into many tiny sectors, and the real mobile location will be substituted for one tiny sector. At the same time, an IPV6 address is assigned for each mobile phone and used to substitute for the unique identifier of mobile phone, which indicates the true identity of mobilephone will be hidden, makes the data analysis and mining technology cannot obtain the useful private information, and achieves the effective data transmission.This dissertation carried out extensive experimentation using simulations and proved that the algorithm is correct. It also realized a medical health care system based on privacy protection.
Keywords/Search Tags:Delay tolerant network, wireless sensor network, privacy, privacy homomorphism, data collection
PDF Full Text Request
Related items