Font Size: a A A

Research Of Location Privacy In Wireless Sensor Network

Posted on:2016-12-04Degree:MasterType:Thesis
Country:ChinaCandidate:L ZhouFull Text:PDF
GTID:2308330503477508Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
As the application of wireless sensor networks (WSNs) has been used more and more quickly into our life, the study of WSNs is becoming increasingly necessary. The most significant problem that threats the successful deployment of sensor system is the privacy security, and privacy issues are divided into two categories: content-privacy and contextual-privacy. Currently, many protocols provide security protection for the content of messages in WSNs, but the protection of contextual-privacy is still in the exploratory stage. The so-called contextual-news is concerned with the "context" associated with the measurement and transmission of sensed data, which is closely related to the location information of source and sink nodes in sensor applications. But due to the openness of WSNs, context information is still exposed, which makes enemies easily obtain the location information of the source and sink nodes through analyzing traffic and tracing back the packet hop by hop. So the research on the protection of location privacy in WSNs is of great theoretical value and practical significance. Thus some location privacy protection schemes are proposed.In this paper, after the in-depth study of the existing location privacy protection protocols, an enhancing source location privacy protection scheme based on phantom single-path routing put forward, the performance of this scheme is theoretically compared with existing programs, and the experiments on the software platform OMNet++ are conducted. Eventually, the results show that, in this scheme, due to a wider geographic distribution of phantom nodes and the prevention of failure paths, it’s more difficult for enemies to track. Therefore, the communication overhead and transmission delay are increased while the security strength is enhanced greatly. The main work includes following aspects:(1) Analyze present major threats of WSNs, and introduce major research aspects of security protection in WSNs against two kinds of privacy issues:encryption and authentication mechanisms and location privacy protection protocols, especially the latter.(2) Conduct a comprehensive analysis and comparison of the current common types of privacy protection protocols systematically, and describe their theoretical models, program principles, the problems solved by programs and the implementation processes of programs in detail.(3) There are five steps to solve the problem that routing path is relatively narrow which is common among existing schemes:initialization of network security, limited flooding of source node and marking the visible range, random hI hops in direct route, avoiding the base station radio of visible range, shortest path routing. These steps design an enhancing source location privacy protection scheme based on phantom single-path routing and contribute to the more phantom nodes and larger range of phantom nodes in order to enhance the strength of the target node’s location privacy protection.(4) On the basis of the classify-system comparison of the performance (include communication overhead, transmission delay and security)of existing schemes, combine theoretical calculations of performance parameters in the new program, the performance of the new scheme and existing schemes is compared and analyzed through experiments. The results show that the overall performance of new program is better than existing schemes.
Keywords/Search Tags:WSNs, location privacy protection protocols, attack model, performance, security
PDF Full Text Request
Related items