Font Size: a A A

Research Of Location Privacy Protection In IoT Perception Layer

Posted on:2016-01-13Degree:MasterType:Thesis
Country:ChinaCandidate:L ZhangFull Text:PDF
GTID:2308330503977505Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
The Internet of things technology is leading the wave of information industry revolution and would be widely used in smart home, military and commerce. As an important part of IoT perception layer, wireless sensor networks(WSN) have been used in various fields such as military applications and study of endangered species, owing to the low price and easy deployment. But every sensor node has usually limited power and small storage space, and they generate event-reporting packets and send them to base stations through multihop wireless transmission. The unreliability of wireless links causes a lot of potential risk for the network security, the attacker can move to sender hop-by-hop. So it’s important to protect source-location privacy for the development of the IoT.In this thesis, we first analyzed several typical source location privacy protection strategies and pointed out their disadvantages. Then we proposed new method-ISPN scheme for local attackers. Based on the phantom routing scheme, ISPN scheme makes phantom nodes distribute in irregular area and make them far away the true source through twice directed walk, so it can prolong the source safetime.Secondly, to solve the excessive energy consumption in PC strategy, we proposed CFSS strategy based clustering network. CFSS method uses cluster to choice fake sources accoding certain rules. Fake sources simulate the behavior of the true source node. Through the simulation experiment of its communication overhead, CFSS method can achieve balance between security and energy.At last, we introduce requirements and function in the simulation platform of the IoT perception layer, mainly introduce the realization of the simulation kernel, performance evaluation module, and we realize the CFSS method on the platform to prove its feasibility.
Keywords/Search Tags:Internet of Things, Wireless sensor network, Soure location privacy, Fake Source, Phantom nodes
PDF Full Text Request
Related items