Font Size: a A A

Research Of Node Privacy Protection In IoT Perception Layer

Posted on:2017-04-04Degree:MasterType:Thesis
Country:ChinaCandidate:G Y NiFull Text:PDF
GTID:2348330491962558Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
In recent years, with the development of the lot perception layer related technology, increasingly serious privacy issues has gradually become the bottleneck of restricting its deploy application problems. Due to the limited resource and low power consumption properties etc, the existing privacy protection mechanism can not effectively used, the design of privacy protection mechanism put forward the urgent needs and important challenges,lot perception layer of privacy protection is mainly divided into two aspects:location privacy protection and data privacy protection. Location privacy protection mainly aims at the location of perception layer nodes and other relevant information can’t obtain by the attacker, data privacy protection mainly aims at the perception layer node data information can not be broken by the attacker.Firstly, the thesis analyzes the basic idea and their advantages and disadvantages of the typical location privacy protection strategy. And as to the problems of large energy consumption, a source location privacy scheme based on adaptive clustering is proposed. The strategy builds more jump interference groups with the periphery of hot spots remaining energy, and through the false data injection, confuses the attacker’s behavior effectively, enhances the intensity of privacy protection on the premise of guarantees the network life effectively. Finally, the thesis proves the feasibility of this strategy through theoretical analysis and simulation,.Secondly, on the typical data privacy protection strategy existing the disadvantage of communication too much computational overhead and the lack of data integrity verification, the thesis puts forward the cluster-based data slicing and mixing privacy protection strategy, effectively prevents the external and internal attackers, and realizes the end-to-end encryption integrity verification through the homomorphic hash authentication code, finally the thesis proves the feasibility of this scheme from the simulation analysis.Finally, this thesis designes the WsnSIM platform, analyzes the frame structure and the design of corresponding evaluation module. Furthermore, it realizes the function of the MAC layer based on 802.15.4 nodes communication module. Finally it realizes the location privacy protection strategy in the platform to prove the feasibility of the strategy and availability of platform.
Keywords/Search Tags:Iot perception layer, Location privacy protection, Data privacy protection
PDF Full Text Request
Related items