Font Size: a A A

Research On Source Location Privacy Protection Resistant To Local Traffic Attack In Wireless Sensor Network

Posted on:2017-11-09Degree:MasterType:Thesis
Country:ChinaCandidate:Y ChenFull Text:PDF
GTID:2348330503971202Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the fast development of emerging technologies, the Internet of things will be the next important productive force to promote the rapid development of the world. Under the China's 13 th Five-Year Plan, it has made it clear that the government should facilitate the wide application of the Internet of things. Wireless sensor network, as an important part of the Internet of things, has become a research hotspot of many scholars and engineering applications. But wireless sensor network is vulnerable to various attacks in the applications, because of the limitations of sensor nodes in computing, storage, energy and bandwidth, and so on. The precious studies results show that when the attacker listens to the network traffic, he can find the location of the source sensor node by the way of tracing the data packets hop-by-hop, and then the attacker can damage or destroy the target. To ensure the tracking objects' safety, this paper has done the research on the security of the source node location privacy protection in wireless sensor network.Firstly, the paper introduces the background and significance of the research on the source location privacy protection in wireless sensor network, reviews its structure, features, applications, security problems and the typical source location privacy protection protocols for wireless sensor network, and analyzes some issues of phantom routing protocols. Secondly, an improved routing algorithm for wireless sensor network source node location privacy protection based on the minimum path routing is proposed on the problems of high energy consumption and low security time of source node in PUSBRF, PSRMPN and LPBMR. And then, the initialization process, source node phantom routing strategy and the minimum path routing strategy to avoid the visual area of the source node of the new routing algorithm are detailedly explained in this article. Theoretical analysis and experimental results show that the new routing algorithm has higher security time of source node in the case of slight change of energy consumption and does better in protecting source location privacy for wireless sensor network. Finally, on the basis of summing up the work in this thesis, the deficiency of the new routing algorithm is given and some comments are presented on the further research directions.
Keywords/Search Tags:Wireless Sensor Network, Source Node, Location Privacy Protection, Local Traffic Attack, the Minimum Path Routing
PDF Full Text Request
Related items