Font Size: a A A

Strategy Research Of Source-Location Privacy Preservation In Internet Of Things

Posted on:2017-12-23Degree:MasterType:Thesis
Country:ChinaCandidate:L Y ZhouFull Text:PDF
GTID:2348330533450280Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
Internet of Things(IoT) is considered to be another information's revolution after computer and internet. Wireless sensor network is deemed as an important part of interaction between IoT's perception layer and the outside world, and plays an important role in all fields. As a result of wireless sensor network's trackable features, only relying on the traditional data encryption technology can not guarantee the safety of network any more. The attacker can attack the source node through context privacy's analysis. Compared with the traditional networks, most of sensor nodes in the wireless sensor network is deployed in no-regulation, complicated environment,in the large-scale deployment, the source location privacy preservation's issue has been attracted much more attention. According to the different importance and unequal cost, the attacker is divided into local and global attacker.According to the research and analysis of existed source location privacy preservation strategy for the two classes of attackers above, there are some drawbacks as follows: The one, in the face of the local attacker which can decrypt the data packets, directional random routing can lead to direction information's disclosure; Adjacent sequence's phantom node can not keep in a safe distance; The distance between phantom node and source node is not far enough and distributed widely diverse. The other one, in the face of global attacker, existed strategies does not consider trackable possibility of hop by hop,in the same time of the global flow interception; Unbalanced traffic near to all packet sources can lead to source location's disclosure as quickly as possibile; The possibility of “energy hole” phenomenon of the area near to sink node is higher. Aiming at the drawbacks above, this thesis makes the following works:1. Aiming at local attacker which can decrypt the data packets, this thesis proposes a phantom routing strategy through sectorial domain model. Using different storage location of angle values' information and coordinate system information can solve the direction information's disclosure effectively; The routing of every other sectorial domain guarantees the safe distance between the adjacent sequence's phantom nodes effectively; The routing whose hop value is dynamic and selected randomly from pseudo phantom node increased distance between phantom node and source node and the diversity of routing path, at the same time, avoiding the visible area's shortest routing can improve the source location privacy preservation further.2. Aiming at global attacker which can trace hop by hop, this thesis puts forward an improved location privacy preservation strategy through pseudo source node domain. Using equal hop routing for generating center nodes can hide the source location for unbalanced traffic in the neighborhood and prevent the attackers from positioning and tracing hop by hop quickly; The routing of loop model with filter nodes can reduce the possibility of “energy hole” phenomenon around sink node.3. In OMNeT++ simulation platform, this thesis does some experiment's verification and analysis according to proposed two strategies.
Keywords/Search Tags:Wireless sensor network, Source-location privacy preservation, Sectorial domain, Phantom routing, Pseudo source node domain
PDF Full Text Request
Related items