Font Size: a A A

Research On Location Privacy Protection Technology In IoT Perception Layer

Posted on:2019-05-27Degree:MasterType:Thesis
Country:ChinaCandidate:Q Y WangFull Text:PDF
GTID:2348330569487690Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
As one of the country's five emerging strategic industries,the Internet of Things(IoT)is known as the technology that leads to the transformation of the information industry after computers and the Internet.As an important part of the IoT perception layer,the wireless sensor network,short asWSN,is the outermost layer in contact with the physical world.WSN is applied in defense military,environmental monitoring,traffic management,emergency rescue and many other fields.Nodes in WSN are often powered by batteries thus their energy is limited,and their volume is generally small thus the storage space and the computing capacity are also limited,in addition that the nodes are in an unattended environment,so it is difficult to perform security management.According to different monitoring objectives and costs,local attackers and global attackers can adopt various attack methods.Different attack modes require different location-privacy-protection strategies,which poses a great challenge to location-privacyprotection technology.According to the research and analysis of location-privacyprotection strategies based on trap-inducing ideas,conclusions can be made that the existing strategies have the following deficiencies.First,the phantom nodes with random routing strategies are not far from the source node and it's distribution is not diverse.It fails to effectively avoid the attacker's visible area and causes large network delay.Second,although the single-path routing strategy saves energy,but the attacker can easily find the data transmission path.Third,when using the fake data source and sink technology to confuse the attacker,injecting fake data will in turn cause excessive energy consumption.In response to the above deficiencies,this thesis makes the following works.First,under the classic Panda-Hunter model,BT-DiBAN strategy,based on distributed beamforming,is proposed for resisting local tracking-by-hops attackers.In this strategy,fake data injection and distributed beamforming are used to confuse attackers and keep attackers away from real data transmission path.At the same time,controlling the generation probability of fake branches and the lifecycle of fake packets,and deploying distributed beamforming technology based on cooperative communication can balance the relationship between network energy consumption and the strength of location-privacy-protection.Second,in the surveillance-type wireless sensor network,for powerful global attackers,a method for measuring the strength of location-privacy-protection is proposed,which uses anonymity for evaluation,and the strategy named FSDiBAN is proposed,against a global attacker that uses time-correlation analysis and traffic analysis.FSDiBAN strategy,takes advantage of the power gain from distributed beamforming technology,prevents the attackers from inferring the next hop of the node by reducing the transmit power,makes it impossible for an attacker to chain real paths through the time correlation of data packets and cannot infer the location of sink nodes based on the traffic analysis of each node on the path.When facing the more experienced attackers that can discern the distributed beamforming technology deployed in the network,fake sink is proposed to imitate the real sink's communication mode so that the attacker is confused and real sink's location privacy is protected.Last,using Matlab to simulate the proposed strategies,and it is proved that these strategies can be used to protect the nodes' location privacy in the resource-constrained Io T perception layer.
Keywords/Search Tags:Sensor Networks, Location Privacy, Fake Data Source, Fake Sink, Distributed Beamforming
PDF Full Text Request
Related items