Font Size: a A A

The Research On Source-Location Privacy Protection Algorithm Based On Phantom Source And Fake Source In WSN

Posted on:2018-11-19Degree:MasterType:Thesis
Country:ChinaCandidate:L LiFull Text:PDF
GTID:2428330545498576Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
Wireless sensor network is widely used in many fields,such as environment monitor,smart home,national defense and military,intelligent medical system and so on.The transmission of packets relies on wireless communication technology in the network.Wireless communication is vulnerable to unauthorized interception and detection due to the lack of protection of physical boundary.The leakage of sensitive information in the network threats the network security.Therefore it is an important issue to protect the privacy of sensitive nodes in wireless sensor network.The existing wireless sensor network privacy protection algorithms are divided into two categories,namely,the protection of data content privacy and protection of data context privacy.The data context privacy is divided into location privacy and time privacy.The algorithms of protecting location privacy are divided into two categories,namely,protection of data source node location privacy and protection of sink node location privacy.Based on the existing privacy protection algorithms of wireless sensor network,this thesis proposes source-location privacy protection algorithm based on phantom source and fake source and source-location privacy protection algorithm based on ellipse model.For the problem that the phantom source nodes cannot protect source node effectively,source-location privacy protection algorithm based on phantom source and fake source is put forward.With neighbor information and random walk,source node selects phantom source nodes randomly.In order to make paths more random,the intermediate nodes were selected in the shortest phantom source-sink paths making use of hops information.Through random walk,fake nodes were selected by intermediate nodes.Fake source nodes send fake packets to sink node,to mislead adversary be away from true path.Theoretical analysis shows that the algorithm can select intermediate node for each data packet.The experimental results show that the algorithm can mislead adversary be away from true path and improve safety period with the increase of hops from source node to sink node.For the problem that the existing source-location privacy protection algorithms have low safety periods,source-location privacy protection algorithm based on ellipse model is put forward.With coordinates of source node and sink node,the algorithm establishes an ellipse.Safety areas were established around source node and sink node.The interval of expected phantom source node is determined by safety areas.The interval is divided into multiple sub-intervals.One of the sub-intervals is selected during the process of transmitting a packet.In the sub-interval,expected phantom source node was selected randomly on the ellipse,providing direction for selecting phantom source node.With the coordinate of expected phantom source node,phantom source node was selected.Transmission paths of adjacent packets are more dispersive.Theoretical analysis shows that the algorithm can increase the probability of packet away from source node and sink node during transmission process.The experimental results show that the algorithm can enhance the safety period and protect source-location privacy effectively compared with the existing source-location privacy protection algorithms.
Keywords/Search Tags:Wireless sensor network, Source-location, Random walk, Phantom source node, Fake source node, Expected phantom source node
PDF Full Text Request
Related items