Font Size: a A A

Research On Source Location Privacy Preservation Schemes In Wireless Sensor Networks

Posted on:2019-09-28Degree:MasterType:Thesis
Country:ChinaCandidate:X N CaoFull Text:PDF
GTID:2428330566976017Subject:Software engineering
Abstract/Summary:PDF Full Text Request
As an important perception carrier of the Internet of things,wireless sensor networks play an important role in target monitoring and information tracking.However,because the wireless sensor network realize the exchange of messages using the method of multiple hops between the nodes,so the attacker can easily capture the source node by hop-by-hop trackback to data packet,which lead to the target under threat,the information leaked.So it is of great importance to strengthen the source privacy security.To resist the local flow attacker's reverse tracking,some schemes let the source node randomly select or directionally migrate to a phantom node,and disguise as a source node.Then the phantom nodes by flooding or shortest path routing way forward the packet to the base station.As long as the phantom node is far away from the source node and geographically dispersed,the attacker cannot trace the location of the source node.However,the generated phantom nodes are not geographically dispersing,so the source node can easily captured by attackers.In addition,during the data transmission phase,the transmission path may be near the source node,and the attacker can trace the transmission path backward to observe the source node and capture it.On the other hand,in some higher requirements for data transmission delay of real-time target monitoring scenario,schemes need to protect the security of the source node location privacy,and reduce the packet transmission delay.Therefore,in view of the above problems,this paper makes an in-depth study of the source location privacy protection in the wireless sensor network,and the main work is as follows:1.Put forward a based on double phantom routing enhanced source location privacy protection scheme.Base station broadcasts and build up a hop table,then selects two nodes as candidate phantom nodes,source node randomly select one as really phantom node to transmit data,ensure the location distribution of phantom nodes is diversified.In the packet transmission phase,choose the node far away from the source node as the next hop,making it difficult for the attacker to capture the source node through the path of the backward tracing packet.The theoretical analysis and simulation results show that compared with the existing source location privacy protection scheme,this scheme can improve the security cycle of source node and has better security.2.Aiming at the wireless sensor network applies in delay sensitive environment.this paper proposes a low-delay wireless sensor network source location privacy protection scheme.Determine an area where the packet delay is relatively optimal and the source location privacy protection is relatively strong between the base station and the source node,and then choose enough phantom nodes in this area,then the source node choose one to transmit data,finally the one uses the shortest path routing strategy to forward the packet to the base station.It can reduce the hop count of data transmission in this way.Theoretical analysis and experimental proof the scheme can not only protect the safety of the source node,but also can effectively reduce the time delay of data packets.
Keywords/Search Tags:Wireless sensor network, Source location privacy, two phantom routing, low delay
PDF Full Text Request
Related items