Font Size: a A A

Research On Key Technologies Of Source Node Location Privacy Protection In WSN

Posted on:2020-05-07Degree:MasterType:Thesis
Country:ChinaCandidate:J C ZhanFull Text:PDF
GTID:2428330572961581Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
Wireless sensor networks(WSNs)have the characteristics of low node cost,low energy consumption,strong networking capability,and simple deployment and maintenance.They are widely used in resource-constrained and inaccessible complex environments such as battlefield or wildlife protection area.In such monitoring applications,the objects of data collection need to be protected.If their location is known to the attacker,it will pose a serious security threat to the monitored target,which will lead to unpredictable consequences.Therefore,the source location privacy protection of wireless sensor network has important research significance.At present,the source node location privacy protection scheme against passive external attackers mainly determines the phantom node through a flexible routing protocol,and then transmits it to the Sink node through the greedy shortest path algorithm,so that the attacker can only trace back to the phantom node and cannot find the source node.However,such schemes still have the following shortcomings:(1)During the routing process,the data packet may generate a failure path through the visible area of the source node;(2)The position of the phantom node is concentrated near the real source node,and the privacy of the real source node cannot be well protected;(3)Although the existing scheme improves the privacy protection capability of the source node to a certain extent,the attacker can still capture the source node by hop-by-hop backtracking;(4)Most of the existing solutions mainly sacrifice other network performances(such as increased communication overhead and network stability)in exchange for certain security performance improvement,and the overall performance of the solution is not balanced.In view of the above problems,in this paper,the author studies the key technologies of WSN source node location privacy protection.The main works are as follows:(1)A source location privacy protection routing protocol for avoiding attackers in WSN is proposed.Assume that the node has the ability to detect the attacker.When the attacker is detected,the node broadcasts a warning message,so that other nodes on the primary path close to the source node change the transmission path of the data packet,thereby avoiding the attacker,so that the attacker cannot captures the source node which ensures the location privacy of the source node.The theoretical analysis and simulation comparison verify the effectiveness of the scheme.Compared with other schemes,the scheme guarantees high privacy and high security of the source node location with low communication overhead.(2)A new grid-based source location privacy protection scheme is proposed.The high-computing power and high-energy Sink nodes are used to determine the phantom node set,which avoids the communication overhead caused by the source node flooding to determine the phantom node in the traditional scheme.The location of the phantom nodes generated by the scheme can be distributed throughout the network,which has stronger randomness and diversity,and avoids the fact that the phantom node locations in the traditional scheme are concentrated near the real source nodes,and the real source node location privacy cannot be well protected.The scheme does not require the node to be equipped with a positioning module such as GPS,which reduces the node cost and reduces the communication overhead,so that the application scenario of the scheme is universal,and the source location privacy can be effectively and stably protected even under resource-limited conditions.In this paper,theoretical analysis and experimental simulation are carried out for the two schemes.The simulation results further verify the effectiveness of the proposed scheme.
Keywords/Search Tags:wireless sensor networks, source node location, privacy preservation, routing protocol, phantom node
PDF Full Text Request
Related items