Font Size: a A A

Research On Location Privacy Protection Technologies In IoT Perception Layer

Posted on:2021-05-31Degree:MasterType:Thesis
Country:ChinaCandidate:T ZhouFull Text:PDF
GTID:2428330605461057Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
The Internet of things(Io T)is considered one of the “important productive forces”,which promotes the rapid development of the world.It also represents the highly integrated and comprehensive application of the new generation of information network technology.As a significant carrier of the direct interaction between the perception layer of IoT and the physical world.Because of its convenient network deployment and low cost.Wireless Sensor Network(WSN)is widely used in national defense,military,medical care,earthquake monitoring etc.Due to the limited hardware resources of WSN nodes,storage space and computing power are limited.At the same time,most nodes are deployed in the complex environment,leading to be vulnerable to various threats.The attacker uses context oriented attack to get the location information of the source nodes,which easily brings a huge challenge to the large-scale application of WSN.Therefore,this paper will focus on the research of node location privacy security protection technology.Firstly,Through the in-depth study and analysis of the phantom routing protocol(PRS)based on trap-inducing ideas,there are two drawbacks as follows: The first one,when choosing the phantom node by random walk,the number of hops between the source node and the phantom node is less than the specified number of security hops;the distribution area of the phantom node is centralized and it's distribution is not diverse enough.Those lead to the source node failing to avoid the attacker effectively visual area,and cause large network delay.Secondly,when the number of hops between the source node and the Sink node is large.If a fake data source is used to confuse the attacker,more fake branches will be generated,resulting in excessive energy consumption;Secondly,Aiming at the backtracking of local attackers,a node location protection strategy based on random virtual ring(RVRS)is proposed.In the strategy,the directed random step is used to replace random walk.The dynamic random number generated by the source node and the storage location information are layered in the selected area of the phantom node,which enhances the diversity of the selection of the phantom node and effectively avoids the visual area of the attacker.The condition of selecting the phantom node is set to ensure that there is enough safe distance between the phantom node and the source node.The distance is set the set of equal neighbor nodes with the same minimum hops number from Sink node is a fake circle.When the packets arrive at the virtual circle,they randomly choose the transfer direction and apply the dynamically generated hop value to transfer hop-by-hop,which effectively enhances the diversity of transmission path and prolongs the average tracking time of attackers.Simulation results show that RVRS is more secure than PRS and EPUSBRF;Lastly,In order to solve the problem of large hops between source node and Sink node,excessive energy consumption of network.Based on multiple relay nodes cooperative random virtual ring(CRVRS),a new strategy is proposed.The strategy applies multiple relay node cooperative communication to the communication between the phantom node and the virtual ring node,selecting the neighbor node of the real path node as the relay to assist in forwarding data,making the relay node act as a “one hop” false source node,enhancing the privacy protection intensity of the source node's location.Meanwhile,by controlling the generation probability of fake branches and the length of the fake branches,the privacy protection of the source node is enhanced.To find the balance between protection intensity and network energy consumption.Compared with RVRS strategy,CRVRS strategy can effectively reduce the energy consumption of network nodes and prolong the network life cycle while maintaining a certain degree of location privacy protection intensity.
Keywords/Search Tags:Internet of things, Perceptual Layer Network, Source Node, Sink, Phantom Node
PDF Full Text Request
Related items