Font Size: a A A

Research On Source Location Privacy Protection Method Based On Phantom Routing

Posted on:2020-01-14Degree:MasterType:Thesis
Country:ChinaCandidate:P LuoFull Text:PDF
GTID:2428330623451414Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the rapid development of wireless communication technology,sensor technology and modern network technology,wireless sensor network technology has become increasingly mature and perfect,and widely used in medical and health,military early warning,traffic control,environmental monitoring and other fields.Because wireless sensor networks are deployed in an open environment and communicate with an open wireless network,its information security protection has become a very serious problem.In WSNs,the source node is usually the nearest sensor node to the monitored object.It collects the real-time information of the monitored object in the network and forwards the information to the sink node through multi-hop routing.The sink node processes and transmits the information to the authorized user.In this process,the location privacy of the source node is particularly important.If it is monitored and used by illegal users,the security of the monitored objects and even the whole wireless sensor network will be seriously threatened.Therefore,the protection of source node location privacy is particularly important.Aiming at the privacy protection of source node location in wireless sensor networks,the main research work and innovations of this paper include the following points:1)In this paper,a balanced source location privacy protection algorithm,BSLBPR,is proposed.The source node location generalization mechanism based on random multicast is introduced to protect the source node location privacy.The random directed hops from source node to phantom node are calculated by the random number mechanism satisfying normal distribution.Then the data packets are forwarded from the source node to the phantom node according to the hop-by-hop selection of the intermediate node corresponding to the group number according to the binary random number string.Shadow node ensures the privacy and security of the source node,and achieves the diversity of phantom node distribution and path randomness.At the same time,in the generation stage of phantom node,data packet combines the mechanism of electronic voting protocol based on energy balance to select intermediate forwarding nodes,which realizes the balanced energy distribution of nodes and effectively prolongs the lifetime of the network.2)For local attackers with strong visual ability,BSLBPR algorithm applies improved probabilistic forwarding routing algorithm to avoid visual area in the phase of data packet forwarding from phantom node to base station.Multipath forwarding routing can effectively enhance the security performance of source location while avoiding the occurrence of failure paths and forcing forwarding routes to interrupt backtracking.A series of simulation experiments prove the effectiveness of the source location privacy protection strategy proposed in this paper.In this simulation,the PNDBPR algorithm,PUSBRF algorithm and the improved new algorithm proposed in this paper respectively perform security performance and network communication overhead respectively.Comparing the experiments,it is found that the improved new algorithm has better performance in the security performance of the source node,and its communication overhead is slightly increased.
Keywords/Search Tags:Wireless Sensor Network, Phantom Routing, Source Location Privacy, Voting Mechanism, Energy Balance
PDF Full Text Request
Related items