Font Size: a A A

Research On Privacy Protection Of Source Location In Wireless Sensor Networks

Posted on:2021-05-20Degree:MasterType:Thesis
Country:ChinaCandidate:Q ZhaoFull Text:PDF
GTID:2428330647961951Subject:Engineering
Abstract/Summary:PDF Full Text Request
The wireless sensor network has the advantages of small size,easy deployment and low cost,and has been widely used in the field of Internet of Things.The wireless communication media of wireless sensor networks and the limited resources of nodes make it face many threats in privacy security.Wireless sensor network privacy security is divided into data privacy security and context privacy security.Among them,location privacy security is the focus of research in context privacy security.Location privacy security is divided into base station location privacy security and source node location privacy security.In target tracking and monitoring wireless networks,the location of the event source is sensitive information,and once exposed will threaten the safety of the monitored object.Source location privacy protection technology has become one of the core contents of wireless sensor network security.This article focuses on how to improve the privacy protection of the source location while taking into account the energy consumption efficiency of the network and alleviating the impact of the source node at different locations on the network on the privacy security intensity.The research on the privacy protection of the source location is as follows:(1)To enhance the privacy protection of the source location while taking into account the efficiency of network energy consumption,an energy-balanced multi-branch tree EBBT(Energy Balanced Branch Tree)source location privacy protection scheme was proposed,which is based on random walk and data transmission disturbance.The data of the source node randomly walks to the intermediate node;the intermediate node to the base station node uses the shortest path to forward the data packet,and the branch path of multiple virtual sources is dynamically generated on the shortest path to form a tree-shaped routing structure.In the EBBT scheme,first,multi-branch paths select nodes in the path,consider the remaining energy of the nodes,and secondly control the direction of each branch path to achieve the purpose of relatively balanced distribution of distributed energy consumption.Theory and simulation experiments show that the EBBT algorithm improves the energy balance of the network and improves the network lifetime while effectively protecting the privacy of the source location.(2)The problem of different levels of network privacy protection is caused by different positions of source nodes in the network.A routing algorithm based on irregular ring RBIR(Routing Based Irregular Ring)is proposed.The algorithm uses intermediate nodes and irregular ring technology to realize the forwarding of data packets.In the RBIR scheme,constrained selection of intermediate nodes is aimed at the relative dispersion ofintermediate nodes and avoiding path crossovers;nodes in irregular rings are scattered and dynamic update of ring nodes can alleviate the problem of large energy consumption of ring nodes;data packets are forwarded in an irregular ring,increasing the angle of the path.The attacker cannot guess the approximate location of the source node from the angle of the path.Simulation experiments show that the RBIR algorithm improves the location privacy protection of the source node,especially when the source node is located near the base station,the RBIR algorithm has good security and high efficiency of network energy consumption.
Keywords/Search Tags:Wireless sensor network, Source location privacy, Fake source node, Intermediate node
PDF Full Text Request
Related items