Font Size: a A A

Research On Location Privacy Protection Technology Of Wireless Sensor Networks

Posted on:2021-07-07Degree:MasterType:Thesis
Country:ChinaCandidate:Y T WangFull Text:PDF
GTID:2518306479464944Subject:Master of Engineering
Abstract/Summary:PDF Full Text Request
Wireless sensor networks are often deployed in unattended environments to monitor valuable assets in a given area.The user submits a query request through the base station,and the sensing node in the network will collect its relevant information and return it to the base station after detecting the target asset.Due to the broadcast nature of wireless communication,the contextual information of communication is exposed,based on which,an attacker can infer the location information of critical nodes in the network,such as data sources and base stations,which may threaten the security of assets in the monitoring area and even affect the security and stability of the entire network.Therefore,research on the privacy protection mechanism of node location based on contextual information is theoretically important and of practical value.This thesis focuses on the location privacy protection technology of wireless sensor networks.The main research results are as follows:(1)Aiming at the problem of large energy consumption of existing source location privacy protection algorithms,this thesis proposes a source location privacy protection algorithm based on Circular Trap(CT).This algorithm optimizes the cross-layer protocols of routing layer and media access control layer,assigns different dedicated time slots to each node in the network using Time Division Multiple Access(TDMA)technology,and constructs a circular trap route,adjusting the time slots of the nodes on the circular trap to be lower than all its neighbors.In this way,when an attacker eavesdropping in the network passes the circular trap,it first listens to false messages broadcast by the nodes in the trap and traces the route around the trap.It is difficult for the attacker to trace back to the source node,thereby protecting the source location privacy.Finally,the theoretical analysis and simulation experiments show that the CT algorithm can provide privacy protection of the source location at the cost of lower energy consumption and latency,and its overall performance is better than existing STD algorithms.(2)Due to the large energy consumption and no consideration of the distribution of query messages,the existing algorithms of Sink location privacy protection are not suitable for large-scale WSN query applications.This thesis comprehensively considers query message distribution and sensing data collection,and proposes a Sink location privacy protection algorithm based on Random Proxy Nodes(RPN).This algorithm distributes query messages and sense data collection through proxy Sink node to protect the location privacy of the real Sink of the network.Via clustering routing,RPN algorithm reduces data forwarding and energy consumption during the data collection stage.Finally,the security,energy consumption and network latency of the algorithm were analyzed through theoretical analysis and simulation experiments that have proved that RPN has the advantages of low energy consumption while efficiently protecting the location privacy of Sink.
Keywords/Search Tags:Wireless sensor network, location privacy protection, time division multiple access, query processing
PDF Full Text Request
Related items