Font Size: a A A

Research On Source Location Privacy Protection Scheme In Wireless Sensor Networks

Posted on:2022-02-13Degree:MasterType:Thesis
Country:ChinaCandidate:R GuoFull Text:PDF
GTID:2518306482465724Subject:Cyberspace security law enforcement technology
Abstract/Summary:PDF Full Text Request
Wireless Sensor Networks is mainly composed of a large number of sensor nodes with limited resources.In the way of wireless multi-hop communication,through the selforganization and mutual cooperation between nodes,it realizes the perception,processing and transmission of the physical data of the monitored target in the designated area,which greatly improves the sensitivity and accuracy of people's access to physical information.However,the openness of wireless communication is not only convenient for people to obtain the required information,but also vulnerable to the attack of attackers,which leads to serious leakage of source node location privacy,seriously threatens the security of monitored targets,and limits the further development of wireless sensor networks.In recent years,researchers at home and abroad focus on the source node location privacy leakage problem to carry out a lot of research,and put forward many innovative and excellent research schemes.However,almost all of these research schemes cannot solve the problem of the contradictory relationship among source location privacy security,network lifetime and network communication quality.Supported by the National Key Research and Development Program of the Ministry of Science and Technology(Internal No.: 261-3)and aiming at the problem of source node location privacy disclosure,this paper focuses on solving the contradiction relationship and carries out research work as follows:(1)Aiming at the problem that the existing source location privacy protection schemes based on random walk routing algorithm are prone to generate excessive energy consumption of network communication,a phantom source decentralized routing protection scheme based on objective decision,PSSR,is proposed.The scheme not only adopts the method of segmented fixed quadrant random walk to ensure the security and diversity of the location of the phantom source node,but also selects the forwarding node by considering the remaining energy of the candidate node,the distance from the candidate node to the base station node,the communication energy consumption of the node,and the visible range of the attacker,so as to realize the construction of decentralized routing.The simulation results show that compared with the existing source location privacy protection schemes based on random walk routing algorithm,the proposed scheme can effectively prolong the network lifetime and reduce the transmission delay while enhancing the source location privacy security.(2)Aiming at the basic problem of high energy consumption and high delay in existing source location privacy protection schemes for wireless sensor networks,a low probability repetitive dynamic routing protection scheme based on improved ant colony algorithm,EESLPACA,is proposed.In this scheme,energy related factors are considered in the selection basis of path nodes,and the pheromone content of all paths is updated differently by the combination of local update strategy of selected path,pheromone volatilization strategy of unselected path in the update cycle and global optimal update strategy,which increase the possibility of the unselected node becoming the forwarding node and realize the balanced and minimized network energy consumption.Simulation results show that this scheme can effectively improve the performance of ant colony algorithm,and make it better applied in the field of source location privacy protection in wireless sensor networks.At the same time,compared with the existing source location privacy protection schemes,it can not only provide stronger source location privacy protection strength under the same network energy consumption,but also effectively reduce the transmission delay.
Keywords/Search Tags:wireless sensor networks, source location privacy protection, phantom source nodes, decentralized routing, ant colony algorithm
PDF Full Text Request
Related items