Font Size: a A A

Research On Source Location Privacy Protection Method In Wireless Sensor Network

Posted on:2023-11-13Degree:MasterType:Thesis
Country:ChinaCandidate:J SunFull Text:PDF
GTID:2568306815462354Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the rapid development of modern sensor technology and wireless communication technology,the status of wireless sensor network in the Internet of Things industry has become increasingly prominent,and it has gradually penetrated into many fields of daily life.The wireless sensor network is composed of a large number of sensor nodes with sensing ability,but the communication process of the nodes completely relies on the supply of energy from micro batteries.Sensor nodes are often deployed in an open environment unattended and lack of management,which makes wireless sensor networks face a very severe situation in the field of information security.The source node,as a node with extremely valuable and key information,periodically forwards the collected sensitive data to the sink node through multi-hop routing in the form of packets.Malicious adversaries can trace the source node by eavesdropping on packets in a reverse and backtracking attack mode,which seriously threatens the security of the monitoring target.And due to the sensitivity of the source location,the location information of the monitored target is found to be very likely to cause the paralysis of the entire wireless sensor network.Therefore,it is of great significance to improve the privacy and security of source location.In addition,considering the extremely limited energy,miniature size,fixed communication range and low computing level of sensor nodes,how to ensure high privacy of the source location while taking into account the network performance is the key problem to be solved urgently in wireless sensor networks.This paper conducts in-depth research on source location privacy protection in wireless sensor networks.The main contents and innovations are as follows:(1)In view of the problems existing in the source location privacy security policy based on phantom node in wireless sensor networks,such as insufficient diversification of transmission paths between phantom node and source node,proximity of phantom node distribution area to source node,and high communication overhead,a source node location privacy protection scheme based on sector domain phantom routing is proposed.In this scheme,the central node is selected through the location information of source node and sink node,and the coordinate position of sector domain and central node is used to make the selected phantom node distribution area more scattered in the transmission process,and extend the length of routing path between it and the source node.The process of phantom node forwarding data packet to sink node does not pass through the visible area,which increases the security time of source location to some extent.Theoretical analysis and simulation experiments show that this scheme can guarantee higher privacy of source location under the condition of lower communication overhead.(2)In order to achieve high source location privacy in wireless sensor networks and balance the security performance of source nodes and network energy consumption,a multi-path source location privacy protection scheme via proxy nodes is proposed.Firstly,restricted flooding and directed routing at the source node can encourage packets to be forwarded away from the source.Secondly,greedy quantitative routing and random equal-hop routing are used to ensure the random diversity of the positions of the transit nodes.Finally,the forwarding nodes generate angles randomly,and complete the multi-path routing based on the proxy node in the selected quadrant to forward the data packets to the sink node.This scheme can increase the random diversity of forwarding paths and effectively prevent an adversary from tracking a certain path.Theoretical analysis and simulation experiments show that the scheme significantly increases the security period of the source node within the range of acceptable energy consumption increase.
Keywords/Search Tags:Wireless sensor network, Source location, Privacy protection, Routing algorithm, phantom nodes, proxy node
PDF Full Text Request
Related items