Font Size: a A A

Research On Source Location Privacy Protection Algorithm Of Wireless Sensor Network

Posted on:2024-05-01Degree:MasterType:Thesis
Country:ChinaCandidate:H YangFull Text:PDF
GTID:2568307127973149Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
A wireless sensor network(WSN)is made up of a large number of wireless connected sensor nodes that can perform a variety of tasks together.Wireless sensor networks are widely used in many fields,including wild habitat monitoring,target tracking,and military monitoring.Considering that WSNs are typically deployed in unattended and harsh environments,nodes are severely constrained in their resources,leaving wireless sensor networks vulnerable to attacks from the outside.In WSN,as the first node in the network to obtain critical information,the source node stores the collected data in packets,which are then forwarded to the base station through routing.At this time,the attacker will listen to the packets in the network for the purpose of illegal profit,and track the location of the source node through attack methods such as source tracing and traffic analysis,which seriously threatens the security of the monitoring target and restricts the application of the wireless sensor network.At the same time,considering the shortcomings of limited energy and insufficient computing power caused by the size and cost limitation of ordinary nodes in the sensor network,how to improve the privacy protection strength of the source node while reducing the network energy consumption and packet time delay is a problem that must be solved by the wireless sensor network,so this paper proposes a source location privacy protection algorithm for wireless sensor networks based on multiple virtual rings and a source location privacy protection algorithm for wireless sensor networks based on Laplace perturbation.For the problem of overlapping paths and phantom node aggregation,source location privacy protection algorithm based on multiple virtual rings is put forword.First,the source node and the Sink node generate a virtual ring with themselves as the center of the circle respectively.The source node selects the evenly distributed source phantom nodes based on the virtual rings around the source node;Secondly,after the source node forwards the data packet to the source phantom node according to the shortest routing strategy,the source phantom node will adopt the probabilistic routing strategy based on Angle to forward the received data packet to the Sink phantom node to reduce the occurrence of coincidence paths.Finally,the Sink phantom node selects the intra-ring route forwarding direction and forwards the packet to the Sink by directional gradient route.The simulation results show that the algorithm improves the security cycle of the network and has good privacy protection performance.For the problem of global attacker,source location privacy protection algorithm based on Laplacian perturbation is put forword.First,the nodes mask the real data packets by sending false data packets whose interval is disturbed by the mean.Secondly,the source node sends out real packets whose time interval has passed mean perturbation and Anderson test,which reduces the time delay of real packets and makes it impossible for attackers to distinguish real packets from fake packets effectively.Finally,the source node sends the packet to the fake source node in both directions to generate two fake event regions to induce the attacker.Simulation results show that the algorithm can effectively reduce the detection rate of real packets and has good privacy protection performance.Figure[24] Table[1] Reference[52]...
Keywords/Search Tags:Wireless sensor network, Source location, Privacy protection, Phantom node, Laplacian disturbance
PDF Full Text Request
Related items