Dissertation > Excellent graduate degree dissertation topics show

Research on Sink-Location Privacy Protection in Wireless Sensor Networks

Author: ZhangKun
Tutor: SongJie
School: Anhui University
Course: Applied Computer Technology
Keywords: Wireless Sensor Networks Sink node location privacy protection k-anonymity Fake packet injection
CLC: TP212.9
Type: Master's thesis
Year: 2014
Downloads: 3
Quote: 0
Read: Download Dissertation

Abstract


Wireless sensor networks (WSNs) has a wide range of application scenarios, such as for monitoring enemies in battle field environment, Bio-Medical, smart home system and environment. Wireless sensor networks is composed by the deployment of a large number of cheap micro sensor nodes within the monitoring area, and is formed to be a self-organizing multi-hop network through wireless communication, and it collects data in the area, then the data is transmitted to the observer. Wireless sensor networks is considered to be one of the technologies which have a huge influence on the21st century.However, WSNs is usually deployed in the harsh environments, and the node in the network has very few resources. So WSNs is very vulnerable, its security issues is facing the threat of the attackers. Study of the node’s location privacy in the network has a increasing attention of researchers. Sink node is the gateway of the network which is the connection of WSNs and the external network. The news collected by the sensor networks will be send to the observer through the sink node. Further, the observer could release new monitoring task through the sink node to the sensor network. Then, once the sink node attackers attacks the sink node, the entire sensor networks will be paralysis. Aiming the location privacy protection of the sink node, the paper’s main works are as follows.(1) First, we elaborate the WSNs, including its architecture, topology, network features, applications and security issue. Then we show the importance of critical nodes in the network location privacy protection. We analyzes and summarizes the exiting algorithms of sink node location privacy protection in WSNs, then, indicate the advantages and disadvantages of each algorithm.(2) When the attackers that have a global view of network communication and can lead the adversary toward the travel direction of messages hop by hop till they reach the sink. This paper proposes protection program:k-anonymity based and fake packet injection strategy for the protection of sink node location privacy in WSNs. There are k nodes which are very similar to the nodes that are nearby the sink node. So, we can confuse the global attackers. To extend the safety time, when the anonymity nodes receive a packet, they generate a fake packet to the network.In order to control the balance of network security between the safe time and energy consumption, probability of generating a fake packet is set to be pfake, and the Time to Live(TTL) of the fake packet is set to be TTL. Through the fake packet injection, we can lead the attackers to a wrong location.(3) We use genetic algorithms(GA) to calculate the deployment of the optimal k-anonymity nodes in the network, which including the numbers of k and the locations of the anonymity nodes. We propose a model to solve the problem. We firstly calculate the number of k, then calculate the locations of the anonymity nodes by GA.

Related Dissertations

  1. Gradual Event Detection in Sensor Networks,TP212.9
  2. Multiple Pairwise Keys Management Protocol of Function Node-Based for Wireless Sensor Networks,TP212.9
  3. Research of Multicast Protocol in Wireless Sensor Networks,TN929.5
  4. Research and Improvement of WSNs Routing Algorithm Based on Geographic Location,TN929.5
  5. Based on ZigBee wireless sensor network research,TN929.5
  6. Research on MAC Protocol for WIreless Sensor Network,TN915.04
  7. The Research on Localization Algorithm of Wireless Sensor Networks,TN929.5
  8. The Research and Application of Stochastic Routing in Wireless Sensor Networks,TN929.5
  9. The Study of Mine Gas Monitoring System Based on Wireless Sensor Networks,TN929.5
  10. Research on Intrusion Detection Technology of Wireless Sensor Networks Based on Behavior Trust,TP212.9
  11. Region-based wireless sensor network key management scheme for research,TP212.9
  12. Information-oriented physical systems IEEE802.15.4MAC protocol analysis and optimization,TP212.9
  13. Multilayer structure based WSN routing protocol for heterogeneous clusters,TP212.9
  14. Soccer Data Acquisition System,TP212.9;TP274.2
  15. With the mobile node localization algorithm for wireless sensor networks,TP212.9
  16. Feedback Theory Based Transmission Power Control in Wireless Sensor Networks,TN929.5
  17. Mobile data aggregation in wireless sensor network research,TP212.9
  18. Research and Simulation on Blue-green Algae Bloom in Taihu Lake,X173
  19. Research on Target Location and Tracking Algorithm in Wireless Sensor Networks,TN929.5
  20. A Study of Multi-Path Routing Algorithm of Wireless Sensor Networks Based on Energy Balance,TP212.9
  21. Study of the Greenhouse Environment Supervisory System Based on WSN,TP274

CLC: > Industrial Technology > Automation technology,computer technology > Automation technology and equipment > Automation components,parts > Transmitter ( converter),the sensor > Sensor applications
© 2012 www.DissertationTopic.Net  Mobile