无线传感器网络汇聚节点位置隐私保护研究
发布时间:2018-10-13 10:14
【摘要】:无线传感器网络(Wireless Sensor Networks,WSNs)具有广泛的应用场景,如应用于军事国防、生物医疗、环境检测以及智能家居等领域。无线传感器网络就是由部署在监测区域内大量的廉价微型传感器节点组成,通过无线通信方式形成的一个多跳的自组织的网络系统,其目的是协作地感知、采集和处理网络覆盖区域中被感知对象的信息,并发送给观察者。无线传感器网络被认为是对21世纪产生巨大影响力的技术之一 然而由于部署的环境恶劣,节点自身资源受限等特点,无线传感器网络非常容易遭受攻击。其安全问题面临着威胁,其中,网络中关键节点的位置隐私保护研究也是得到越来越多研究人员的高度重视。汇聚节点是连接无线传感器网络和外部互联网的网关,负责采集网络中传感器节点的监测数据以及将监测数据通过网络传输给观察者,同时汇聚节点也承担着向网络中发布任务和配置网络的功能。因此,一旦汇聚节点遭到攻击恶意破坏后,那么整个无线传感器网络将有可能面临瘫痪的危险。本文针对汇聚节点的位置隐私保护问题,做了如下工作: (1)首先对无线传感器网络进行了详细阐述,并从体系结构、拓扑结构、网络特点、应用领域、安全问题等角度分析了无线传感器网络的特性,指出网络中关键节点位置隐私保护的重要性。并分析总结了目前的无线传感器网络中汇聚节点的位置隐私保护方案,指出各个算法的优缺点。 (2)对全局流量分析攻击者和数据包追踪攻击者同时作用于网络时,基于现有方案的不足,本文提出保护方案:基于k匿名假包注入策略的汇聚节点位置隐私保护方案。方案中通过k个匿名节点来模仿汇聚节点周围的节点的网络通信流量,来迷惑全局流量分析攻击者,并且通过在匿名节点处向网络中注入假包来延长正向逐跳追踪的攻击时间,为了控制网络的安全时间和能量消耗之间的平衡,以一定的概率向网络中注入假包,同时定向转发把攻击者引到错误的位置上去。 (3)使用遗传算法计算网络中最佳的k个匿名节点的部署问题:包括匿名节点数和匿名节点的位置。对网络中匿名节点的部署问题提出了最优化模型化,并通过分析,先确定匿名节点k的个数,然后使用遗传算法来计算这些匿名节点的位置。
[Abstract]:Wireless sensor network (Wireless Sensor Networks,WSNs) has a wide range of applications, such as military defense, biomedical, environmental detection and smart home and other fields. Wireless sensor network is a multi-hop self-organizing network system which is composed of a large number of cheap micro-sensor nodes deployed in the monitoring area. Collect and process the information of the perceived object in the network coverage area and send it to the observer. Wireless sensor networks (WSN) are regarded as one of the most influential technologies in the 21st century. However, due to the poor deployment environment and the limited resource of nodes themselves, WSN is very vulnerable to attack. Among them, the research on the location privacy protection of the key nodes in the network is paid more and more attention by more and more researchers. The sink node is the gateway connecting the wireless sensor network and the external Internet. It is responsible for collecting the monitoring data of the sensor nodes in the network and transmitting the monitoring data to the observer through the network. At the same time, the convergent node also undertakes the function of publishing tasks and configuring the network to the network. Therefore, once the convergence node is attacked and maliciously destroyed, the whole wireless sensor network may be paralyzed. In this paper, the following work is done to protect the location privacy of the convergent node: (1) firstly, the wireless sensor network is described in detail, and from the architecture, topology, network characteristics, application field, The characteristics of wireless sensor networks are analyzed in terms of security issues, and the importance of location privacy protection for key nodes in the network is pointed out. The location privacy protection schemes of convergence nodes in wireless sensor networks are analyzed and summarized, and the advantages and disadvantages of each algorithm are pointed out. (2) when the attacker and the packet tracing attacker act on the network simultaneously, Based on the shortcomings of the existing schemes, this paper proposes a scheme to protect the location privacy of convergence nodes based on k-anonymous pseudo-packet injection policy. In the scheme, k anonymous nodes are used to imitate the network traffic of the nodes around the convergent nodes, to confuse the global traffic analysis attackers, and to extend the attack time of forward hop-by-hop tracing by injecting false packets into the network at anonymous nodes. In order to control the balance between the security time and energy consumption of the network, a false packet is injected into the network with a certain probability. At the same time, directed forwarding leads the attacker to the wrong location. (3) genetic algorithm is used to calculate the optimal deployment problem of k anonymous nodes in the network, including the number of anonymous nodes and the location of anonymous nodes. In this paper, the problem of deploying anonymous nodes in the network is modeled and the number of anonymous nodes k is determined through analysis. Then genetic algorithm is used to calculate the location of these anonymous nodes.
【学位授予单位】:安徽大学
【学位级别】:硕士
【学位授予年份】:2014
【分类号】:TP212.9;TN929.5
本文编号:2268239
[Abstract]:Wireless sensor network (Wireless Sensor Networks,WSNs) has a wide range of applications, such as military defense, biomedical, environmental detection and smart home and other fields. Wireless sensor network is a multi-hop self-organizing network system which is composed of a large number of cheap micro-sensor nodes deployed in the monitoring area. Collect and process the information of the perceived object in the network coverage area and send it to the observer. Wireless sensor networks (WSN) are regarded as one of the most influential technologies in the 21st century. However, due to the poor deployment environment and the limited resource of nodes themselves, WSN is very vulnerable to attack. Among them, the research on the location privacy protection of the key nodes in the network is paid more and more attention by more and more researchers. The sink node is the gateway connecting the wireless sensor network and the external Internet. It is responsible for collecting the monitoring data of the sensor nodes in the network and transmitting the monitoring data to the observer through the network. At the same time, the convergent node also undertakes the function of publishing tasks and configuring the network to the network. Therefore, once the convergence node is attacked and maliciously destroyed, the whole wireless sensor network may be paralyzed. In this paper, the following work is done to protect the location privacy of the convergent node: (1) firstly, the wireless sensor network is described in detail, and from the architecture, topology, network characteristics, application field, The characteristics of wireless sensor networks are analyzed in terms of security issues, and the importance of location privacy protection for key nodes in the network is pointed out. The location privacy protection schemes of convergence nodes in wireless sensor networks are analyzed and summarized, and the advantages and disadvantages of each algorithm are pointed out. (2) when the attacker and the packet tracing attacker act on the network simultaneously, Based on the shortcomings of the existing schemes, this paper proposes a scheme to protect the location privacy of convergence nodes based on k-anonymous pseudo-packet injection policy. In the scheme, k anonymous nodes are used to imitate the network traffic of the nodes around the convergent nodes, to confuse the global traffic analysis attackers, and to extend the attack time of forward hop-by-hop tracing by injecting false packets into the network at anonymous nodes. In order to control the balance between the security time and energy consumption of the network, a false packet is injected into the network with a certain probability. At the same time, directed forwarding leads the attacker to the wrong location. (3) genetic algorithm is used to calculate the optimal deployment problem of k anonymous nodes in the network, including the number of anonymous nodes and the location of anonymous nodes. In this paper, the problem of deploying anonymous nodes in the network is modeled and the number of anonymous nodes k is determined through analysis. Then genetic algorithm is used to calculate the location of these anonymous nodes.
【学位授予单位】:安徽大学
【学位级别】:硕士
【学位授予年份】:2014
【分类号】:TP212.9;TN929.5
【参考文献】
相关期刊论文 前1条
1 陈曦;姚剑波;;WSNs中的位置隐私评述[J];传感器与微系统;2009年08期
,本文编号:2268239
本文链接:https://www.wllwen.com/kejilunwen/wltx/2268239.html