天堂国产午夜亚洲专区-少妇人妻综合久久蜜臀-国产成人户外露出视频在线-国产91传媒一区二区三区

無線傳感器網(wǎng)絡匯聚節(jié)點位置隱私保護研究

發(fā)布時間:2018-10-13 10:14
【摘要】:無線傳感器網(wǎng)絡(Wireless Sensor Networks,WSNs)具有廣泛的應用場景,如應用于軍事國防、生物醫(yī)療、環(huán)境檢測以及智能家居等領域。無線傳感器網(wǎng)絡就是由部署在監(jiān)測區(qū)域內(nèi)大量的廉價微型傳感器節(jié)點組成,通過無線通信方式形成的一個多跳的自組織的網(wǎng)絡系統(tǒng),其目的是協(xié)作地感知、采集和處理網(wǎng)絡覆蓋區(qū)域中被感知對象的信息,并發(fā)送給觀察者。無線傳感器網(wǎng)絡被認為是對21世紀產(chǎn)生巨大影響力的技術之一 然而由于部署的環(huán)境惡劣,節(jié)點自身資源受限等特點,無線傳感器網(wǎng)絡非常容易遭受攻擊。其安全問題面臨著威脅,其中,網(wǎng)絡中關鍵節(jié)點的位置隱私保護研究也是得到越來越多研究人員的高度重視。匯聚節(jié)點是連接無線傳感器網(wǎng)絡和外部互聯(lián)網(wǎng)的網(wǎng)關,負責采集網(wǎng)絡中傳感器節(jié)點的監(jiān)測數(shù)據(jù)以及將監(jiān)測數(shù)據(jù)通過網(wǎng)絡傳輸給觀察者,同時匯聚節(jié)點也承擔著向網(wǎng)絡中發(fā)布任務和配置網(wǎng)絡的功能。因此,一旦匯聚節(jié)點遭到攻擊惡意破壞后,那么整個無線傳感器網(wǎng)絡將有可能面臨癱瘓的危險。本文針對匯聚節(jié)點的位置隱私保護問題,做了如下工作: (1)首先對無線傳感器網(wǎng)絡進行了詳細闡述,并從體系結構、拓撲結構、網(wǎng)絡特點、應用領域、安全問題等角度分析了無線傳感器網(wǎng)絡的特性,指出網(wǎng)絡中關鍵節(jié)點位置隱私保護的重要性。并分析總結了目前的無線傳感器網(wǎng)絡中匯聚節(jié)點的位置隱私保護方案,指出各個算法的優(yōu)缺點。 (2)對全局流量分析攻擊者和數(shù)據(jù)包追蹤攻擊者同時作用于網(wǎng)絡時,基于現(xiàn)有方案的不足,本文提出保護方案:基于k匿名假包注入策略的匯聚節(jié)點位置隱私保護方案。方案中通過k個匿名節(jié)點來模仿匯聚節(jié)點周圍的節(jié)點的網(wǎng)絡通信流量,來迷惑全局流量分析攻擊者,并且通過在匿名節(jié)點處向網(wǎng)絡中注入假包來延長正向逐跳追蹤的攻擊時間,為了控制網(wǎng)絡的安全時間和能量消耗之間的平衡,以一定的概率向網(wǎng)絡中注入假包,同時定向轉發(fā)把攻擊者引到錯誤的位置上去。 (3)使用遺傳算法計算網(wǎng)絡中最佳的k個匿名節(jié)點的部署問題:包括匿名節(jié)點數(shù)和匿名節(jié)點的位置。對網(wǎng)絡中匿名節(jié)點的部署問題提出了最優(yōu)化模型化,并通過分析,先確定匿名節(jié)點k的個數(shù),然后使用遺傳算法來計算這些匿名節(jié)點的位置。
[Abstract]:Wireless sensor network (Wireless Sensor Networks,WSNs) has a wide range of applications, such as military defense, biomedical, environmental detection and smart home and other fields. Wireless sensor network is a multi-hop self-organizing network system which is composed of a large number of cheap micro-sensor nodes deployed in the monitoring area. Collect and process the information of the perceived object in the network coverage area and send it to the observer. Wireless sensor networks (WSN) are regarded as one of the most influential technologies in the 21st century. However, due to the poor deployment environment and the limited resource of nodes themselves, WSN is very vulnerable to attack. Among them, the research on the location privacy protection of the key nodes in the network is paid more and more attention by more and more researchers. The sink node is the gateway connecting the wireless sensor network and the external Internet. It is responsible for collecting the monitoring data of the sensor nodes in the network and transmitting the monitoring data to the observer through the network. At the same time, the convergent node also undertakes the function of publishing tasks and configuring the network to the network. Therefore, once the convergence node is attacked and maliciously destroyed, the whole wireless sensor network may be paralyzed. In this paper, the following work is done to protect the location privacy of the convergent node: (1) firstly, the wireless sensor network is described in detail, and from the architecture, topology, network characteristics, application field, The characteristics of wireless sensor networks are analyzed in terms of security issues, and the importance of location privacy protection for key nodes in the network is pointed out. The location privacy protection schemes of convergence nodes in wireless sensor networks are analyzed and summarized, and the advantages and disadvantages of each algorithm are pointed out. (2) when the attacker and the packet tracing attacker act on the network simultaneously, Based on the shortcomings of the existing schemes, this paper proposes a scheme to protect the location privacy of convergence nodes based on k-anonymous pseudo-packet injection policy. In the scheme, k anonymous nodes are used to imitate the network traffic of the nodes around the convergent nodes, to confuse the global traffic analysis attackers, and to extend the attack time of forward hop-by-hop tracing by injecting false packets into the network at anonymous nodes. In order to control the balance between the security time and energy consumption of the network, a false packet is injected into the network with a certain probability. At the same time, directed forwarding leads the attacker to the wrong location. (3) genetic algorithm is used to calculate the optimal deployment problem of k anonymous nodes in the network, including the number of anonymous nodes and the location of anonymous nodes. In this paper, the problem of deploying anonymous nodes in the network is modeled and the number of anonymous nodes k is determined through analysis. Then genetic algorithm is used to calculate the location of these anonymous nodes.
【學位授予單位】:安徽大學
【學位級別】:碩士
【學位授予年份】:2014
【分類號】:TP212.9;TN929.5

【參考文獻】

相關期刊論文 前1條

1 陳曦;姚劍波;;WSNs中的位置隱私評述[J];傳感器與微系統(tǒng);2009年08期

,

本文編號:2268239

資料下載
論文發(fā)表

本文鏈接:http://sikaile.net/kejilunwen/wltx/2268239.html


Copyright(c)文論論文網(wǎng)All Rights Reserved | 網(wǎng)站地圖 |

版權申明:資料由用戶3b26b***提供,本站僅收錄摘要或目錄,作者需要刪除請E-mail郵箱bigeng88@qq.com