天堂国产午夜亚洲专区-少妇人妻综合久久蜜臀-国产成人户外露出视频在线-国产91传媒一区二区三区

無線傳感器網(wǎng)絡(luò)匯聚節(jié)點(diǎn)位置隱私保護(hù)研究

發(fā)布時(shí)間:2018-10-13 10:14
【摘要】:無線傳感器網(wǎng)絡(luò)(Wireless Sensor Networks,WSNs)具有廣泛的應(yīng)用場景,如應(yīng)用于軍事國防、生物醫(yī)療、環(huán)境檢測以及智能家居等領(lǐng)域。無線傳感器網(wǎng)絡(luò)就是由部署在監(jiān)測區(qū)域內(nèi)大量的廉價(jià)微型傳感器節(jié)點(diǎn)組成,通過無線通信方式形成的一個(gè)多跳的自組織的網(wǎng)絡(luò)系統(tǒng),其目的是協(xié)作地感知、采集和處理網(wǎng)絡(luò)覆蓋區(qū)域中被感知對象的信息,并發(fā)送給觀察者。無線傳感器網(wǎng)絡(luò)被認(rèn)為是對21世紀(jì)產(chǎn)生巨大影響力的技術(shù)之一 然而由于部署的環(huán)境惡劣,節(jié)點(diǎn)自身資源受限等特點(diǎn),無線傳感器網(wǎng)絡(luò)非常容易遭受攻擊。其安全問題面臨著威脅,其中,網(wǎng)絡(luò)中關(guān)鍵節(jié)點(diǎn)的位置隱私保護(hù)研究也是得到越來越多研究人員的高度重視。匯聚節(jié)點(diǎn)是連接無線傳感器網(wǎng)絡(luò)和外部互聯(lián)網(wǎng)的網(wǎng)關(guān),負(fù)責(zé)采集網(wǎng)絡(luò)中傳感器節(jié)點(diǎn)的監(jiān)測數(shù)據(jù)以及將監(jiān)測數(shù)據(jù)通過網(wǎng)絡(luò)傳輸給觀察者,同時(shí)匯聚節(jié)點(diǎn)也承擔(dān)著向網(wǎng)絡(luò)中發(fā)布任務(wù)和配置網(wǎng)絡(luò)的功能。因此,一旦匯聚節(jié)點(diǎn)遭到攻擊惡意破壞后,那么整個(gè)無線傳感器網(wǎng)絡(luò)將有可能面臨癱瘓的危險(xiǎn)。本文針對匯聚節(jié)點(diǎn)的位置隱私保護(hù)問題,做了如下工作: (1)首先對無線傳感器網(wǎng)絡(luò)進(jìn)行了詳細(xì)闡述,并從體系結(jié)構(gòu)、拓?fù)浣Y(jié)構(gòu)、網(wǎng)絡(luò)特點(diǎn)、應(yīng)用領(lǐng)域、安全問題等角度分析了無線傳感器網(wǎng)絡(luò)的特性,指出網(wǎng)絡(luò)中關(guān)鍵節(jié)點(diǎn)位置隱私保護(hù)的重要性。并分析總結(jié)了目前的無線傳感器網(wǎng)絡(luò)中匯聚節(jié)點(diǎn)的位置隱私保護(hù)方案,指出各個(gè)算法的優(yōu)缺點(diǎn)。 (2)對全局流量分析攻擊者和數(shù)據(jù)包追蹤攻擊者同時(shí)作用于網(wǎng)絡(luò)時(shí),基于現(xiàn)有方案的不足,本文提出保護(hù)方案:基于k匿名假包注入策略的匯聚節(jié)點(diǎn)位置隱私保護(hù)方案。方案中通過k個(gè)匿名節(jié)點(diǎn)來模仿匯聚節(jié)點(diǎn)周圍的節(jié)點(diǎn)的網(wǎng)絡(luò)通信流量,來迷惑全局流量分析攻擊者,并且通過在匿名節(jié)點(diǎn)處向網(wǎng)絡(luò)中注入假包來延長正向逐跳追蹤的攻擊時(shí)間,為了控制網(wǎng)絡(luò)的安全時(shí)間和能量消耗之間的平衡,以一定的概率向網(wǎng)絡(luò)中注入假包,同時(shí)定向轉(zhuǎn)發(fā)把攻擊者引到錯(cuò)誤的位置上去。 (3)使用遺傳算法計(jì)算網(wǎng)絡(luò)中最佳的k個(gè)匿名節(jié)點(diǎn)的部署問題:包括匿名節(jié)點(diǎn)數(shù)和匿名節(jié)點(diǎn)的位置。對網(wǎng)絡(luò)中匿名節(jié)點(diǎn)的部署問題提出了最優(yōu)化模型化,并通過分析,先確定匿名節(jié)點(diǎn)k的個(gè)數(shù),然后使用遺傳算法來計(jì)算這些匿名節(jié)點(diǎn)的位置。
[Abstract]:Wireless sensor network (Wireless Sensor Networks,WSNs) has a wide range of applications, such as military defense, biomedical, environmental detection and smart home and other fields. Wireless sensor network is a multi-hop self-organizing network system which is composed of a large number of cheap micro-sensor nodes deployed in the monitoring area. Collect and process the information of the perceived object in the network coverage area and send it to the observer. Wireless sensor networks (WSN) are regarded as one of the most influential technologies in the 21st century. However, due to the poor deployment environment and the limited resource of nodes themselves, WSN is very vulnerable to attack. Among them, the research on the location privacy protection of the key nodes in the network is paid more and more attention by more and more researchers. The sink node is the gateway connecting the wireless sensor network and the external Internet. It is responsible for collecting the monitoring data of the sensor nodes in the network and transmitting the monitoring data to the observer through the network. At the same time, the convergent node also undertakes the function of publishing tasks and configuring the network to the network. Therefore, once the convergence node is attacked and maliciously destroyed, the whole wireless sensor network may be paralyzed. In this paper, the following work is done to protect the location privacy of the convergent node: (1) firstly, the wireless sensor network is described in detail, and from the architecture, topology, network characteristics, application field, The characteristics of wireless sensor networks are analyzed in terms of security issues, and the importance of location privacy protection for key nodes in the network is pointed out. The location privacy protection schemes of convergence nodes in wireless sensor networks are analyzed and summarized, and the advantages and disadvantages of each algorithm are pointed out. (2) when the attacker and the packet tracing attacker act on the network simultaneously, Based on the shortcomings of the existing schemes, this paper proposes a scheme to protect the location privacy of convergence nodes based on k-anonymous pseudo-packet injection policy. In the scheme, k anonymous nodes are used to imitate the network traffic of the nodes around the convergent nodes, to confuse the global traffic analysis attackers, and to extend the attack time of forward hop-by-hop tracing by injecting false packets into the network at anonymous nodes. In order to control the balance between the security time and energy consumption of the network, a false packet is injected into the network with a certain probability. At the same time, directed forwarding leads the attacker to the wrong location. (3) genetic algorithm is used to calculate the optimal deployment problem of k anonymous nodes in the network, including the number of anonymous nodes and the location of anonymous nodes. In this paper, the problem of deploying anonymous nodes in the network is modeled and the number of anonymous nodes k is determined through analysis. Then genetic algorithm is used to calculate the location of these anonymous nodes.
【學(xué)位授予單位】:安徽大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2014
【分類號(hào)】:TP212.9;TN929.5

【參考文獻(xiàn)】

相關(guān)期刊論文 前1條

1 陳曦;姚劍波;;WSNs中的位置隱私評(píng)述[J];傳感器與微系統(tǒng);2009年08期



本文編號(hào):2268239

資料下載
論文發(fā)表

本文鏈接:http://sikaile.net/kejilunwen/wltx/2268239.html


Copyright(c)文論論文網(wǎng)All Rights Reserved | 網(wǎng)站地圖 |

版權(quán)申明:資料由用戶3b26b***提供,本站僅收錄摘要或目錄,作者需要?jiǎng)h除請E-mail郵箱bigeng88@qq.com
激情偷拍一区二区三区视频| 久久精品久久精品中文字幕| 日韩三极片在线免费播放| 久久热在线视频免费观看| 青青免费操手机在线视频| 亚洲成人黄色一级大片| 日本人妻熟女一区二区三区| 欧美激情床戏一区二区三| 加勒比日本欧美在线观看| 日本 一区二区 在线| 免费高清欧美一区二区视频| 黄色片国产一区二区三区| 五月天丁香婷婷狠狠爱| 年轻女房东2中文字幕| 日韩欧美高清国内精品| 国产在线成人免费高清观看av| 能在线看的视频你懂的| 日韩精品免费一区三区| 麻豆91成人国产在线观看| 粉嫩内射av一区二区| 亚洲欧美日本视频一区二区| 亚洲清纯一区二区三区| 国产伦精品一一区二区三区高清版 | 亚洲欧美日产综合在线网| 少妇人妻一级片一区二区三区| 黄片三级免费在线观看| 中文字幕乱码免费人妻av| 色综合久久超碰色婷婷| 久久精品中文扫妇内射| 亚洲一区二区精品久久av| 欧美精品亚洲精品日韩专区| 日韩午夜老司机免费视频| 人妻一区二区三区在线| 精品人妻精品一区二区三区| 国产午夜精品久久福利| 丝袜av一区二区三区四区五区 | 伊人天堂午夜精品草草网| 欧美激情一区二区亚洲专区| 人妻巨大乳一二三区麻豆| 中国美女草逼一级黄片视频| 熟女少妇一区二区三区蜜桃|