無線傳感器網(wǎng)絡(luò)匯聚節(jié)點(diǎn)位置隱私保護(hù)研究
發(fā)布時(shí)間:2018-10-13 10:14
【摘要】:無線傳感器網(wǎng)絡(luò)(Wireless Sensor Networks,WSNs)具有廣泛的應(yīng)用場景,如應(yīng)用于軍事國防、生物醫(yī)療、環(huán)境檢測以及智能家居等領(lǐng)域。無線傳感器網(wǎng)絡(luò)就是由部署在監(jiān)測區(qū)域內(nèi)大量的廉價(jià)微型傳感器節(jié)點(diǎn)組成,通過無線通信方式形成的一個(gè)多跳的自組織的網(wǎng)絡(luò)系統(tǒng),其目的是協(xié)作地感知、采集和處理網(wǎng)絡(luò)覆蓋區(qū)域中被感知對象的信息,并發(fā)送給觀察者。無線傳感器網(wǎng)絡(luò)被認(rèn)為是對21世紀(jì)產(chǎn)生巨大影響力的技術(shù)之一 然而由于部署的環(huán)境惡劣,節(jié)點(diǎn)自身資源受限等特點(diǎn),無線傳感器網(wǎng)絡(luò)非常容易遭受攻擊。其安全問題面臨著威脅,其中,網(wǎng)絡(luò)中關(guān)鍵節(jié)點(diǎn)的位置隱私保護(hù)研究也是得到越來越多研究人員的高度重視。匯聚節(jié)點(diǎn)是連接無線傳感器網(wǎng)絡(luò)和外部互聯(lián)網(wǎng)的網(wǎng)關(guān),負(fù)責(zé)采集網(wǎng)絡(luò)中傳感器節(jié)點(diǎn)的監(jiān)測數(shù)據(jù)以及將監(jiān)測數(shù)據(jù)通過網(wǎng)絡(luò)傳輸給觀察者,同時(shí)匯聚節(jié)點(diǎn)也承擔(dān)著向網(wǎng)絡(luò)中發(fā)布任務(wù)和配置網(wǎng)絡(luò)的功能。因此,一旦匯聚節(jié)點(diǎn)遭到攻擊惡意破壞后,那么整個(gè)無線傳感器網(wǎng)絡(luò)將有可能面臨癱瘓的危險(xiǎn)。本文針對匯聚節(jié)點(diǎn)的位置隱私保護(hù)問題,做了如下工作: (1)首先對無線傳感器網(wǎng)絡(luò)進(jìn)行了詳細(xì)闡述,并從體系結(jié)構(gòu)、拓?fù)浣Y(jié)構(gòu)、網(wǎng)絡(luò)特點(diǎn)、應(yīng)用領(lǐng)域、安全問題等角度分析了無線傳感器網(wǎng)絡(luò)的特性,指出網(wǎng)絡(luò)中關(guān)鍵節(jié)點(diǎn)位置隱私保護(hù)的重要性。并分析總結(jié)了目前的無線傳感器網(wǎng)絡(luò)中匯聚節(jié)點(diǎn)的位置隱私保護(hù)方案,指出各個(gè)算法的優(yōu)缺點(diǎn)。 (2)對全局流量分析攻擊者和數(shù)據(jù)包追蹤攻擊者同時(shí)作用于網(wǎng)絡(luò)時(shí),基于現(xiàn)有方案的不足,本文提出保護(hù)方案:基于k匿名假包注入策略的匯聚節(jié)點(diǎn)位置隱私保護(hù)方案。方案中通過k個(gè)匿名節(jié)點(diǎn)來模仿匯聚節(jié)點(diǎn)周圍的節(jié)點(diǎn)的網(wǎng)絡(luò)通信流量,來迷惑全局流量分析攻擊者,并且通過在匿名節(jié)點(diǎn)處向網(wǎng)絡(luò)中注入假包來延長正向逐跳追蹤的攻擊時(shí)間,為了控制網(wǎng)絡(luò)的安全時(shí)間和能量消耗之間的平衡,以一定的概率向網(wǎng)絡(luò)中注入假包,同時(shí)定向轉(zhuǎn)發(fā)把攻擊者引到錯(cuò)誤的位置上去。 (3)使用遺傳算法計(jì)算網(wǎng)絡(luò)中最佳的k個(gè)匿名節(jié)點(diǎn)的部署問題:包括匿名節(jié)點(diǎn)數(shù)和匿名節(jié)點(diǎn)的位置。對網(wǎng)絡(luò)中匿名節(jié)點(diǎn)的部署問題提出了最優(yōu)化模型化,并通過分析,先確定匿名節(jié)點(diǎn)k的個(gè)數(shù),然后使用遺傳算法來計(jì)算這些匿名節(jié)點(diǎn)的位置。
[Abstract]:Wireless sensor network (Wireless Sensor Networks,WSNs) has a wide range of applications, such as military defense, biomedical, environmental detection and smart home and other fields. Wireless sensor network is a multi-hop self-organizing network system which is composed of a large number of cheap micro-sensor nodes deployed in the monitoring area. Collect and process the information of the perceived object in the network coverage area and send it to the observer. Wireless sensor networks (WSN) are regarded as one of the most influential technologies in the 21st century. However, due to the poor deployment environment and the limited resource of nodes themselves, WSN is very vulnerable to attack. Among them, the research on the location privacy protection of the key nodes in the network is paid more and more attention by more and more researchers. The sink node is the gateway connecting the wireless sensor network and the external Internet. It is responsible for collecting the monitoring data of the sensor nodes in the network and transmitting the monitoring data to the observer through the network. At the same time, the convergent node also undertakes the function of publishing tasks and configuring the network to the network. Therefore, once the convergence node is attacked and maliciously destroyed, the whole wireless sensor network may be paralyzed. In this paper, the following work is done to protect the location privacy of the convergent node: (1) firstly, the wireless sensor network is described in detail, and from the architecture, topology, network characteristics, application field, The characteristics of wireless sensor networks are analyzed in terms of security issues, and the importance of location privacy protection for key nodes in the network is pointed out. The location privacy protection schemes of convergence nodes in wireless sensor networks are analyzed and summarized, and the advantages and disadvantages of each algorithm are pointed out. (2) when the attacker and the packet tracing attacker act on the network simultaneously, Based on the shortcomings of the existing schemes, this paper proposes a scheme to protect the location privacy of convergence nodes based on k-anonymous pseudo-packet injection policy. In the scheme, k anonymous nodes are used to imitate the network traffic of the nodes around the convergent nodes, to confuse the global traffic analysis attackers, and to extend the attack time of forward hop-by-hop tracing by injecting false packets into the network at anonymous nodes. In order to control the balance between the security time and energy consumption of the network, a false packet is injected into the network with a certain probability. At the same time, directed forwarding leads the attacker to the wrong location. (3) genetic algorithm is used to calculate the optimal deployment problem of k anonymous nodes in the network, including the number of anonymous nodes and the location of anonymous nodes. In this paper, the problem of deploying anonymous nodes in the network is modeled and the number of anonymous nodes k is determined through analysis. Then genetic algorithm is used to calculate the location of these anonymous nodes.
【學(xué)位授予單位】:安徽大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2014
【分類號(hào)】:TP212.9;TN929.5
本文編號(hào):2268239
[Abstract]:Wireless sensor network (Wireless Sensor Networks,WSNs) has a wide range of applications, such as military defense, biomedical, environmental detection and smart home and other fields. Wireless sensor network is a multi-hop self-organizing network system which is composed of a large number of cheap micro-sensor nodes deployed in the monitoring area. Collect and process the information of the perceived object in the network coverage area and send it to the observer. Wireless sensor networks (WSN) are regarded as one of the most influential technologies in the 21st century. However, due to the poor deployment environment and the limited resource of nodes themselves, WSN is very vulnerable to attack. Among them, the research on the location privacy protection of the key nodes in the network is paid more and more attention by more and more researchers. The sink node is the gateway connecting the wireless sensor network and the external Internet. It is responsible for collecting the monitoring data of the sensor nodes in the network and transmitting the monitoring data to the observer through the network. At the same time, the convergent node also undertakes the function of publishing tasks and configuring the network to the network. Therefore, once the convergence node is attacked and maliciously destroyed, the whole wireless sensor network may be paralyzed. In this paper, the following work is done to protect the location privacy of the convergent node: (1) firstly, the wireless sensor network is described in detail, and from the architecture, topology, network characteristics, application field, The characteristics of wireless sensor networks are analyzed in terms of security issues, and the importance of location privacy protection for key nodes in the network is pointed out. The location privacy protection schemes of convergence nodes in wireless sensor networks are analyzed and summarized, and the advantages and disadvantages of each algorithm are pointed out. (2) when the attacker and the packet tracing attacker act on the network simultaneously, Based on the shortcomings of the existing schemes, this paper proposes a scheme to protect the location privacy of convergence nodes based on k-anonymous pseudo-packet injection policy. In the scheme, k anonymous nodes are used to imitate the network traffic of the nodes around the convergent nodes, to confuse the global traffic analysis attackers, and to extend the attack time of forward hop-by-hop tracing by injecting false packets into the network at anonymous nodes. In order to control the balance between the security time and energy consumption of the network, a false packet is injected into the network with a certain probability. At the same time, directed forwarding leads the attacker to the wrong location. (3) genetic algorithm is used to calculate the optimal deployment problem of k anonymous nodes in the network, including the number of anonymous nodes and the location of anonymous nodes. In this paper, the problem of deploying anonymous nodes in the network is modeled and the number of anonymous nodes k is determined through analysis. Then genetic algorithm is used to calculate the location of these anonymous nodes.
【學(xué)位授予單位】:安徽大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2014
【分類號(hào)】:TP212.9;TN929.5
【參考文獻(xiàn)】
相關(guān)期刊論文 前1條
1 陳曦;姚劍波;;WSNs中的位置隱私評(píng)述[J];傳感器與微系統(tǒng);2009年08期
,本文編號(hào):2268239
本文鏈接:http://sikaile.net/kejilunwen/wltx/2268239.html
最近更新
教材專著