基于分片技術(shù)的無線傳感網(wǎng)數(shù)據(jù)隱私保護(hù)算法研究
本文選題:無線傳感器網(wǎng)絡(luò) + 分片 ; 參考:《南京郵電大學(xué)》2017年碩士論文
【摘要】:無線傳感器網(wǎng)絡(luò)是一種以采集、處理和傳輸為主要工作任務(wù)的分布式網(wǎng)絡(luò)系統(tǒng)。通過無線的方式進(jìn)行信息數(shù)據(jù)交換,主要應(yīng)用于醫(yī)療、航天、軍事等領(lǐng)域。由于無線傳感器節(jié)點無線傳輸和隨機(jī)部署的特點,其數(shù)據(jù)易被竊取,因此隱私保護(hù)問題顯得尤為重要。本文主要研究基于分片技術(shù)的無線傳感器網(wǎng)絡(luò)隱私保護(hù)問題,主要做了以下三個方面工作。首先,針對基于分片技術(shù)的隱私保護(hù)算法無法有效應(yīng)對丟包的問題,提出了非加密的冗余線性隱私保護(hù)算法。該算法通過對分片數(shù)據(jù)加入隱藏信息來達(dá)到目標(biāo)節(jié)點對丟包的冗余,通過加入擾動數(shù)據(jù),提高隱私保護(hù)性,可以實現(xiàn)當(dāng)部分分片數(shù)據(jù)丟失時,通過冗余分片中的隱藏數(shù)據(jù)進(jìn)行還原。通過TOSSIM進(jìn)行系統(tǒng)仿真,結(jié)果表明在發(fā)生部分丟包時,該算法可以完整地還原出原始數(shù)據(jù),并從算法的數(shù)據(jù)精確性、數(shù)據(jù)還原概率、數(shù)據(jù)擬合度、通信開銷、丟包率等方面與其他算法進(jìn)行了對比。其次,針對非加密的冗余線性隱私保護(hù)算法無法有效應(yīng)對網(wǎng)絡(luò)場景不穩(wěn)定和內(nèi)部攻擊的情況,提出了基于分片技術(shù)的隱私同態(tài)保護(hù)算法。該算法首先通過建立源節(jié)點與目標(biāo)節(jié)點之間的反饋樹,使分片策略可以動態(tài)地調(diào)整,同時對隱藏數(shù)據(jù)和原始數(shù)據(jù)進(jìn)行同態(tài)加密,并且在目標(biāo)節(jié)點進(jìn)行數(shù)據(jù)驗證,進(jìn)一步加強(qiáng)隱私保護(hù)性,可以應(yīng)對網(wǎng)絡(luò)不穩(wěn)定造成的丟包率不穩(wěn)定的情況。通過TOSSIM進(jìn)行系統(tǒng)仿真,將該算法在與傳統(tǒng)的隱私保護(hù)協(xié)議進(jìn)行了比較,結(jié)果表明其具有較高的隱私保護(hù)性能。同時在動態(tài)調(diào)整、還原概率、通信開銷方面進(jìn)行了對比。最后,針對設(shè)計的兩種算法進(jìn)行原型系統(tǒng)設(shè)計與實現(xiàn),展示了兩種算法在應(yīng)對監(jiān)聽、流量分析、數(shù)據(jù)篡改和重放攻擊時的表現(xiàn),非加密的冗余線性隱私保護(hù)算法可以有效應(yīng)對監(jiān)聽和流量分析攻擊,而基于分片技術(shù)的隱私同態(tài)保護(hù)算法可以進(jìn)一步有效應(yīng)對數(shù)據(jù)篡改和重放攻擊。
[Abstract]:Wireless sensor network is a kind of acquisition, processing and transmission as the main task of the distributed network system. The information exchange data through wireless means, mainly used in medical, aerospace, military and other fields. Due to the characteristics of wireless sensor nodes in wireless transmission and random deployment, the data is easy to be stolen, so the privacy problem is particularly important. This paper mainly studies the problem of privacy protection in wireless sensor network based on chip technology, mainly in the following three aspects. Firstly, according to the privacy protection algorithm based on chip technology not effectively deal with the problem of the packet loss, the redundant linear non encrypted privacy protection algorithm. The algorithm uses binary data into tablets the hidden information to achieve the target node redundancy on packet loss, by adding disturbance data, improving privacy protection, can be achieved when part of slice data loss When the reduction is carried out by hiding redundant data slices. System simulation was carried out by TOSSIM, the results show that the partial loss, the algorithm can completely restore the original data, and data from the algorithm accuracy, data reduction probability, data fitting, communication overhead, packet loss and other algorithm compared. Secondly, according to the linear redundancy privacy protection algorithm can not effectively deal with non encrypted network scene instability and internal attack situation, put forward to protect privacy homomorphism algorithm based on split based technology. Firstly, through the establishment of feedback tree between the source node and a destination node, the partitioning strategy can be dynamically adjusted. At the same time, the hidden data and the original data of homomorphic encryption, and data validation on the target node, to further strengthen the protection of privacy, can deal with packet loss of network instability caused by the rate of The instability of the system. Through TOSSIM simulation, the algorithm in the privacy protection protocol was compared with the traditional, the result shows that it has high performance. At the same time reducing the probability of privacy protection in the dynamic adjustment, compares the communication costs. Finally, the two algorithms of the design and implementation of a prototype design system, show the two algorithms in dealing with monitoring, traffic analysis, data tampering and replay attack performance, redundant linear privacy protection algorithm can effectively deal with non encrypted eavesdropping and traffic analysis attacks, and privacy homomorphism protection algorithm slicing technology based on can further effectively deal with data tampering and replay attack.
【學(xué)位授予單位】:南京郵電大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2017
【分類號】:TP309;TP212.9;TN929.5
【參考文獻(xiàn)】
相關(guān)期刊論文 前10條
1 付帥;姜奇;馬建峰;;一種無線傳感器網(wǎng)絡(luò)隱私保護(hù)數(shù)據(jù)聚合方案[J];計算機(jī)研究與發(fā)展;2016年09期
2 彭輝;陳紅;張曉瑩;范永健;李翠平;李德英;;無線傳感器網(wǎng)絡(luò)位置隱私保護(hù)技術(shù)[J];軟件學(xué)報;2015年03期
3 王倩倩;陳正宇;;無線傳感器網(wǎng)絡(luò)中數(shù)據(jù)融合隱私保護(hù)技術(shù)研究[J];金陵科技學(xué)院學(xué)報;2014年02期
4 胡志鵬;李慶;王樞;周梓鑫;;無線傳感器網(wǎng)絡(luò)綜述[J];電子制作;2014年09期
5 錢萍;吳蒙;;無線傳感器網(wǎng)絡(luò)隱私保護(hù)方法[J];電信科學(xué);2013年01期
6 張永;溫濤;郭權(quán);李鳳坤;;WSN中基于全同態(tài)加密的對偶密鑰建立方案[J];通信學(xué)報;2012年10期
7 許建;楊庚;陳正宇;王海勇;楊震;;WSN數(shù)據(jù)融合中的隱私保護(hù)技術(shù)研究[J];計算機(jī)工程;2012年15期
8 楊庚;王安琪;陳正宇;許建;王海勇;;一種低耗能的數(shù)據(jù)融合隱私保護(hù)算法[J];計算機(jī)學(xué)報;2011年05期
9 王斌;;無線傳感器網(wǎng)絡(luò)操作系統(tǒng)TinyOS的研究[J];計算機(jī)與現(xiàn)代化;2008年01期
10 任豐原,黃海寧,林闖;無線傳感器網(wǎng)絡(luò)[J];軟件學(xué)報;2003年07期
,本文編號:1734659
本文鏈接:http://sikaile.net/kejilunwen/zidonghuakongzhilunwen/1734659.html