Sink Node Location-Privacy Issues in Wireless Sensor Networks

碩士 === 世新大學 === 資訊管理學研究所(含碩專班) === 99 === In recent years wireless sensor networks have been developing rapidly. Wireless sensor networks are composed by multiple sensor nodes and a sink node. A sensor node sense temperature, humidity, brightness, gravity and location, and it can also be customized...

Full description

Bibliographic Details
Main Authors: Hao-Ting Chen, 陳豪霆
Other Authors: Shuo-Cheng Hu
Format: Others
Language:zh-TW
Published: 2011
Online Access:http://ndltd.ncl.edu.tw/handle/23183115464410555215
id ndltd-TW-099SHU05396074
record_format oai_dc
spelling ndltd-TW-099SHU053960742016-04-24T04:22:50Z http://ndltd.ncl.edu.tw/handle/23183115464410555215 Sink Node Location-Privacy Issues in Wireless Sensor Networks 無線感測網路中匯聚節點位置隱私問題 Hao-Ting Chen 陳豪霆 碩士 世新大學 資訊管理學研究所(含碩專班) 99 In recent years wireless sensor networks have been developing rapidly. Wireless sensor networks are composed by multiple sensor nodes and a sink node. A sensor node sense temperature, humidity, brightness, gravity and location, and it can also be customized according to different requirements. Due to the variety and convenience, wireless sensor networks have been applied in different fields, such as military and medical. Therefore the security of wireless sensor networks becomes a very important issue. If can not be guaranteed, it might cause the loss in the wars or compromise patients’ privacy. Our proposed Probabilistic Random Path mechanism can prevent attackers using tracing method to find the location of sink node. Fake messages are also used to prevent attackers from using traffic analysis to locate the sink node. By doing so, we can achieve the goal of protecting sink node. In the proposed PRP scheme, the further the distance between a node and the sink node, the higher the probability that the node will transmit data packets toward the sink node. This strategy can shorten the path length from sensor node to the sink node. Besides, fake messages are transmitted on-demand and thus the amount of fake message can be reduced. Therefore, our proposed scheme can enhance the performance of networks and minimize the energy consumption. In this thesis, we compare the security strength and the performance of networks of Probabilistic Random Path(PRP) against some famous schemes, such as shortest path、random path and Location privacy routing protocol(LPR). Shuo-Cheng Hu 胡碩誠 2011 學位論文 ; thesis 33 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 世新大學 === 資訊管理學研究所(含碩專班) === 99 === In recent years wireless sensor networks have been developing rapidly. Wireless sensor networks are composed by multiple sensor nodes and a sink node. A sensor node sense temperature, humidity, brightness, gravity and location, and it can also be customized according to different requirements. Due to the variety and convenience, wireless sensor networks have been applied in different fields, such as military and medical. Therefore the security of wireless sensor networks becomes a very important issue. If can not be guaranteed, it might cause the loss in the wars or compromise patients’ privacy. Our proposed Probabilistic Random Path mechanism can prevent attackers using tracing method to find the location of sink node. Fake messages are also used to prevent attackers from using traffic analysis to locate the sink node. By doing so, we can achieve the goal of protecting sink node. In the proposed PRP scheme, the further the distance between a node and the sink node, the higher the probability that the node will transmit data packets toward the sink node. This strategy can shorten the path length from sensor node to the sink node. Besides, fake messages are transmitted on-demand and thus the amount of fake message can be reduced. Therefore, our proposed scheme can enhance the performance of networks and minimize the energy consumption. In this thesis, we compare the security strength and the performance of networks of Probabilistic Random Path(PRP) against some famous schemes, such as shortest path、random path and Location privacy routing protocol(LPR).
author2 Shuo-Cheng Hu
author_facet Shuo-Cheng Hu
Hao-Ting Chen
陳豪霆
author Hao-Ting Chen
陳豪霆
spellingShingle Hao-Ting Chen
陳豪霆
Sink Node Location-Privacy Issues in Wireless Sensor Networks
author_sort Hao-Ting Chen
title Sink Node Location-Privacy Issues in Wireless Sensor Networks
title_short Sink Node Location-Privacy Issues in Wireless Sensor Networks
title_full Sink Node Location-Privacy Issues in Wireless Sensor Networks
title_fullStr Sink Node Location-Privacy Issues in Wireless Sensor Networks
title_full_unstemmed Sink Node Location-Privacy Issues in Wireless Sensor Networks
title_sort sink node location-privacy issues in wireless sensor networks
publishDate 2011
url http://ndltd.ncl.edu.tw/handle/23183115464410555215
work_keys_str_mv AT haotingchen sinknodelocationprivacyissuesinwirelesssensornetworks
AT chénháotíng sinknodelocationprivacyissuesinwirelesssensornetworks
AT haotingchen wúxiàngǎncèwǎnglùzhōnghuìjùjiédiǎnwèizhìyǐnsīwèntí
AT chénháotíng wúxiàngǎncèwǎnglùzhōnghuìjùjiédiǎnwèizhìyǐnsīwèntí
_version_ 1718231871352995840