首页> 外文学位 >Optimizing Source Anonymity of Wireless Sensor Networks against Global Adversary Using Fake Packet Injections
【24h】

Optimizing Source Anonymity of Wireless Sensor Networks against Global Adversary Using Fake Packet Injections

机译:使用伪包注入优化无线传感器网络针对全球对手的源匿名性

获取原文
获取原文并翻译 | 示例

摘要

Wireless Sensor Networks (WSNs) have been utilized for many applications such as tracking and monitoring of endangered species in a national park, soldiers in a battlefield, and many others, which require anonymity of the origin, known as the Source Location Privacy (SLP ). The aim of SLP is to prevent unauthorized observers from tracing the source of a real event (an asset) by analyzing the traffic of the network. We develop the following six techniques to provide anonymity: Dummy Uniform Distribution (DUD), Dummy Adaptive Distribution (DAD), Controlled Dummy Adaptive Distribution (CAD), Exponential Dummy Adaptive Distribution (EDAD), Exponential Dummy Adaptive Distribution Plus One (EDADP1), and Exponential Dummy Adaptive Distribution Plus Two (EDADP2). Moreover, an enhanced version of the well-known FitProbRate technique is also developed. The purpose of these techniques is to overcome the anonymity problem against a global adversary model that has the capability of analyzing and monitoring the entire network.;We perform an extensive verification of the proposed techniques via simulation, statistical, and visualization approaches. Three analytical models are developed to verify the performance of our techniques: A Visualization model is performed on the simulation data to confirm anonymity. A Neural Network model is developed to ensure that the introduced techniques preserve SLP. In addition, a Steganography model based on statistical empirical data is implemented to validate the anonymity of the proposed techniques. The Simulation demonstrates that the proposed techniques provide a reasonable delay, delivery ratio, and overhead of the real event's packets while keeping a high level of anonymity.;Results show that the improved version of FitProbRate massively reduces the number of operations needed to detect the distribution type of a data sequence despite the number of intervals when compared to the original. A comprehensive comparison between EDADP1, EDADP2, and FitProbRate in terms of the average delay, anonymity level, average processing time, Anderson-Darling test, and polluted scenarios is conducted. Results show that all three techniques have a similar performance regarding the average delay and Anderson-Darling test. However, the proposed techniques outperform FitProbRate in terms of anonymity level, average processing time, and polluted scenarios. WSN applications that need privacy can select the suitable proposed technique based on the required level of anonymity with respect to delay, delivery ratio, and overhead.
机译:无线传感器网络(WSN)已被用于许多应用,例如跟踪和监视国家公园中的濒危物种,战场上的士兵以及许多其他需要来源匿名的地方,即源位置隐私(SLP) 。 SLP的目的是通过分析网络流量来防止未经授权的观察者跟踪真实事件(资产)的来源。我们开发了以下六种技术来提供匿名性:虚拟统一分配(DUD),虚拟自适应分配(DAD),受控虚拟自适应分配(CAD),指数虚拟自适应分配(EDAD),指数虚拟自适应分配加一(EDADP1),和指数假人自适应分布加二(EDADP2)。此外,还开发了著名的FitProbRate技术的增强版本。这些技术的目的是针对具有分析和监视整个网络能力的全球对手模型克服匿名问题。我们通过仿真,统计和可视化方法对提出的技术进行了广泛的验证。开发了三种分析模型来验证我们技术的性能:对仿真数据执行可视化模型以确认匿名性。开发了神经网络模型以确保引入的技术保留SLP。另外,实现了基于统计经验数据的隐写术模型以验证所提出技术的匿名性。仿真表明,所提出的技术可以提供合理的延迟,传递比率和真实事件数据包的开销,同时保持较高的匿名性。结果表明,改进版的FitProbRate大大减少了检测分布所需的操作数量数据序列的类型,尽管与原始序列相比有多个间隔。对EDADP1,EDADP2和FitProbRate之间的平均延迟,匿名级别,平均处理时间,Anderson-Darling测试和受污染的方案进行了全面比较。结果表明,对于平均延迟和Anderson-Darling测试,这三种技术均具有相似的性能。但是,在匿名级别,平均处理时间和受污染的场景方面,拟议的技术优于FitProbRate。需要保密性的WSN应用程序可以根据所需的匿名性级别(关于延迟,传递比率和开销)来选择合适的提议技术。

著录项

  • 作者

    Bushnag, Anas.;

  • 作者单位

    University of Bridgeport.;

  • 授予单位 University of Bridgeport.;
  • 学科 Computer science.;Computer engineering.
  • 学位 Ph.D.
  • 年度 2017
  • 页码 128 p.
  • 总页数 128
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 农业化学;
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号