一种WSN中多幻影节点源位置隐私保护协议
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:A Multiple-phantom Node Source Location Privacy Preserving Protocol in WSN
  • 作者:朱世照 ; 薛善良
  • 英文作者:ZHU Shi-zhao;XUE Shan-liang;College of Computer Science and Technology,Nanjing University of Aeronautics and Astronautics;
  • 关键词:无线传感器网络 ; 源位置 ; 隐私保护 ; 多幻影节点 ; 扇形区域划分
  • 英文关键词:wireless sensor network;;source-location;;privacy preserving;;multiple-phantom node;;sector-region division
  • 中文刊名:JYXH
  • 英文刊名:Computer and Modernization
  • 机构:南京航空航天大学计算机科学与技术学院;
  • 出版日期:2017-03-03 11:49
  • 出版单位:计算机与现代化
  • 年:2017
  • 期:No.258
  • 语种:中文;
  • 页:JYXH201702020
  • 页数:8
  • CN:02
  • ISSN:36-1137/TP
  • 分类号:101-107+111
摘要
在应用于目标监测的无线传感器网络中,攻击者可通过回溯追踪源节点发送数据包而获取源节点位置,从而对监测目标安全造成威胁。因此,需要采取相应策略进行源位置隐私保护。已有基于幻影节点的路由策略选取幻影节点的策略集中在源数据包随机或定向游走,存在幻影节点地理位置不够多样化,随机游走路径易重复等问题。在网络初始化阶段,本文通过选取基站节点的节点三元组过程中,为整个网络节点同时确定2个备选幻影节点,而节点三元组选取策略在地理位置的计算时要确保2个幻影节点的位置均位于可视区之外,以避免失效路径的产生;在路由工作阶段,根据随机数产生机制随机选取一个幻影节点发送数据包,利用中继节点与目标幻影节点间扇形区域划分的方法,有效减少路径重复几率和数据包传输时延。理论分析和仿真实验表明,本文提出的多幻影节点源位置保护策略相比已有多幻影节点策略能提高源节点的安全周期的同时,在通信时延方面也能取得较好平衡。
        In WSN applied for monitoring objects,attackers can get the location of source node by hop-by-hop traceback to data packet,which is an enormous threat to the safety of monitoring object. Thus,it is necessary to apply some appropriate strategies to protect the source location privacy. When existing route strategies based on phantom node select phantom node,these strategies concentrate on source data packet walking randomly or in constructed track,however,the locations of phantom nodes are not diversified and the walk paths overlap easily. During the network initialization phase,we selected two phantom nodes for every node through the triplet creation. The triplet creation method can ensure the two phantom nodes for every node are both outside the visible area by calculating the geographical location of node. During route work phase,source node chose a phantom node through random number and sent data packet,relay nodes transmit data packet by sector region division and selection. Theoretical analysis and simulation experiment shows that,the proposed strategy enhances safety of source node and ensures the balance of transmission delay.
引文
[1]潘巨龙,李善平,张道远.无线医疗传感器网络中基于Feistel加密算法研究[J].传感技术学报,2010,23(7):1030-1036.
    [2]裴庆祺,沈玉龙,马建峰.无线传感器网络安全技术综述[J].通信学报,2007,28(8):113-122.
    [3]彭辉,陈红,张晓莹,等.无线传感器网络位置隐私保护技术[J].软件学报,2015,26(3):617-639.
    [4]范永健,陈红,张晓莹.无线传感器网络数据隐私保护技术[J].计算机学报,2012,35(6):1131-1146.
    [5]Ozturk C,Zhang Y,Trappe W.Source-location privacy in energy-constrained sensor network routing[C]//Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks.2004:88-93.
    [6]Kamat P,Zhang Yanyong,Trappe W,et al.Enhancing source-location privacy in sensor network routing[C]//The 25th IEEE International Conference on Distributed Computing Systems(I-CDCS’05).2005:599-608.
    [7]Lightfoot L,Li Yun,Ren Jian.Preserving source-location privacy in wireless sensor network using STaR routing[C]//2010 IEEE Global Telecommunications Conference(GLOBECOM 2010).2010:1-5.
    [8]Kang Lei.Protecting location privacy in large-scale wireless sensor networks[C]//Proceedings of the 2009 IEEE International Conference on Communications.2009:603-608.
    [9]Shaikh R A,Jameel H,d’Auriol B J,et al.Network level privacy for wireless sensor networks[C]//The 4th IEEE International Conference on Information Assurance and Security.2008:261-266.
    [10]Wang Wei-ping,Chen Liang,Wang Jian-xin.A source-location privacy protocol in WSN based on locational angle[C]//2008 IEEE International Conference on Communications.2008:1630-1634.
    [11]陈娟,方滨兴,殷丽华,等.传感器网络中基于源节点有限洪泛的源位置隐私保护协议[J].计算机学报,2010(9):1736-1747.
    [12]Huang Jun,Sun Meisong,Zhu Shitong,et al.A source-location privacy protection strategy via pseudo normal distribution-based phantom routing in WSNs[C]//Proceedings of the 30th Annual ACM Symposium on Applied Computing.2015:688-694.
    [13]姚剑波,郝晓青,文光俊.无线传感器网络中的位置隐私保护[J].传感技术学报,2008,21(8):1437-1441.
    [14]Tan Guangbao,Li Wei,Song Jie.Enhancing source location privacy in energy-constrained wireless sensor networks[C]//Proceedings of International Conference on Computer Science and Information Technology.2014:279-289.
    [15]刘学军,李江,李斌.基于最小能耗路由的源节点位置隐私保护协议[J].传感技术学报,2014,27(3):394-400.
    [16]Kumar P,Singh J P,Vishnoi P,et al.Source location privacy using multiple-phantom nodes in WSN[C]//TENCON 2015-2015 IEEE Region 10 Conference.2015:1-6.
    [17]Gupta S,Kumar P,Singh J P,et al.Privacy Preservation of Source Location Using Phantom Nodes[M]//Information Technology:New Generations,2016:247-256.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700