基于攻击感知的能量高效源位置隐私保护算法
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Preserving source-location privacy efficiently based on attack-perceiving in wireless sensor network
  • 作者:周倩 ; 秦小麟 ; 丁有伟
  • 英文作者:ZHOU Qian;QIN Xiaolin;DING Youwei;College of Computer Science and Technology,Nanjing University of Aeronautics and Astronautics;Jiangsu Key Laboratory of Internet of Things and Control Technology;
  • 关键词:位置隐私 ; 传感器网络 ; 能量高效 ; 攻击感知 ; 上下文感知
  • 英文关键词:location privacy;;sensor network;;energy-efficiency;;attack-perceiving;;context-aware
  • 中文刊名:TXXB
  • 英文刊名:Journal on Communications
  • 机构:南京航空航天大学计算机科学与技术学院;江苏省物联网与控制技术重点实验室;
  • 出版日期:2018-01-25
  • 出版单位:通信学报
  • 年:2018
  • 期:v.39;No.367
  • 基金:国家自然科学基金资助项目(No.61373015,No.61300052,No.41301047,No.61402225);; 江苏省自然科学基金资助项目(No.BK20140832);; 中国博士后基金资助项目(No.2013M540447)~~
  • 语种:中文;
  • 页:TXXB201801010
  • 页数:16
  • CN:01
  • ISSN:11-2102/TN
  • 分类号:105-120
摘要
提出了一种静默池机制方法(SPA,silent-pool approach),当传感器节点感知到附近移动攻击者的存在,通过控制节点的转发状态从而阻止和减少攻击者收到有效数据分组。在此基础上,进一步提出了对当前路由路径没有任何影响的安全机制——池外虚假信息注入(DPIOP,dummy packet injection out pool)法,诱使攻击者远离传输路径。实验结果验证了SPA和DPIOP的隐私性能,与现有方法相比可减少能耗约为63%,降低时延约为35%。
        Sensors' ability was utilized to perceive the mobile attacker nearby,and SPA(silent-pool approach) was proposed,which was able to hinder or reduce the packets hunted by the attacker by controlling the forwarding state of the nodes.In addition,a novel DPIOP(dummy packet injection out pool) method was proposed to entice the adversary far away from the transmission path without changing the original routing path.Through simulation studies and experiments,the outstanding performance of SPA and DPIOP in privacy preservation were demonstrated,with saving energy by about 63%,and reducing delay by about 35%.
引文
[1]牛晓光,魏川博,姚亚兰.传感网中能量均衡高效的源位置隐私保护协议[J].通信学报,2016,37(4):23-33.NIU X G,WEI C B,YAO Y L.Energy-consumption-balanced efficient source-location privacy preserving protocol in WSN[J].Journal on Communication,2016,37(4):23-33.
    [2]LIGHTFOOT L,LI Y,REN J.STa R:design and quantitative measurement of source-location privacy for wireless sensor networks[J].Secur Commun Netw,2016,9(3):220-228.
    [3]周倩,秦小麟,丁有伟.无线传感器网络中基于哈希函数的上下文隐私保护[J].南京理工大学学报,2017,41(6):753-759.ZHOU Q,QIN X L,DING Y W.Hash-based contextual privacy preservation in wireless sensor networks[J].Journal of Nanjing University of Science and Technology,2017,41(6):753-759.
    [4]KAMAT P,ZHANG Y,TRAPPE W,et al.Enhancing source-location privacy in sensor network routing[C]//25th IEEE International Conference on Distributed Computing Systems(ICDCS).2005:599-608.
    [5]ZHANG Y,WANG G,HU Q,et al.Design and performance study of a topology-hiding multipath routing protocol for mobile ad hoc networks[C]//IEEE INFOCOM.2012:10-18.
    [6]RAHAT A A M,EVERSON R M,FIELDSEND J E.Evolutionary multi-path routing for network lifetime and robustness in wireless sensor networks[J].Ad Hoc Netw,2016(52):130-145.
    [7]MEHTA K,LIU D,WRIGHT M.Protecting location privacy in sensor networks against a global eavesdropper[J].IEEE Trans Mob Comput,2012,11(2):320-336.
    [8]YANG Y,SHAO M,ZHU S,et al.Towards statistically strong source anonymity for sensor networks[J].ACM Trans Sen Netw,2013,9(2):1-23.
    [9]LOUREN?O P,BATISTA P,OLIVEIRA P,et al.Simultaneous localization and mapping in sensor networks:a GES sensor-based filter with moving object tracking[C]//European Control Conference(ECC).2015:2354-2359.
    [10]NANDHINI S A,RADHA S.Compressed sensing based object detection and tracking system using measurement selection process for wireless visual sensor networks[C]//International Conference on Wireless Communications,Signal Processing and Networking(Wi SPNET).2016:1117-1122.
    [11]APICHARTTRISORN D,APICHARTTRISORN K,KASETKASEM T.A moving object tracking algorithm using support vector machines in binary sensor networks[C]//13th International Symposium on Communications and Information Technologies(ISCIT).2013:529-534.
    [12]RIOS R,LOPEZ J.Exploiting context-awareness to enhance source-location privacy in wireless sensor networks[J].Oxford University Press,2011,54(10):1603-1615.
    [13]BURATTI C.Performance analysis of IEEE 802.15.4 beacon-enabled mode[J].IEEE Transactions on Vehicular Technology,2010,59(4):2031-2045.
    [14]BRADBURY M,LEEKE M,JHUMKA A.A dynamic fake source algorithm for source location privacy in wireless sensor networks[C]//IEEE Trustcom/Big Data SE/ISPA.2015:531-538.
    [15]OUYANG Y,LE Z,LIU D,et al.Source location privacy against laptop-class attacks in sensor networks[C]//The 4th International Conference on Security and Privacy in Communication Networks.2008:5-10.
    [16]RAJ M,LI N,LIU D,et al.Using data mules to preserve source location privacy in wireless sensor networks[J].Pervasive&Mobile Computing,2014(11):244-260.
    [17]JHUMKA A,LEEKE M,SHRESTHA S.On the use of fake sources for source location privacy:trade-offs between energy and privacy[J].Computer Journal,2011,54(6):860-874.
    [18]SHI R,GOSWAMI M,GAO J,et al.Is random walk truly memoryless traffic analysis and source location privacy under random walks[C]//IEEE INFOCOM.2013:3021-3029.
    [19]XI Y,SCHWIEBERT L,SHI W.Preserving source location privacy in monitoring-based wireless sensor networks[C]//20th IEEE International Parallel Distributed Processing Symposium.2006.
    [20]ALOMAIR B,CLARK A,CUELLAR J,et al.Toward a statistical framework for source anonymity in sensor networks[J].IEEE Transactions on Mobile Computing,2013,12(2):248-260.
    [21]吴博,胡小龙.WSN中基于假路径的源位置保护策略[J].计算机工程与应用,2008,44(16):114-117.WU B,HU X L.Strategy of protecting source-location privacy in WSN based on fake paths[J].Computer Engineering and Applications,2008,44(16):114-117.
    [22]AMIN R,BISWAS G P.A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks[J].Ad Hoc Networks,2016,36(1):58-80.
    [23]SRINIVAS J,MUKHOPADHYAY S,MISHRA D.Secure and efficient user authentication scheme for multi-gateway wireless sensor networks[J].Ad Hoc Networks,2017,54:147-169.
    [24]REDDY A G,DAS A K,YOON E J,et al.A secure anonymous authentication protocol for mobile services on elliptic curve cryptography[J].IEEE Access,2016(4):4394-4407.
    [25]SHAO M,HU W,ZHU S,et al.Cross-layer enhanced source location privacy in sensor networks[C]//6th Annual IEEE Communications Society Conference on Sensor,Mesh and Ad Hoc Communications and Networks.2009:1-9.
    [26]XING Y,CHEN Y,YI W,et al.Optimal beacon interval for TDMA-based MAC in wireless sensor networks[C]//11th International Conference on Innovations in Information Technology(IIT).2015:156-161.
    [27]HUANG P,LIU C J,XIAO L.TAS-MAC:a traffic-adaptive synchronous MAC protocol for wireless sensor networks[J].ACM Transaction Sensor Network,2016,12(1):1-30.
    [28]ZHOU L,WAN C,HUANG J,et al.The location privacy of wireless sensor networks:attacks and countermeasures[C]//Ninth International Conference on Broadband and Wireless Computing,Communication and Applications(BWCCA).2014:64-71.
    [29]POTTIE G J,KAISER W J.Wireless integrated network sensors[J].Communication ACM,2000,43(5):51-58.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700