基于节点距离的WSNs源位置隐私保护算法
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Source-location privacy protection algorithm in WSNs based on node distance
  • 作者:白乐强 ; 鄢野
  • 英文作者:BAI Le-qiang;YAN Ye;Information and Control Engineering Faculty,Shenyang Jianzhu University;
  • 关键词:无线传感器网络 ; 安全周期 ; 源节点 ; 过渡节点 ; 幻影源节点
  • 英文关键词:wireless sensor networks;;security period;;source node;;transition node;;phantom source node
  • 中文刊名:SJSJ
  • 英文刊名:Computer Engineering and Design
  • 机构:沈阳建筑大学信息与控制工程学院;
  • 出版日期:2018-06-16
  • 出版单位:计算机工程与设计
  • 年:2018
  • 期:v.39;No.378
  • 基金:国家自然科学基金项目(60973022/F020202)
  • 语种:中文;
  • 页:SJSJ201806006
  • 页数:6
  • CN:06
  • ISSN:11-1775/TP
  • 分类号:38-43
摘要
针对幻影路由方案中的幻影源节点易分布在真实源节点附近,导致网络安全周期降低的问题,提出一种基于节点距离的无线传感器网络源位置隐私保护算法(ABOND)。利用过渡节点与上一跳节点的坐标信息,建立直线方程,获取预期幻影源节点坐标,为选择幻影源节点方向提供依。理论分析结果表明,该算法选择的幻影源节点不仅远离真实源节点且具地理位置多样性。仿真结果表明,该算法在通信开销增加不多的情况下,显著提高了传感器网络的安全周期,有效保护了源位置隐私
        Aiming at the problem that the phantom source node in the phantom routing scheme is easy to be distributed near the real source node,which leads to the decrease of the network security period,a source-location privacy protection algorithm based on node distance(ABOND)was proposed.With coordinate information of the transition node and the sending node,a straight line equation was established.The coordinates of the expected phantom source node providing direction for phantom source node were calculated with the equation.The theoretical analysis shows that the selected phantom source nodes are away from the real source node and their locations are different.The simulation results show that the algorithm can significantly improve the security period with little increase of communication cost,protecting the source location privacy effectively in wireless sensor network.
引文
[1]FAN Yongjian,CHEN Hong,ZHANG Xiaoying.Data privacy preservation in wireless in sensor networks[J].Chinese Journal of Computer,2012,35(6):1131-1146(in Chinese).[范永健,陈红,张晓莹.无线传感器网络数据隐私保护技术[J].计算机学报,2012,35(6):1131-1146.]
    [2]PENG Hui,CHEN Hong,ZHANG Xiaoying,et al.Location privacy preservation in wireless sensor networks[J].Journal of Software,2015,26(3):617-639(in Chinese).[彭辉,陈红,张晓莹,等.无线传感器网络位置隐私保护技术[J].软件学报,2015,26(3):617-639.]
    [3]Lin Yao,Lin Kang,Shang Pengfei,et al.Protecting the sink location privacy in wireless sensor networks[J].Personal and Ubiquitous Computing,2013,17(5):883-893.
    [4]Rios R,Cuellar J,Lopez J.Probabilistic receiver-location privacy protection in wireless sensor networks[J].Information Sciences,2015,321(10):205-223.
    [5]Tan Wei,Xu Ke,Wang Dan.An anti-tracking source-location privacy protection protocol in WSNs based on path extension[J].IEEE Internet of Things Journal,2014,1(5):461-471.
    [6]Jia Zongpu,Wei Xiaojuan,Guo Hairu.A privacy protection strategy for source location in WSN based on angle and dynamical adjustment of node emission radius[J/OL].Chinese Journal of Electronics[2016-10-13].http://www.cnki.net/kcms/detail/10.1284.TN.20161013.0934.036.html.
    [7]Celal Ozturk,Zhang Yanyong,Wade Trappe.Source-location privacy in energy-constrained sensor network routing[C]//Proc of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks,2004:88-93.
    [8]Pandurang Kamat,Zhang Yanyong,Wade Trappe.Enhancing source-location privacy in sensor network routing[C]//Proc of the 25th International Conference on Distributed Computing Systems.Ohio:IEEE Press,2005:599-608.
    [9]CHEN Juan,FANG Binxing,YIN Lihua,et al.A source-location privacy preservation protocol in wireless sensor networks using source-based restricted flooding[J].Chinese Journal of Computer,2010,33(9):1736-1747(in Chinese).[陈娟,方滨兴,殷丽华,等.传感器网络中基于源节点有限洪泛的源位置隐私保护协议[J].计算机学报,2010,33(9):1736-1747.]
    [10]Li Yun,Ren Jun,Wu Jie.Quantitative measurement and design of source-location privacy schemes for wireless sensor networks[J].IEEE Trans on Parallel and Distributed Systems,2012,23(7):1302-1311.
    [11]Ren Ju,Zhang Yaoxue,Liu Kang.Multiple k-hop clusters based routing scheme to preserve source-location privacy in WSNs[J].Journal of Central South University,2014,21(8):3155-3168.
    [12]Mohamed M E A Mahmoud,Shen Xuemin(Sherman).A cloud-based scheme for protecting source-location privacy against hotspot-locating attack in wireless sensor networks[J].IEEE Transactions on Parallel and Distributed Systems,2012,23(10):1805-1818.
    [13]MA Li,HE Jianpei,MA Dongchao.Localization algorithm for wireless sensor network[J].Computer Engineering and Design,2014,35(12):4061-4067(in Chinese).[马礼,贺建沛,马东超.无线传感器网络节点定位方法[J].计算机工程与设计,2014,35(12):4061-4067.]
    [14]Ngai E C H.On providing sink anonymity for wireless sensor networks[J].Security and Communication Networks,2016,9(2):77-86.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700