期刊文献+

基于安全区域的汇聚节点位置隐私保护协议算法设计 被引量:1

Protocol Algorithm Design of Location Privacy Preserving for Sink Node Based on Security Area
下载PDF
导出
摘要 针对无线传感器网络汇聚节点位置隐私安全问题,提出了一种基于安全区域的动态路由算法,通过在非安全区域内向安全区域概率性发送数据包与虚假数据包以及在汇聚节点周围形成环形汇聚区域等方法保护汇聚节点的位置信息。对提出的动态路由算法与现有的汇聚节点隐私保护算法进行性能比较,网络仿真实验结果显示本路由算法具有能耗小,网络时延小,数据传送成功率高等优点,可以实现汇聚节点位置隐私安全和网络能耗之间的较好均衡。 In view of problems appear in location privacy protection for sink node of wireless sensor networks, a location privacy preserving routing algorithm for sink node based on security area was proposed. This protocol protected location privacy of sink node through methods such as sending real package or fake package probabilistic from safe area to unsafe area and forming a circular sink area around the sink node. Performance evaluation was compared between this proposed dynamic routing algorithm and existing one. Network simulation results show that the routing algorithm has advantages such as low energy consumption, small network delay, and high data transmission rate, and it can also make a good balance between location privacy protection of sink node and network energy consumption.
出处 《系统仿真学报》 CAS CSCD 北大核心 2015年第12期2973-2980,共8页 Journal of System Simulation
基金 河南省科技攻关项目(112102210186) 河南省科技厅重点攻关项目(132102210246)
关键词 位置隐私保护 虚假包 安全区域 环形汇聚区域 location privacy protection fake package secure area circular sink area
  • 相关文献

参考文献14

  • 1李凤云,李沛谕,高福祥,常桂然.基于扇形区域的无线传感器网络位置隐私保护[J].东北大学学报(自然科学版),2013,34(1):21-24. 被引量:4
  • 2Adamu Murtala Zungeru,Kah Phooi Seng,Li-Minn Ang,Wai Chong Chia,Xinyong Dong.Energy Efficiency Performance Improvements for Ant-Based Routing Algorithm in Wireless Sensor Networks[J]. Journal of Sensors . 2013
  • 3Rei-Heng Cheng,Chang Wu Yu,Tung-Kuang Wu,Fang-Wei Jin.A Small-World Routing Protocol and the Effect of Pass-Over for Wireless Sensor Networks[J]. Wireless Personal Communications . 2013 (4)
  • 4Ashwin Machanavajjhala,Daniel Kifer,Johannes Gehrke,Muthuramakrishnan Venkitasubramaniam.L -diversity[J]. ACM Transactions on Knowledge Discovery from Data (TKDD) . 2007 (1)
  • 5Kiran Mehta,Donggang Liu,Matthew Wright.Location Privacy in Sensor Networks Against A Global Eavesdropper. IEEE International Conference on Network Protocols . 2007
  • 6JIAN Y,CHEN S,ZHANG Z,et al.Protecting receiver-loca-tion privacy in wireless sensor networks. INFOCOM’’07:26thIEEE International Conference on Computer Communications . 2007
  • 7Jian, Ying,Chen, Shigang,Zhang, Zhan,Zhang, Liang.A novel scheme for protecting receiver’s location privacy in wireless sensor networks. IEEE Transactions on Wireless Communications . 2008
  • 8Intanagonwiwat C,Govindan R,Estrin D.Directed diffusion: a scalable and robust communication paradigm for sensor networks. Proceedings of the 6th annual international conference on Mobile computing and networking . 2000
  • 9Han J Q,Zhao W,Zheng M.An analytical model onunbalanced energy consumption in large scale w ireless sensornetw ork. The 3rd International Conference on MeasuringTechnology and Mechatronics Automation . 2011
  • 10Wei-Yu ChiuBor-Sen ChenChang-Yi Ya.Robust Relative Location Estimation in Wireless Sensor Networks with Inexact Position Problems. IEEE Transactions on Mobile Computing . 2012

二级参考文献9

  • 1Ozturk C, Zhang Y, Trappe W. Source-location pdvacy inenergy-constrained sensor network routing [ C ]//Proceedings of the 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks. New York : ACM,2004 : 88 - 93.
  • 2Ouyang Y, Le Z, Chen G, et al. Entrapping adversaries for source protection in sensor networks [ C ]//2006 International Symposium on a World of Wireless Mobile and Multimedia Networks. Washington DC: IEEE,2006 : 23 - 34.
  • 3Li Y, Ren J. Source-location privacy through dynamic routing in wireless sensor networks [ C ]//IEEE INFOCOM 2010-- IEEE Conference on Computer Communications. San Diego: IEEE,2010:1 -9.
  • 4Lightfoot L, Li Y, Ren J. Preserving source-location privacy in wireless sensor network using STaR routing [ C]//The 53rd IEEE Global Telecommunications Conference. Miami : IEEE, 2010:1 -5.
  • 5Li N, Zhang N, Das S K, et al. Privacy preservation in wireless sensor networks: a state-of-the-art survey [ J ]. Ad Hoc Networks ,2009,7 ( 8 ) : 1501 - 1514.
  • 6Nezhad A A, Mid A, Makrakis D. Location privacy and anonymity preserving routing for wireless sensor networks [ J ]. Comptaer Networks,2008,52 ( 18 ) :3433 - 3452.
  • 7Di Pietro R, Viejo A. Location privacy and resilience in wireless sensor networks querying [J]. Computer Communications.2011.34 ( 3 ) :515 - 523.
  • 8Ouyang Y, Le Z, Liu D, et al. Source location privacy against laptop-class attacks in sensor networks [ C ]//The 4th International Conference on Security and Privacy in Communication Networks. Istanbul : ACM,2008 : 1 - 10.
  • 9Han J Q, Zhao W, Zheng M. An analytical model on unbalanced energy consumption in large scale wireless sensor network [ C ]//The 3rd International Conference on Measuring Technology and Mechatronics Automation. Shanghai: IEEE, 2011:375 - 378.

共引文献6

同被引文献2

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部