期刊文献+

无线传感器网络的位置隐私保护路由 被引量:7

Location privacy protection routing for wireless sensor network
下载PDF
导出
摘要 当无线传感器网络用于监控敏感对象时,被监控对象的位置隐私成为一个关键问题。在传感节点发送的一连串信息,经过多跳,向基站报告一个监控对象时,敌手可以反向追踪信息源的位置。基于洪泛的幻影路由具有较小的安全期和较高的能耗。为了使敌手难于跳到跳地反向追踪传感节点通信的信号源,提出了基于定向随机步的幻影路由。在基于定向随机步的幻影路由中,每个消息都经历两个阶段:首先与基于洪泛的幻影路由一样,是一个随机步或定向步,随后是定向随机步直到基站。与基于洪泛的幻影路由相比,基于定向随机步的幻影路由明显具有较大的安全期和较低的能耗。 When Wireless Sensor Network (WSN) is used to monitor sensitive objects, the location privacy of monitored objects becomes a key issue, When a sensor node reports a monitored object to base station by sending a series of messages through multiple hops, an adversary may trace back the source location. Flooding-based phantom routing has a problem that safety period becomes smaller and energy costs become higher for protecting source-location privacy. In this paper, directedrandom-walk-based phantom routing was proposed to make it difficult for an adversary to backtrack hop-by-hop to the origin of the sensor communication. In directed-random-walk-based phantom routing, every message experiences two phases: the first, the same as flooding-based phantom, is a random walk or directed walk, and a subsequent directed-random-walk to deliver the message to the base station. Compared to flooding-based phantom, directed-random-walk-based phantom routing has clearly larger safety period and lower energy costs.
出处 《计算机应用》 CSCD 北大核心 2008年第6期1379-1381,共3页 journal of Computer Applications
基金 国家973规划项目(2007CB307100)
关键词 无线传感器网络 隐私保护 幻影洪泛 定向随机步 Wireless Sensor Network (WSN) privacy protection phantom flooding directed random walk
  • 相关文献

参考文献6

  • 1OZTURK C, ZHANG Y, TRAPPE W, et al. Source-location privacy for networks of energy-constrained sensor [C]// Proceedings of 2nd IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems (WSTFEUS'04). Washington: IEEE Press, 2004:68-72.
  • 2CHAN H, PERRIG A. Security and privacy in sensor networks [ J]. IEEE Computer Magazine, 2003, 36(10) : 103 - 105.
  • 3PERRIG A, STANKOVIC J, WAGNER D. Security in wireless sensor networks [ J]. Communications of the ACM, 2004, 47(6) : 53 - 57.
  • 4XI YONG, SCHWIEBERT L, SHI WEI-SONG. Preserving source location privacy in monitoring-based wireless sensor networks [C]// Proceedings of the 2nd International Workshop on Security in Systems and Networks (SSN'06). Washington: IEEE Computer Society, 2006:425-432.
  • 5OZTURK C, ZHANG Y, TRAPPE W. Source-location privacy in energy-constrained sensor network routing [ C]//Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN). New York: ACM Press, 2004:88 -93.
  • 6KAMAT P, ZHANG Y, TRAPPE W, et al. Enhancing source-location privacy in sensor network routing [ C]//Proceedings of the 25th International Conference on Distributed Computing Systems ( ICDCS 2005). Washington: IEEE Computer Society, 2005:599-608.

同被引文献98

  • 1郑强,王晓东.无线传感器网络安全研究[J].微计算机信息,2008(1):116-117. 被引量:13
  • 2朱炜玲,喻建平.物联网移动RFID系统隐私保护方案[J].系统工程理论与实践,2011,31(S2):119-123. 被引量:5
  • 3罗曼.论图书馆用户的隐私保护[J].大学图书馆学报,2005,23(1):63-65. 被引量:47
  • 4周贤伟,申吉红,覃伯平.无线传感器网络的威胁模型与安全机制研究[J].计算机应用研究,2006,23(12):143-146. 被引量:2
  • 5Ozturk C, Zhang Y, Trappe W, et al. Source-location privacy for networks of energy-constrained sensors [ C ]//Proceedings of 2nd IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems(WSTFEUSI)4) ,2004:68 -72.
  • 6Chan H, Perrig A. Security and privacy in sensor networks [ J ]. IEEE Computer Magazine,2003,36(10) :103 -105.
  • 7Perrig A, Stankovic J, Wagner D. Security in wireless sensor networks[ J ]. Commun ACM ,2004,47 (6) :53 -57.
  • 8Gruteser M, Schell G, Jain A, et al. Privacy-aware location sensor networks[ C]//9th USENIX Workshop on Hot Topics in Operating Systems(HotOS) ,2003.
  • 9Deng J, Han R, Mishra S. Countermeasures against traffic analysis attacks in wireless sensor networks [C]//Proc of CerateNet Conference on Security and Privacy in Communication Networks( SecureComm) ,2005.
  • 10Jian Y, Chen S. Protecting receiver-location privacy in wireless sensor networks[ C ]//IEEE INFOCOM,2007.

引证文献7

二级引证文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部