期刊文献+

无线传感器网络中的位置隐私保护 被引量:7

Location Privacy Protecting in Wireless Sensor Network
下载PDF
导出
摘要 随着无线传感器网络的广泛应用,隐私成为无线传感器网络成功使用的主要障碍。当无线传感器网络用于监控敏感对象,被监控对象的位置隐私成为一个重要问题。在传感节点发送一系列分组,通过多跳,向基站报告监控对象时,敌手能够反向追踪分组到信息源位置。基于洪泛的幻影具有消息发送时间长且能量消耗过大的缺陷。为了保护能量受限的无线传感器网络中的位置隐私,提出了定向随机步。定向随机步使敌手难于跳到跳地反向追踪信息源。在定向随机步中,信源节点发出一个分组,此分组被单播给信源节点的父节点。当中介节点收到一个分组,它以等概率的方式转发给它的一个父节点。与基于洪泛的幻影相比,定向随机步具有较小的信息发送时间和较低的能量消耗。特别在中介节点具有多个父节点的情形下,定向随机步具有较大的安全期。 As wide applications of wireless sensor networks, privacy concerns have emerged as the main obstacle to success. When wireless sensor networks are used to monitor sensitive objects, the privacy about monitored object locations becomes an important issue. When a sensor node reports a monitored object to base station by sending a series of packets through multiple hops, an adversary may trace back the sources location. Flooding-based phantom has a problem that message latencies become larger and energy costs become higher for protecting source-location privacy. In this paper, Directed Random Walk is proposed to make it difficult for an adversary to backtrack hop-by-hop to the origin of the sensor communication. In Directed Random Walk , the source sensor sends out a packet, the packet is unicasted to its parent node. When intermediate node receives a packet, it forwards to one of its parent nodes in a directed random fashion. Compared to Flooding-based phantom, Directed Random Walk has smaller message latencies and lower energy costs. Especially, Directed Random Walk has bigger safety period when intermediate node has multi-parent-nodes.
出处 《传感技术学报》 CAS CSCD 北大核心 2008年第8期1437-1441,共5页 Chinese Journal of Sensors and Actuators
基金 国家“973”计划基金资助项目(2007CB307100)
关键词 无线传感器网络 位置隐私 隐私保护 基于洪泛的幻影威胁 定向随机步 wireless sensor network location privacy privacy protecting flooding-based phantom directed random walk
  • 相关文献

参考文献7

  • 1曾志峰,邱慧敏,朱龙海.无线传感器网络中的安全威胁分析及对策[J].计算机应用研究,2007,24(1):140-143. 被引量:11
  • 2Ozturk C, Zhang Y, Trappe W, et al. Source-Location Privacy for Networks of Energy-Constrained Sensors [C]// Proceedings of 2nd IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems (WSTFEUS' 04), May 2004.
  • 3Karlof C, Wagner D. Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures [C]// Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications, pages 113-127, May 2003
  • 4Ozturk C, Zhang Y, Trappe W. Source-Location Privacy in Energy-Constrained Sensor Network Routing[C]// the 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN) in Conjunction with ACM Conference on Computer and Communications Security, Oct. 2004.
  • 5Kamat P, Zhang Y, Trappe W, et al. Enhancing Source-Location Privacy in Sensor Network Routing[C]// ICDCS' 05 Proceedings of the 25th International Conference on Distribu ted Computing Systems, 2005.
  • 6Xi Y, Sohwiebert L, Shi W. Preserving Privacy in Monitoring- Based Wireless Sensor Networks[C]//Proceedings of the 2nd International Workshop on Security in Systems and Networks (SSN'06). IEEE Computer Society, 2006.
  • 7Deng J, Han R, Mishra S, Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks[C]// first IEEE/CerateNet Conference on Security and Privacy in Communication Networks (SecureComm 2005), Athens, Greece, September 2005 : 113-124.

二级参考文献5

  • 1D W Carman,P S Kruus,B J Matt.Constraints and Approaches for Distributed Sensor Network Security[EB/OL].http://download.nai.com/products/media/nai/zip/nailabs-report-00-010-final.zip,2000-09-01.
  • 2Perring A,Szewczyk R,Tygar J D,et al.SPINS:Security Protocols for Sensor Networks[C].Rome:the 7th Annual ACM International Conference on Mobile Computing and Networks,2001.521-534.
  • 3Blom R.An Optimal Class of Symmetric Key Generation System[C].Advances in Cryptology-Eurocrypt,Springer LNCS 209,1984.335-338.
  • 4Priit Caru.Practical Comparison of Fast Public-Key Cryptosystems[EB/OL].http://www.tml.hut.fi/Opinnot/Tik-110.501/2000/papers/loikkanen-kahc.pdf,2000-07.
  • 5Colleen Marie O'Rourke.Efficient NTRU Implementation[EB/OL].http://www.emsec.ee.ucla.edu/pdf/corourke.pdf,2002-04.

共引文献10

同被引文献57

  • 1朱炜玲,喻建平.物联网移动RFID系统隐私保护方案[J].系统工程理论与实践,2011,31(S2):119-123. 被引量:5
  • 2罗曼.论图书馆用户的隐私保护[J].大学图书馆学报,2005,23(1):63-65. 被引量:47
  • 3马朝斌,贾晋康,张立军.Ad hoc网络中广播风暴的抑制方案[J].中国数据通信,2005,7(3):35-39. 被引量:6
  • 4裴庆祺,沈玉龙,马建峰.无线传感器网络安全技术综述[J].通信学报,2007,28(8):113-122. 被引量:93
  • 5Kamat P,Zhang Y,Trappe W, et al. Enhancing source-location privacy in sensor net routing[ C ]//Proccedings of the 25th In- ternational Cofference on Distributed Computing Systems(ICDCS). Ohio,2005:599-608.
  • 6Silvija Kokalj-Filipovic, Fabrice Le Fessant, Predrag Spasojevic. Trade-offs of source location protection in globally attacked sensor networks:a case analysis[ C ]//2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks. Salt Lake City,2011:323-331.
  • 7Ozturk C,Zhang Y, Trappe W. Source-location privacy in energy constrained sensor networks routing[ C ]//Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks(SASN). Washing DC ,2004:88-93.
  • 8Wang W P,Chen L,Wang J X. A source-location privacy protocol in WSN based on locational angle[ C]//Proceedings of the IEEE Intenational Conference on Communications(ICC). Beijing,2008:1 630-1 634.
  • 9Edith C H Ngai, loana Rodhe. On providing location privacy for mobile sinks in wireless sensor networks [ J ]. Wireless Networks,2013,19 ( 1 ) : 115-130.
  • 10Yao Lin, Kang Lin, Deng Fangyu, et al. Protecting source-location privacy based on muhirings in wireless sensor networks [ EB/OL] . [ 2013-06-21 ] DOI : 10. lO02/cpe. 3075.

引证文献7

二级引证文献29

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部