期刊文献+

一种基于随机步的WSN源位置隐私保护策略 被引量:1

Using Random Walk to Protect Source-location Privacy in Wireless Sensor Networks
下载PDF
导出
摘要 源位置隐私保护问题已经成为制约无线传感器网络大规模应用的一个关键问题。为更好的保护源位置隐私,该文提出了一种无重复有向随机步路由策略。在无重复有向随机步路由策略中,引入了无重复的策略,数据包以无重复有向随机步的方式转发到汇聚节点。仿真结果显示所提路由能提供很好的安全时间,有效的保护源位置隐私。最后,提出了需要进一步研究的问题。 One of the looming challenges that threaten the successful deployment of wireless sensor networks is source-location privacy.In order to enhance source location privacy in sensor networks,this paper proposes a new scheme called NDRW.In NDRW,a non-repetitive strategy is introduced,and packets are forwarded to the sink node through non-repetitive directed random walk.Simulation results show that NDRW can increase the safety period and provide a strong source-location privacy protection.Finally,some problems needed to study further are pointed out.
出处 《杭州电子科技大学学报(自然科学版)》 2012年第5期53-56,共4页 Journal of Hangzhou Dianzi University:Natural Sciences
基金 浙江省自然科学基金资助项目(Y1100818) 国家保密局保密科研资助项目(XXXX)
关键词 无线传感器网络 源位置隐私 无重复有向随机步 wireless sensor networks source-location privacy NDRW
  • 相关文献

参考文献6

  • 1Min Shao, Yi Yang, Sencun Zhu, et al. Towards Statistically Strong Source Anonymity for Sensor Networks [ C ]. Phoe- nix: The 27th Conference on Computer Communications ,2008:51 -55.
  • 2吴博,胡小龙.WSN中基于假路径的源位置保护策略[J].计算机工程与应用,2008,44(16):114-117. 被引量:4
  • 3Ozturk C, Zhang Y, Trappe W. Source-location privacy in energy-constrained sensor network routing[ C ]. Washington: Proceedings of the 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks,2004:68 -72.
  • 4Kamat P, Yanyong Z, Trappe W. Enhancing Source-Location Privacy in Sensor Network Routing. Distributed Computing Systems [ C ]. Ohio : 25th IEEE International Conference on ,2005 : 599 - 608.
  • 5Yong X, Schwiebert L, Weisong S. Preserving source location privacy in monitoring-based wireless sensor networks [ C ]. Rhodes Island: 20th International Parallel and Distributed Processing Symposium,2006:l 1 -18.
  • 6陈娟,方滨兴,殷丽华,苏申.传感器网络中基于源节点有限洪泛的源位置隐私保护协议[J].计算机学报,2010,33(9):1736-1747. 被引量:53

二级参考文献27

  • 1崔莉,鞠海玲,苗勇,李天璞,刘巍,赵泽.无线传感器网络研究进展[J].计算机研究与发展,2005,42(1):163-174. 被引量:730
  • 2Deng Jing, Hanan R, Mishra S.Countermeasures againsttraffic analysis attacks in wireless sensor networks[C]//First International Conference on Security and Privacy for Emerging Areas in Communications Network, IEEE, Athens, Greece, 2005 : 113-126.
  • 3Braginsky D,Estrin D.Rumor routing algorithm for sensor net2 works[C]//Proc of First Workshop on Sensor Networks and Applications, Atlanta,2002: 22-31.
  • 4Xi Yong,Schwiebfrt L,Shi Wei-song.Preserving source location privacy in monitoring-based wireless sensor networks[C]//Proceedings of 20th International Parallel and Distributed Processing Symposium.IEEE, Piscataway, N J, USA, 2006
  • 5Trappe W, Washington L C.Introduction to cryptography with coding theory[M].[S.l.]:Prentice Hall,2002.
  • 6Kamat P,Zhang Yang,Trappe W,et al.Enhancing source-location privacy in sensor network routing[C]//ICDCS'05:Proceedings of the 25th International Conference on Distributed Computing Systems, 2005:599-608.
  • 7Yi Ou-yang,Le Zheng-yi,Chen Guan-ling,et al.Entrapping adversaries for source protection in sensor networks[C]//Proceedings of the 2006 International Symposium on World of Wireless,Mobile and Multimedia Networks,IEEE,NW W.ashington,2006:23-34.
  • 8Shao M,Zhu S,Zhang W,Cao G.pDCS:Security and privacy support for data-centric sensor networks//Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM).Alaska,USA,2007:1298-1306.
  • 9Joseph M,Choudhury R R.Hiding stars with fireworks location privacy through camouflage//Proceedings of the ACM Special Interest Group on Mobility of Systems,Users,Data and Computing (SIGMOBILE).Beijing,China,2009:345-356.
  • 10Hoh B,Gruteser M,Xiong H,Alrabady A.Enhancing security and privacy in traffic-monitoring systems.IEEE Pervasive Computing,2006,5(4):38-46.

共引文献54

同被引文献14

  • 1Deng J, Han R, Mishra S. Countermeasures against traffic a- nalysis attacks in wireless sensor networks [ C ]//Proc of first international conference on security and privacy for emerging areas in communication networks. [ s. 1. ] : IEEE, 2005 : 113 - 126.
  • 2郑文先.无线传感器网络位置隐私路由研究[D].成都:电子科技大学,2012.
  • 3郭娜.一种基于匿名的位置隐私保护方法的研究[D].哈尔滨:哈尔滨工程大学,2012.
  • 4Dutta N, Saxena A, Chellappan S. Defending wireless sensors networks against adversarial location [ C ]//Proc of 11 th inter- national conference on mobile data management. Kansas City, MO, USA : IEEE ,2010:336-341.
  • 5Khoshgozaran A, Shahabi C, Shiran- Mehr H. Location priva- cy:going beyond k-anonymity, cloaking and anonymizers [ J ]. Knowledge and Information Systems, 2011,26 ( 3 ) :435-465.
  • 6Bicakci K, Bagci I E, Tavli B. Life bounds of wireless sensor networks preserving perfect sink unobservability [ J ]. IEEE Communications Letters ,2011,15 ( 2 ) :205-207.
  • 7Luo Xi, Ji Xu, Park Myong- Soon. Location privacy against traffic analysis attacks in wireless sensor networks [ C ]//Proc of international conference on information science and applica- tions. Seoul : IEEE ,2010 : 1-6.
  • 8Perfig A, Szewczyk R, Tygar J D, et al. SPINS : security proto- cols for sensor networks[ J]. Wireless Networks,2009,8 (5) : 521-534.
  • 9Jian Ying, Chen Shigang, Zhang Zhan, et al. A novel scheme for protecting receiver' s location privacy in wireless sensor networks [ J]. IEEE Transactions on Wireless Communica- tions,2008,7(10) :3769-3779.
  • 10华晔,张涛,王玉斐,黄秀丽.电力物联网下无线传感器网络位置隐私保护方法研究[J].计算机与数字工程,2012,40(10):91-94. 被引量:3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部