期刊文献+

基于门限路由的源节点位置隐私保护协议 被引量:2

Threshold Routing for Source-Location Privacy Protection in Wireless Sensor Networks
下载PDF
导出
摘要 近年来,随着无线传感器网络在军事和医疗等领域的应用越来越多,无线传感器网络的隐私保护研究受到了人们的广泛关注.本文提出了一种门限路由的源节点位置隐私保护协议(Threshold Routing for Source-Location Privacy Protection,TR),与已存在的源位置隐私保护协议不同,该协议可以提供更高效的隐私保护能力和有效地降低能量的消耗.应用NS2进行模拟仿真实验,结果表明与其他的隐私保护协议相比,门限路由协议在能耗和隐私保护方面具有更好的性能. In recent years,along with the wireless sensor network have more and more widely been applied in the field of military and medical treatment field and so on,the wireless sensor network privacy protection and research get more the public attention. We proposed a protocol of Threshold Routing for Source-Location Privacy Protection in Wireless Sensor Networks( here in after referred to as TR) . Different from the past agreement of source-location privacy preservation,the protocol which we propose can ensure the privacy of source node cases,and effectively reduce energy consumption. We do the simulation experiments based on NS2. The results show that Threshold Routing in this paper has more efficient safety protection ability and less energy consumption.
出处 《南京师大学报(自然科学版)》 CAS CSCD 北大核心 2014年第1期117-122,共6页 Journal of Nanjing Normal University(Natural Science Edition)
关键词 无线传感器网络 隐私保护 源位置 门限路由 wireless sensor network privacy preservation source location threshold routing
  • 相关文献

参考文献10

  • 1范永健,陈红,张晓莹.无线传感器网络数据隐私保护技术[J].计算机学报,2012,35(6):1131-1146. 被引量:64
  • 2Kamat P,Zhang Y,Trappe W, et al. Enhancing source-location privacy in sensor net routing[ C ]//Proccedings of the 25th In- ternational Cofference on Distributed Computing Systems(ICDCS). Ohio,2005:599-608.
  • 3Silvija Kokalj-Filipovic, Fabrice Le Fessant, Predrag Spasojevic. Trade-offs of source location protection in globally attacked sensor networks:a case analysis[ C ]//2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks. Salt Lake City,2011:323-331.
  • 4Ozturk C,Zhang Y, Trappe W. Source-location privacy in energy constrained sensor networks routing[ C ]//Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks(SASN). Washing DC ,2004:88-93.
  • 5姚剑波,郝晓青,文光俊.无线传感器网络中的位置隐私保护[J].传感技术学报,2008,21(8):1437-1441. 被引量:7
  • 6Wang W P,Chen L,Wang J X. A source-location privacy protocol in WSN based on locational angle[ C]//Proceedings of the IEEE Intenational Conference on Communications(ICC). Beijing,2008:1 630-1 634.
  • 7陈娟,方滨兴,殷丽华,苏申.传感器网络中基于源节点有限洪泛的源位置隐私保护协议[J].计算机学报,2010,33(9):1736-1747. 被引量:53
  • 8Edith C H Ngai, loana Rodhe. On providing location privacy for mobile sinks in wireless sensor networks [ J ]. Wireless Networks,2013,19 ( 1 ) : 115-130.
  • 9Yao Lin, Kang Lin, Deng Fangyu, et al. Protecting source-location privacy based on muhirings in wireless sensor networks [ EB/OL] . [ 2013-06-21 ] DOI : 10. lO02/cpe. 3075.
  • 10马朝斌,贾晋康,张立军.Ad hoc网络中广播风暴的抑制方案[J].中国数据通信,2005,7(3):35-39. 被引量:6

二级参考文献34

  • 1曾志峰,邱慧敏,朱龙海.无线传感器网络中的安全威胁分析及对策[J].计算机应用研究,2007,24(1):140-143. 被引量:11
  • 2Shao M,Zhu S,Zhang W,Cao G.pDCS:Security and privacy support for data-centric sensor networks//Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM).Alaska,USA,2007:1298-1306.
  • 3Joseph M,Choudhury R R.Hiding stars with fireworks location privacy through camouflage//Proceedings of the ACM Special Interest Group on Mobility of Systems,Users,Data and Computing (SIGMOBILE).Beijing,China,2009:345-356.
  • 4Hoh B,Gruteser M,Xiong H,Alrabady A.Enhancing security and privacy in traffic-monitoring systems.IEEE Pervasive Computing,2006,5(4):38-46.
  • 5Chen X Q,Makki K,Yen K.Sensor network security:A survey.IEEE Communications Surveys & Tutorials,2009,11(2):52-73.
  • 6Ozturk C,Zhang Y,Trappe W.Source-location privacy in energy constrained sensor networks routing//Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Net-works (SASN).Washington DC,USA,2004:88-93.
  • 7Kamat P,Zhang Y,Trappe W,Ozturk C.Enhancing source-location privacy in sensor network routing//Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS).Ohio,USA,2005:599-608.
  • 8Wang W P,Chen L,Wang J X.A source-location privacy protocol in WSN based on locational angle//Proceedings of the IEEE International Conference on Communications (ICC).Beijing,China,2008:1630-1634.
  • 9Kang L.Protecting location privacy in large-scale wireless sensor networks//Proceedings of the IEEE International Conference on Communications (ICC).Dresden,Germany,2009.
  • 10Mehta K,Liu D,Wright M.Location privacy in sensor networks against a global eavesdropper//Proceedings of the IEEE International Conference on Network Protocols (ICNP).Beijing,China,2007:314-323.

共引文献116

同被引文献24

  • 1洪锋,褚红伟,金宗科,单体江,郭忠文.无线传感器网络应用系统最新进展综述[J].计算机研究与发展,2010,47(S2):81-87. 被引量:76
  • 2Rios R, Lopez J. Analysis of location privacy solutions in wireless sensor networks[J] . Journal of IET Communications, 2011, 5(17):18-32.
  • 3Ozturk C, Zhang Yanyong, Trappe W. Source-location privacy in energy-constrained sensor network routing[C] //Proc of the 2nd ACM Workshop on Security of Ad hoc and Sensor Networks. New York:ACM Press. 2004:88-93.
  • 4Kang Lai. Protecting location privacy in large-scale wireless sensor networks[C] //Proc of IEEE International Conference on Communications. 2009:1-6.
  • 5Mehta K, Liu Donggang, Wright M. Location privacy in sensor networks against a global eavesdropper[C] //Proc of IEEE International Conference on Network Protocols. 2007:314-323.
  • 6Kamat P, Zhang Yanyong, Trappe W, et al. Enhancing source-location privacy in sensor network routing[C] //Proc of the 25th IEEE International Conference on Distributed Computing Systems. [S. l.] :IEEE Press, 2005:599-608.
  • 7Pongaliur K, Xiao Li. Maintaining source privacy under eavesdropping and node compromise attacks[C] //Proc of IEEE INFOCOM. [S. l.] :IEEE Press, 2011:1656-1664.
  • 8Bicakci K, Gultekin H, Tavli B. Maximizing lifetime of event-unobservable wireless sensor networks[J] . Computer Standards & Interfaces, 2011, 33(4):401-410.
  • 9Liu Anfeng, Zhang Penghui, Chen Zhigang. Theoretical analysis of the lifetime and energy hole in cluster based wireless sensor networks[J] . Journal of Parallel and Distributed Computing, 2011, 71(10):1327-1355.
  • 10Song J H,Wong V W S, Leung V C M. Wireless Location PrivacyProtection in Vehicular Ad-Hoc Networks[J]. Mobile Networks &Applications, 2010,15( 1): 1-6.

引证文献2

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部