期刊文献+

基于最小能耗路由的源节点位置隐私保护协议 被引量:11

Source-Location Privacy Protocol Based on the Minimum Cost Routing
下载PDF
导出
摘要 源节点的位置隐私保护已经是制约着无线传感器网络推广的关键技术之一。同时,能源问题又是一个很大的约束,所以人们一直致力于在位置隐私保护和能量消耗之间寻找一个平衡点。本文一种基于最小能耗路由的源节点位置隐私保护协议,协议分为两个阶段:第1阶段,源节点通过定向随机步的方式以额定能耗快速地向幻影节点转发数据;第2阶段,幻影节点以避开源节点可视区的最小能耗路由向Sink转发数据。实验表明,提出的路由协议以较小的能耗达到了较高的隐私保护要求。 Source-location privacy protection is already one of the key technologies which restrict the promotion of wireless sensor network ( WSN ) . At the same time, the energy issue is also a big constraint, so we have been committed to find a balance between privacy protection and energy consumption. In the paper,we proposed a source-location privacy protocol based on the minimum cost routing( LPBMR) . The protocol is divided into two parts:In the first phase,The data is sent to the phantom node with directional random walk at a certain energy consumption;In the second phase,the phantom node send the data to the Sink along with the minimum energy routing which can avoid the visual of the source node. The results of the simulation showed that LPBMR can achieve a good privacy protection with less energy consumption.
出处 《传感技术学报》 CAS CSCD 北大核心 2014年第3期394-400,共7页 Chinese Journal of Sensors and Actuators
基金 国家自然科学基金项目(61073197) 江苏省科技支撑计划项目(SBE201077457)
关键词 无线传感器网络 隐私保护 源位置 最小能耗路由 wireless sensor network privacy preservation source-location the minimum cost routing
  • 相关文献

参考文献12

  • 1潘巨龙,李善平,张道远.无线医疗传感器网络中基于Feistel加密算法研究[J].传感技术学报,2010,23(7):1030-1036. 被引量:8
  • 2Ye F,Chen A,Lu S,et al.A Sealable Solution to Minimum Cost Forwarding in Large Sensdor Networls [C]//Co,puter Communieations and Networks,2001.Proceedings.Tenth International Confernce on .IEEE,2001:304-309.
  • 3Ozturk C, Zhang Y,Trappe W. Souree-Location Orivacy in Erergy Constrained Sensor Networks Routing [ C ]//Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks ( SASN ). Washing DC, USA,2004:88-93.
  • 4Kokalj-Filipovic S, Le Fessant F.Spasojevic P. Trade-offs of Source Locaton Protection in Globally Attacked Sensor Networks: A Case Analysis[ C ]//Proceedings of the Sensor, Mesh and Ad Hoc Communicatons and NetworksSECON) ,2011 81h Annual IEEE Communications Society Conference,27-30 June 2011:323-331.
  • 5Kamat P,Zhang Y,Trappe W,et al.Enhancing Source-Location Privacy in Sensor Net Routing[C]//Proceedings of the 25th Internatjonal Conference on Distributed Computing Systems(ICDCS), Ohio,USA ,2005:599-608.
  • 6姚剑波,郝晓青,文光俊.无线传感器网络中的位置隐私保护[J].传感技术学报,2008,21(8):1437-1441. 被引量:7
  • 7Wang W P,Chen L,Wang J X.A Source-Location Privacy Protocaol in WSN Based on Locational Angle //Proceedings. of the IEEE International Sngle[C]//Procedddings of the IEEE International Conference on Vommunications(ICC),Beijing, China,,2008 : 1630-1634.
  • 8陈娟,方滨兴,殷丽华,苏申.传感器网络中基于源节点有限洪泛的源位置隐私保护协议[J].计算机学报,2010,33(9):1736-1747. 被引量:53
  • 9Lu Zongqing,Wen Yonggang.Credit Routing for Source-Location Privacy Protectio in Wireless Sensor Networks[C]//Mobile Adhoc and Sensor Systems(MASS),2012 IEEE 9th International Conference on.8-11 Oct.2012:164-172.
  • 10Yun L,Lightfoot L,JIAN R.Routing -Based Source-Location Privacy Protection in Wireless Sensor Networks[C]//Proceddings of the Electro/Information Technology,2009 IEEE International Confernce,2009:29-34.

二级参考文献33

  • 1赵泽,崔莉.一种基于无线传感器网络的远程医疗监护系统[J].信息与控制,2006,35(2):265-269. 被引量:73
  • 2覃伯平,周贤伟,杨军,李晓勤.基于无线传感器网络路由协议的安全机制研究[J].传感技术学报,2006,19(4):1276-1278. 被引量:15
  • 3曾志峰,邱慧敏,朱龙海.无线传感器网络中的安全威胁分析及对策[J].计算机应用研究,2007,24(1):140-143. 被引量:11
  • 4吴水才,李浩敏,白燕萍,杜芳芳.生理多参数远程实时监护系统的设计[J].仪器仪表学报,2007,28(6):1035-1039. 被引量:16
  • 5Shao M,Zhu S,Zhang W,Cao G.pDCS:Security and privacy support for data-centric sensor networks//Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM).Alaska,USA,2007:1298-1306.
  • 6Joseph M,Choudhury R R.Hiding stars with fireworks location privacy through camouflage//Proceedings of the ACM Special Interest Group on Mobility of Systems,Users,Data and Computing (SIGMOBILE).Beijing,China,2009:345-356.
  • 7Hoh B,Gruteser M,Xiong H,Alrabady A.Enhancing security and privacy in traffic-monitoring systems.IEEE Pervasive Computing,2006,5(4):38-46.
  • 8Chen X Q,Makki K,Yen K.Sensor network security:A survey.IEEE Communications Surveys & Tutorials,2009,11(2):52-73.
  • 9Ozturk C,Zhang Y,Trappe W.Source-location privacy in energy constrained sensor networks routing//Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Net-works (SASN).Washington DC,USA,2004:88-93.
  • 10Kamat P,Zhang Y,Trappe W,Ozturk C.Enhancing source-location privacy in sensor network routing//Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS).Ohio,USA,2005:599-608.

共引文献60

同被引文献54

  • 1裴庆祺,沈玉龙,马建峰.无线传感器网络安全技术综述[J].通信学报,2007,28(8):113-122. 被引量:94
  • 2GAIKWAD S M, DHAMDHERE V. A Review of PrivacyPreserving Techniques in Wireless Sensor Network [ J ].Network and Complex Systems,2014,4(3) :1-6.
  • 3MANJULA R, DATTA R. An energy-efficient routingtechnique for privacy preservation of assets monitored withWSN [ C ]//Students ’ Technology Symposium ( Tech-Sym) . Jodhpur, India: IEEE, 2014 : 325-330.
  • 4TAO Z, LIU Y,LI C. Strategy of source-location privacypreservation in WSNs based on phantom single-path rou-ting[ J ]. Journal of Chongqing University of Posts andTelecommunications : Natural Science Edition, 2013 , 25(2): 178-183.
  • 5LI Y,REN J. Source-location privacy through dynamic rou-ting in wireless sensor networks [ C J//INFOCOM, 2010Proceedings IEEE. San Diego, CA, US : IEEE ,2010 : 1-9.
  • 6HUANG J, MEISONG S. A Source-location Privacy Pro-tection Strategy via Pseudo Normal Distribution-basedPhantom Routing in WSNs[ C] // Proceedings of the 30thAnnual ACM Symposium on Applied Computing.Salamanca, Spain; ACM, 2015: 688-694.
  • 7KAMAT P,ZHANG Y,TRAPPE W, et al. Enhancingsource-location privacy in sensor network routing [C]//Distributed Computing Systems, 2005. ICDCS 2005.Proceedings. 25th IEEE International Conference on.Ohio, USA: IEEE, 2005: 599-608.
  • 8YAO J. Source-Location Privacy Based on DirectedGreedy Walk in Wireless Sensor Networks[ C] //WirelessCommunications Networking and Mobile Computing(WiCOM ),2010 6th International Conference on.Chengdu, China: IEEE, 2010: 14.
  • 9RIOS R, LOPEZ J. Analysis of location privacy solutionsin wireless sensor networks [ J]. Communications,IET,2011,5(17) : 2518-2532.
  • 10LI Y, REN J, WU J. Quantitative measurement and de-sign of source-location privacy schemes for wireless sensornetworks [ J ]. Parallel and Distributed Systems,IEEETransactions on, 2012, 23(7) : 1302-1311.

引证文献11

二级引证文献28

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部