期刊文献+

基于多跳LEACH防御流量分析攻击算法研究

Research on Defense Traffic Analysis Attacks Algorithm Based on Multi-hop LEACH
下载PDF
导出
摘要 针对流量分析中三类常见攻击方式,即速率监控攻击、时间相关性攻击与ID分析攻击,对多跳LEACH无线传感器网络构成的威胁,提出了基于多跳LEACH路由协议的分布式位置隐私算法(Distributed Location Privacy Algorithm,DLPA)与匿名通信算法(Pseudonyms Communication Algorithm,PCA)。DLPA将"路径多样化"与"伪装包注入"相融合,PCA通过动态产生的假名片隐藏所有参与通信节点的真实ID。仿真结果表明,该算法实现了数据包传输路径的多样化,隐藏了节点ID与网络流量模式,能够抵御流量分析攻击,保护基站位置隐私。 In view of the threat of three common traffic analysis attacks, rate monitoring attacks, time correlation attacks and ID analysis attacks,to the multi-hop LEACH WSN,propose a Distributed Location Privacy Algorithm (DLPA) and an Pseudo- nyms Communication Algorithm (PCA) ,which are based on multi-hop LEACH routing protocol. DLPA manages to combine routing path diversity with fake packet injection while PCA is to hide identities of all nodes that participate in packets transmis- sion by generating pseudonyms dynamically. Simulation results show that this algorithm realizes the diversity of data packet transmission path,concealing the true network traffic pattern,which can resist the traffic analysis attacks,protect the location privacy of base station.
机构地区 陆军军官学院
出处 《计算机技术与发展》 2014年第9期154-158,共5页 Computer Technology and Development
基金 国家自然科学基金资助项目(61170252)
关键词 流量分析攻击 位置隐私 假名片 多跳LEACH路由协议 无线传感器网络 traffic analysis attacks location privacy pseudonyms multi-hop LEACH wireless sensor network
  • 相关文献

参考文献15

  • 1Deng J, Han R, Mishra S. Countermeasures against traffic a- nalysis attacks in wireless sensor networks [ C ]//Proc of first international conference on security and privacy for emerging areas in communication networks. [ s. 1. ] : IEEE, 2005 : 113 - 126.
  • 2郑文先.无线传感器网络位置隐私路由研究[D].成都:电子科技大学,2012.
  • 3郭娜.一种基于匿名的位置隐私保护方法的研究[D].哈尔滨:哈尔滨工程大学,2012.
  • 4武朋辉,杨百龙,毛晶,林百露.一种WSN位置隐私保护方案分析和改进[J].计算机应用与软件,2013,30(2):312-314. 被引量:3
  • 5陶振林,刘宴兵,李昌玺.WSNs中基于幻影单径路由的源位置隐私保护策略[J].重庆邮电大学学报(自然科学版),2013,25(2):178-183. 被引量:7
  • 6李凤云,李沛谕,高福祥,常桂然.基于扇形区域的无线传感器网络位置隐私保护[J].东北大学学报(自然科学版),2013,34(1):21-24. 被引量:4
  • 7Dutta N, Saxena A, Chellappan S. Defending wireless sensors networks against adversarial location [ C ]//Proc of 11 th inter- national conference on mobile data management. Kansas City, MO, USA : IEEE ,2010:336-341.
  • 8Khoshgozaran A, Shahabi C, Shiran- Mehr H. Location priva- cy:going beyond k-anonymity, cloaking and anonymizers [ J ]. Knowledge and Information Systems, 2011,26 ( 3 ) :435-465.
  • 9Bicakci K, Bagci I E, Tavli B. Life bounds of wireless sensor networks preserving perfect sink unobservability [ J ]. IEEE Communications Letters ,2011,15 ( 2 ) :205-207.
  • 10吴婷婷,李玲娟.面向RFID的位置隐私保护算法研究[J].计算机技术与发展,2013,23(1):157-160. 被引量:5

二级参考文献45

  • 1杨勇,方勇,周安民.秘密同态技术研究及其算法实现[J].计算机工程,2005,31(2):157-159. 被引量:18
  • 2潘晓,肖珍,孟小峰.位置隐私研究综述[J].计算机科学与探索,2007,1(3):268-281. 被引量:65
  • 3刘新,吴秋峰.无线个域网技术及相关协议[J].计算机工程,2006,32(22):102-103. 被引量:13
  • 4王利明,徐明,杨立新.人格权法新论[M].长春:吉林人民出版社,1994.
  • 5刘敏钰,吴泳,伍卫国.无线传感网络WSN研究研究[J].吉林电力,2010,38(2):20-23.
  • 6Y. Xi, L Schwiebert, W. S. Shi, Preserving source location privacy in monitoring-based wireless sensor networks, in: Pro- ceedings of the20th International Parallel and Distributed Pro- cessing Symposium (IPDPS 2006), April 2006.
  • 7Na Li, Nan Zhang, Sajal K. Das, Bhavani Thuraisingham, Pri- vacy preservation in wireless sensor networks: A state-of-th art survey,Ad Hoc Networks,2009(7) :1501-1514.
  • 8Y. Jian, S. G. Chen, Z. Zhang, L. Zhang, Protecting reeeive location privacy in wireless sensor networks, in: Proceedings of the 26th IEEE International Conference on Computer Com- munications (INFOCOM2007), May 2007 : 1955-1963.
  • 9J. Deng, R. Han, S. Mishra, Decorrelating wireless sensor net- work traffic to inhibit traffic analysis attacks, Pervasive and Mobile Computing Elsevier, 2006,2(2) : 159-186.
  • 10Min Shao, Yi Yang, Sencun Zhu, et al. Towards Statistically Strong Source Anonymity for Sensor Networks [ C ]. Phoe- nix: The 27th Conference on Computer Communications ,2008:51 -55.

共引文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部