期刊文献+

ONSA:传感网中基于优化非均匀统计特性的源匿名协议 被引量:1

ONSA: optimal non-uniformly statistic-source anonymity protocol in WSN
下载PDF
导出
摘要 针对无线传感网中分级信源位置隐私保护协议的特点,对不同尺寸簇及虚假信息注入统计特性在隐私性、延时和网络负载等方面进行了分析,在此基础上提出了基于优化非均匀统计特性的源匿名协议(ONSA),以优化非均匀分簇策略及相应符合非均匀统计特性的分级优化虚假信息注入方式来高效地保护信源节点位置隐私。仿真实验结果表明,与现有方法相比,ONSA能有效减少并均衡网络能量消耗,同时满足源位置隐私保护任务的实时性要求。 According to the characteristics of hierarchical event source-location privacy(SLP) in wireless sensor networks(WSN). Firstly, the effect of the cluster size and the statistical property of fake packet injection on the privacy, latency and network traffic were analyzed. Then, an optimal non-uniformly statistic-source anonymity protocol(ONSA)was proposed to achieve source anonymity and reduce the network traffic. ONSA is designed to achieve a tradeoff between network traffic and real event report latency through adjusting the transmission rate and the radius of non-uniform clusters. The simulation results demonstrate that ONSA significantly reduces the network traffic while providing source anonymity and meeting the system requirement of the delay.
出处 《通信学报》 EI CSCD 北大核心 2015年第6期66-77,共12页 Journal on Communications
基金 国家重点基础研究发展计划("973"计划)基金资助项目(2011CB707106) 国家高技术研究发展计划("863"计划)基金资助项目(2013AA122301) 国家自然科学基金资助项目(41127901-06 61373169) 长江学者和创新团队发展基金资助项目(IRT1278) 湖北省自然科学基金资助项目(2014CFB191)~~
关键词 无线传感网 源位置隐私保护 虚假数据分组注入 非均匀统计特征 全局攻击 wireless sensor networks source location privacy protection fake packet injection non-uniformly statistic global attacker
  • 相关文献

参考文献1

二级参考文献20

  • 1Shao M,Zhu S,Zhang W,Cao G.pDCS:Security and privacy support for data-centric sensor networks//Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM).Alaska,USA,2007:1298-1306.
  • 2Joseph M,Choudhury R R.Hiding stars with fireworks location privacy through camouflage//Proceedings of the ACM Special Interest Group on Mobility of Systems,Users,Data and Computing (SIGMOBILE).Beijing,China,2009:345-356.
  • 3Hoh B,Gruteser M,Xiong H,Alrabady A.Enhancing security and privacy in traffic-monitoring systems.IEEE Pervasive Computing,2006,5(4):38-46.
  • 4Chen X Q,Makki K,Yen K.Sensor network security:A survey.IEEE Communications Surveys & Tutorials,2009,11(2):52-73.
  • 5Ozturk C,Zhang Y,Trappe W.Source-location privacy in energy constrained sensor networks routing//Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Net-works (SASN).Washington DC,USA,2004:88-93.
  • 6Kamat P,Zhang Y,Trappe W,Ozturk C.Enhancing source-location privacy in sensor network routing//Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS).Ohio,USA,2005:599-608.
  • 7Wang W P,Chen L,Wang J X.A source-location privacy protocol in WSN based on locational angle//Proceedings of the IEEE International Conference on Communications (ICC).Beijing,China,2008:1630-1634.
  • 8Kang L.Protecting location privacy in large-scale wireless sensor networks//Proceedings of the IEEE International Conference on Communications (ICC).Dresden,Germany,2009.
  • 9Mehta K,Liu D,Wright M.Location privacy in sensor networks against a global eavesdropper//Proceedings of the IEEE International Conference on Network Protocols (ICNP).Beijing,China,2007:314-323.
  • 10Yang Y,Shao M,Zhu S,Urgaonkar B,Cao G.Towards event source unobservability with minimum network traffic in sensor networks//Proceedings of the ACM Conference on Wireless Network Security (WiSec).Alexandria,Virginia,USA,2008:77-88.

共引文献52

同被引文献6

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部