期刊文献+

WSN中基于伪正态分布的幻影路由隐私保护方案 被引量:3

Source-location privacy protection strategy through pseudo normal distribution-based phantom routing in WSN
下载PDF
导出
摘要 为提高无线传感器网络中的源节点隐私保护安全性能,提出一种基于伪正态分布的幻影路由隐私保护(source-location privacy protection strategy through pseudo normal distribution-based phantom routing,PNDBPR)方案。该方案的实施过程为利用随机数机制计算幻影节点的随机有向游走跳数,通过该机制可以增加幻影节点的位置分布多样性与动态性,经概率转发路由机制将数据包从幻影节点转发至汇聚节点,目的是降低重合路径产生的可能性。从隐私保护性能和通信开销两方面对PNDBPR方案和基于源节点有限洪泛的源节点隐私保护(source location privacy preservation protocol in wireless sensor network using source-based restricted flooding,PUSBRF)方案进行了理论对比分析,并在MATLAB仿真平台上对PNDBPR方案与PUSBRF方案做了仿真分析。理论和仿真分析表明,PNDBPR方案产生的幻影节点位置分布更广泛,传输路径更复杂,增加了安全时间,能明显提高源节点位置隐私保护的安全程度。 In order to improve the security of the source-location privacy in wireless sensor network( WSN),a Source-location Privacy Protection Strategy through Pseudo Normal Distribution-based Phantom Routing( PNDBPR) protocol is proposed in this paper. Specifically,this protocol is composed of two steps: The PNDBPR protocol calculates the directional random walk by using a series of random numbers; this mechanism can increase the diversity and the dynamicity of phantoms node positional distribution; and then we send the data packets from the phantom nodes to the sink by the probability of forwarding routing mechanism,which can reduce the generated possibility of overlapping path. Theoretical analysis and simulation results show that,compared with PUSBRF,PNDBPR can dramatically improve the diversity and the dynamicity of the phantom nodes distribution and prolong the safety period. Thus it can significantly improve the safety of the source-location privacy protection.
出处 《重庆邮电大学学报(自然科学版)》 CSCD 北大核心 2016年第1期113-119,共7页 Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition)
基金 国家自然科学基金(6127400)~~
关键词 无线传感器网络(WSN) 源节点隐私保护 伪正态分布 多样性与动态性 wireless sensor network(WSN) source-location privacy protection pseudo normal distribution diversity and dynamicity
  • 相关文献

参考文献14

  • 1CONTI M, WILLEMSEN J,CRISPOB. Providing SourceLocation Privacy in Wireless Sensor Networks : A Survey[J]. Communications Surveys & Tutorials, IEEE,2013.15(3) ; 1238-1280.
  • 2KAMAT P, ZHANG Y, TRAPPE W, et al. Enhancingsource-location privacy in sensor network routing[ C]//IEEE. Distributed Computing Systems,2005. ICDCS2005. Proceedings. 25th IEEE International Conferenceon. Columbus, OH: IEEE Press, 2005 : 599-608.
  • 3马海英,曾国荪,王占君,王伟.高效可证明安全的基于属性的在线/离线加密机制[J].通信学报,2014,35(7):104-112. 被引量:10
  • 4OZTURK C, ZHANG Y, TRAPPE W. Source-locationprivacy in energy-constrained sensor network routing[C ] //Proceedings of the 2nd ACM workshop on Securityof ad hoc and sensor networks. New York: ACM, 2004:88-93.
  • 5陈娟,方滨兴,殷丽华,苏申.传感器网络中基于源节点有限洪泛的源位置隐私保护协议[J].计算机学报,2010,33(9):1736-1747. 被引量:53
  • 6LI Y, REN J, WU J. Quantitative measurement and de-sign of source-location privacy schemes for wireless sensornetworks [ J ]. Parallel and Distributed Systems,IEEETransactions on, 2012,23(7) : 1302-1311.
  • 7LI Y, REN J. Source-location privacy through dynamicrouting in wireless sensor networks [ C J//INFOCOM,2010Proceedings IEEE. New York, USA: IEEE Press,2010: 1-9.
  • 8ZHOU L, WEN Q, ZHANG H. Protecting sensor loca-tion privacy against adversaries in wireless sensor net-works [C ] //Computational and Information Sciences (IC-CIS) , 2013 Fifth International Conference on. NewYork, USA; IEEE Press, 2013: 1384-1387.
  • 9TAN W,XU K,WANG D. An anti-tracking source-loca-tion privacy protection protocol in WSNs based on pathextension[ J]. Internet of Things Journal, IEEE,2014,1(5) :461471.
  • 10MEHTA K, LIU D, WRIGHT M. Protecting location pri-vacy in sensor networks against a global eavesdropper11(2) : 320-336.

二级参考文献52

  • 1Shao M,Zhu S,Zhang W,Cao G.pDCS:Security and privacy support for data-centric sensor networks//Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM).Alaska,USA,2007:1298-1306.
  • 2Joseph M,Choudhury R R.Hiding stars with fireworks location privacy through camouflage//Proceedings of the ACM Special Interest Group on Mobility of Systems,Users,Data and Computing (SIGMOBILE).Beijing,China,2009:345-356.
  • 3Hoh B,Gruteser M,Xiong H,Alrabady A.Enhancing security and privacy in traffic-monitoring systems.IEEE Pervasive Computing,2006,5(4):38-46.
  • 4Chen X Q,Makki K,Yen K.Sensor network security:A survey.IEEE Communications Surveys & Tutorials,2009,11(2):52-73.
  • 5Ozturk C,Zhang Y,Trappe W.Source-location privacy in energy constrained sensor networks routing//Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Net-works (SASN).Washington DC,USA,2004:88-93.
  • 6Kamat P,Zhang Y,Trappe W,Ozturk C.Enhancing source-location privacy in sensor network routing//Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS).Ohio,USA,2005:599-608.
  • 7Wang W P,Chen L,Wang J X.A source-location privacy protocol in WSN based on locational angle//Proceedings of the IEEE International Conference on Communications (ICC).Beijing,China,2008:1630-1634.
  • 8Kang L.Protecting location privacy in large-scale wireless sensor networks//Proceedings of the IEEE International Conference on Communications (ICC).Dresden,Germany,2009.
  • 9Mehta K,Liu D,Wright M.Location privacy in sensor networks against a global eavesdropper//Proceedings of the IEEE International Conference on Network Protocols (ICNP).Beijing,China,2007:314-323.
  • 10Yang Y,Shao M,Zhu S,Urgaonkar B,Cao G.Towards event source unobservability with minimum network traffic in sensor networks//Proceedings of the ACM Conference on Wireless Network Security (WiSec).Alexandria,Virginia,USA,2008:77-88.

共引文献65

同被引文献21

引证文献3

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部