期刊文献+

无线传感器网络中基于角度的定向随机步幻影路由协议 被引量:4

Angle-based directed random walk phantem routing protocol for WSNs
下载PDF
导出
摘要 为了更好地保护源位置隐私,提出了一种新的源位置隐私保护方法,通过使用相邻节点的斜率的反正切值来确定幻影路径上下一跳节点选择范围,使得幻影源的选取在不暴露源位置方向信息的情况下能够远离真实源,且能够生成更多不重复的幻影源,更灵活地控制幻影源的选取,使幻影源的分布较为均匀,从而能够更好地提高源位置隐私保护的性能。仿真实验表明:相比传统的基于跳数的定向随机步方法和完全随机步方法,该方法在能耗与安全周期上有着相对明显的优势,因而该方法能够更好地保护源位置隐私。 To protect source location privacy,a novel angle-based directed random walk( ABDRW) routing protocol is proposed,which use the arctangent value of the slope of the adjacent nodes to determine the scope of the next phantom nodes on phantom path,this approach can generate more different phantom sources that are far away from the real source,and thus enhances the source location privacy protection. Comparing with several existing typical methods,such as hop-based directed random walk( HBDRW) and the completely random walk phantom routing( CRWPR),ABDRW protocol can reach higher source location privacy protection performance on safety period and energy consumption,through flexible selection and more uniform distribution of phantom source,so it can protect the source location privacy better.
出处 《传感器与微系统》 CSCD 2016年第11期123-127,共5页 Transducer and Microsystem Technologies
基金 国家自然科学基金资助项目(61262081)
关键词 无线传感器网络 源位置 幻影源 角度 安全周期 wireless sensor networks(WSNs) source location phantom source angle safety period
  • 相关文献

参考文献2

二级参考文献20

  • 1AKYILDIZ I F, SU W, SANKARASUBRAMANIAM Y, et al. Wireless sensor networks: a survey[ J]. Computer networks, 2002, 38(4) :393-422.
  • 2AKKAYA K, YOUNIS M. A survey on routing protocols for wireless sensor networks[ J ]. Ad hoc networks, 2005, 3 (3) : 325 -349.
  • 3SLIJEPCEVIC S, POTKONJAK M, TSIATSIS V, et al. On communication security in wireless ad-hoc sensor networks[ C]// Proceedings of the 11 th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises. Washington : IEEE Computer Society, 2002 : 180-185.
  • 4PERRIG A, STANKOVIC J, WAGNER D. Security in wireless sensor networks[J ]. Communications of the ACM, 2004, 47(6) :53-57.
  • 5YAO Lin, KANG Lin, SHANG Pengfei, et al. Protecting the sink location privacy in wireless sensor networks[ J]. Personal and Ubiquitous Computing, 2013, 17:883-893.
  • 6DENG .ling, HAN Richard, MISHRA S. Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks [ C ]// Proceedings of the 2004 International Conference on Dependable Systems and Networks. Washington: IEEE Computer Society, 2004: 637-646.
  • 7EUGSTER P T, GUERRAOUI R, HANDURUKANDE S B, et al. Lightweight probabilistic broadcast[ J]. ACM Transactions on Computer Systems ( TOCS ), 2003, 21 (4) : 341-374.
  • 8OZTURK C, ZHANG Yanyong, TRAPPE W. Source-location privacy in energy-constrained sensor network r outing [ C ]// Proceedings of the 2nd ACM workshop on Security of ad Hoc and Sensor Networks. New York: ACM Press, 2004: 88-93.
  • 9KAMAT P, ZHANG Yanyong, TRAPPE W, et al. Enhancing source-location privacy in sensor network routing [ C ]/! Pro- ceedings, of 25th IEEE International Conference on Distributed Computing Systems (ICDCS). Washington: IEEE Computer Society, 2005: 5994508.
  • 10XI Yong, SCHWIEBERT L, SHI Weisong. Preserving source location privacy in monitoring-based wireless sensor networks [C]//Proceedings of the 20th International Parallel and Distributed Processing Symposium. Washington: IEEE Computer Society, 2006: 8.

共引文献117

同被引文献16

引证文献4

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部