Security problem is an important issue for Wireless Sensor Network.The paper focuses on the privacy protection of WSN applications.An anonymity enhancement tactic based on pseudonym mechanism is presented for clustere...Security problem is an important issue for Wireless Sensor Network.The paper focuses on the privacy protection of WSN applications.An anonymity enhancement tactic based on pseudonym mechanism is presented for clustered Wireless Sensor Network,which provides anonymity for both the sensors within a cluster and the cluster head nodes.Simulation experiments are launched through NS2 platform to validate the anonymity performance.The theoretical analysis and empirical study imply that the proposed scheme based on pseudonym can protect the privacies of both the sensor nodes and the cluster head nodes.The work is valuable and the experimental results are convincible.展开更多
This paper proposes a clustered trajectories anonymity scheme (CTA) that enhances the kano nymity scheme to provide the intended level of source location privacy in mobile event monitoring when a global attacker is ...This paper proposes a clustered trajectories anonymity scheme (CTA) that enhances the kano nymity scheme to provide the intended level of source location privacy in mobile event monitoring when a global attacker is assumed. CTA applies isomorphic property of rotation to create traces of the fake sources distributions which are similar to those of the real sources. Thus anonymity of each trajectory and that of the clustered is achieved. In addition, location kdiversity is achieved by dis tributing fake sources around the base station. To reduce the time delay, tree rooted at the base sta tion is constructed to overlap part of the beacon interval of the nodes in the hierarchy. Both the ana lytical analysis and the simulation results prove that proved energy overhead and time delay. our scheme provides perfect anonymity with improved energy overhead and time delay.展开更多
基金the National Natural Science Foundation of China (NSFC) under grant No.61309024,the National Key Basic Research Program of China (973) under Grant No.2013CB834204,the Fundamental Research Funds for the Central Universities under grant No.14CX06009A at China University of Petroleum
文摘Security problem is an important issue for Wireless Sensor Network.The paper focuses on the privacy protection of WSN applications.An anonymity enhancement tactic based on pseudonym mechanism is presented for clustered Wireless Sensor Network,which provides anonymity for both the sensors within a cluster and the cluster head nodes.Simulation experiments are launched through NS2 platform to validate the anonymity performance.The theoretical analysis and empirical study imply that the proposed scheme based on pseudonym can protect the privacies of both the sensor nodes and the cluster head nodes.The work is valuable and the experimental results are convincible.
基金Supported by the National Natural Science Foundation of China(No.60903157)the Fundamental Research funds for the Central Universities of China(No.ZYGX2011J066)the Sichuan Science and Technology Support Project(No.2013GZ0022)
文摘This paper proposes a clustered trajectories anonymity scheme (CTA) that enhances the kano nymity scheme to provide the intended level of source location privacy in mobile event monitoring when a global attacker is assumed. CTA applies isomorphic property of rotation to create traces of the fake sources distributions which are similar to those of the real sources. Thus anonymity of each trajectory and that of the clustered is achieved. In addition, location kdiversity is achieved by dis tributing fake sources around the base station. To reduce the time delay, tree rooted at the base sta tion is constructed to overlap part of the beacon interval of the nodes in the hierarchy. Both the ana lytical analysis and the simulation results prove that proved energy overhead and time delay. our scheme provides perfect anonymity with improved energy overhead and time delay.