期刊文献+

Clustered trajectories anonymity in wireless sensor networks

Clustered trajectories anonymity in wireless sensor networks
下载PDF
导出
摘要 This paper proposes a clustered trajectories anonymity scheme (CTA) that enhances the kano nymity scheme to provide the intended level of source location privacy in mobile event monitoring when a global attacker is assumed. CTA applies isomorphic property of rotation to create traces of the fake sources distributions which are similar to those of the real sources. Thus anonymity of each trajectory and that of the clustered is achieved. In addition, location kdiversity is achieved by dis tributing fake sources around the base station. To reduce the time delay, tree rooted at the base sta tion is constructed to overlap part of the beacon interval of the nodes in the hierarchy. Both the ana lytical analysis and the simulation results prove that proved energy overhead and time delay. our scheme provides perfect anonymity with improved energy overhead and time delay. This paper proposes a clustered trajectories anonymity scheme(CTA) that enhances the k-anonymity scheme to provide the intended level of source location privacy in mobile event monitoring when a global attacker is assumed.CTA applies isomorphic property of rotation to create traces of the fake sources distributions which are similar to those of the real sources.Thus anonymity of each trajectory and that of the clustered is achieved.In addition,location k-diversity is achieved by distributing fake sources around the base station.To reduce the time delay,tree rooted at the base station is constructed to overlap part of the beacon interval of the nodes in the hierarchy.Both the analytical analysis and the simulation results prove that our scheme provides perfect anonymity with improved energy overhead and time delay.
出处 《High Technology Letters》 EI CAS 2015年第2期140-146,共7页 高技术通讯(英文版)
基金 Supported by the National Natural Science Foundation of China(No.60903157) the Fundamental Research funds for the Central Universities of China(No.ZYGX2011J066) the Sichuan Science and Technology Support Project(No.2013GZ0022)
关键词 clustered trajectories anonymity scheme (CTA) source location privacy K-ANONYMITY global attackers wireless sensor networks (WSNs) 无线传感器网络 匿名性 事件监测 水平移动 时间延迟 层次结构 仿真结果 即时通讯
  • 相关文献

参考文献11

  • 1Mehta K, Liu D, Wright M. Location privacy in sensor networks against a global eavesdropper. In: Proceedings of the IEEE International Conference on Network Proto- cols, Beijing, China, 2007. 314-323.
  • 2Shao M, Yang Y, Zhu S C, et al. Towards statistically strong source anonymity for sensor networks. In: Pro- ceedings of the 27th IEEE Communications Society Con- ference on Computer Communications, Phoenix, USA, 2008. 466-474.
  • 3Yang Y, Zhu S C, Cao G H, et al. An active globai at- tack model for sensor source location privacy: analysis and countermeasures. Lecture Notes of the Institute for Computer Sciences, Social-lnformatics and Telecommuni- cations Engineering, 2009, 19:373-393.
  • 4Ortolani S, Conti M, Crispo B, et al. Events privacy in WSNs : A new model and its application. In : Proceedings of the IEEE International Symposium on a World of Wire- less, Mobile and Multimedia Networks, Lucca, Italy, 2011. 1-9.
  • 5Mahmoud M, Shen X M. A cloud-based scheme for pro- tecting source-location privacy against hotspot-locating at- tack in wireless sensor Networks. IEEE Transactions on Parallel and Distributed Systems, 2012, 23(10) :1805-1818.
  • 6Kamat P, Zhang Y Y, Trappe W, et al. Enhancing source-location privacy in sensor network routing. In: Proceedings of the 25th IEEE international Conference on Distributed Computing Systems, Columbus, USA, 2005. 599-608.
  • 7Shao M, Hu W H, Zhu S C, et al. Cross-layer enhanced source location privacy in sensor networks. In: Proceed- ings of the 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, Rome, Italy, 2009. 1-9.
  • 8Li Z. ZigBee wireless sensor network in industrial appli- cations. In: Proceedings of the 2006 SICE-ICASE Inter- national Joint Conference, Busan, Korea,2006. 1067-1070.
  • 9Avinash K, Sonu A. Location detection in wireless sensor network using classical optimization methodology. Inter- national Journal of Computer Science and Technology, 2012, 3(1) :685-688.
  • 10Zhao J. Research on key predistribution scheme of wire- less sensor networks. In: Proceedings of the 5th Interna- tional Conference on Intelligent Computation Technology and Automation, Zhangjiajie, China, 2012. 287-290.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部