期刊文献+

无线传感器网络中优化源节点位置隐私强度策略 被引量:3

Privacy Intensity Policy for Optimizing Source Node Location in Wireless Sensor Networks
原文传递
导出
摘要 针对幻影节点与源节点之间跳数较少、分布区域集中以及传输路径不够多样化等问题,提出一种优化源节点位置隐私强度的保护策略。该策略可以增强幻影节点选取的多样性,有效避开攻击者的可视区。设置选取幻影节点的条件,将幻影节点待选区域利用源节点生成的动态随机数以及存储位置信息分层,确保幻影节点与源节点之间具有足够的安全距离。设置距离Sink节点最小跳数且距离相等的等邻居节点组成的集合作为一个虚拟圆环,当数据包到达虚拟圆环时随机选择传递方向,利用动态生成的跳数值逐跳传递,可以有效增强传输路径的多样性,延长攻击者的平均追踪时间。仿真结果表明,与传统策略相比,所提策略可以使源节点位置隐私的安全性更高。 In this study,a protection strategy is proposed to optimize the privacy strength of the source node location for mitigating problems such as fewer hops between the phantom node and the source node,concentrated distribution areas,and insufficient diversification of the transmission paths.Using the proposed strategy,the diversity of phantom node selection can be enhanced and the visual area of an attacker can be effectively avoided.First,set the conditions for selecting phantom nodes,and the dynamic random number generated by the source nodes,and the storage location information layering in the area to select phantom nodes ensures that there is sufficient safe distance between phantom nodes and source nodes.Then,set the set of neighbor nodes with the least number of hops from the sink node and equal distances as a virtual ring.When the data packet arrives at the virtual ring,the transmission direction is randomly selected,and the dynamically generated hop value is used to transmit hop by hop,which can effectively enhance transmission the diversity of paths extends the average tracking time of the attacker.Simulation results show that compared with the traditional strategy,the proposed strategy can enhance the privacy strength of the source node location.
作者 蒋占军 周涛 杨永红 Jiang Zhanjun;Zhou Tao;Yang Yonghong(School of Electronic and Information Engineering,Lanzhou Jiaotong University,Lanzhou,Gansu 730070,China)
出处 《激光与光电子学进展》 CSCD 北大核心 2020年第24期182-189,共8页 Laser & Optoelectronics Progress
基金 甘肃省高校科研项目(2017C09) 兰州交通大学“百名青年优秀人才培养计划”基金(150220232)。
关键词 图像处理 源节点 SINK节点 攻击者 网络能耗 image processing source node Sink node attacker network energy consumption
  • 相关文献

参考文献7

二级参考文献72

  • 1梁双有,任燕.利用光纤进行高精度时间传递[J].宇航计测技术,2004,24(3):24-26. 被引量:3
  • 2张大元,谢毅,孟艾立,周波.利用光纤数字同步传送网2.048 Mbit/s支路传送高精度标准时间信号[J].现代电信科技,2006(12):17-20. 被引量:20
  • 3Shao M,Zhu S,Zhang W,Cao G.pDCS:Security and privacy support for data-centric sensor networks//Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM).Alaska,USA,2007:1298-1306.
  • 4Joseph M,Choudhury R R.Hiding stars with fireworks location privacy through camouflage//Proceedings of the ACM Special Interest Group on Mobility of Systems,Users,Data and Computing (SIGMOBILE).Beijing,China,2009:345-356.
  • 5Hoh B,Gruteser M,Xiong H,Alrabady A.Enhancing security and privacy in traffic-monitoring systems.IEEE Pervasive Computing,2006,5(4):38-46.
  • 6Chen X Q,Makki K,Yen K.Sensor network security:A survey.IEEE Communications Surveys & Tutorials,2009,11(2):52-73.
  • 7Ozturk C,Zhang Y,Trappe W.Source-location privacy in energy constrained sensor networks routing//Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Net-works (SASN).Washington DC,USA,2004:88-93.
  • 8Kamat P,Zhang Y,Trappe W,Ozturk C.Enhancing source-location privacy in sensor network routing//Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS).Ohio,USA,2005:599-608.
  • 9Wang W P,Chen L,Wang J X.A source-location privacy protocol in WSN based on locational angle//Proceedings of the IEEE International Conference on Communications (ICC).Beijing,China,2008:1630-1634.
  • 10Kang L.Protecting location privacy in large-scale wireless sensor networks//Proceedings of the IEEE International Conference on Communications (ICC).Dresden,Germany,2009.

共引文献87

同被引文献54

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部