期刊文献+

基于最小能耗路由的源节点位置隐私保护协议 被引量:11

Source-Location Privacy Protocol Based on the Minimum Cost Routing
下载PDF
导出
摘要 源节点的位置隐私保护已经是制约着无线传感器网络推广的关键技术之一。同时,能源问题又是一个很大的约束,所以人们一直致力于在位置隐私保护和能量消耗之间寻找一个平衡点。本文一种基于最小能耗路由的源节点位置隐私保护协议,协议分为两个阶段:第1阶段,源节点通过定向随机步的方式以额定能耗快速地向幻影节点转发数据;第2阶段,幻影节点以避开源节点可视区的最小能耗路由向Sink转发数据。实验表明,提出的路由协议以较小的能耗达到了较高的隐私保护要求。 Source-location privacy protection is already one of the key technologies which restrict the promotion of wireless sensor network ( WSN ) . At the same time, the energy issue is also a big constraint, so we have been committed to find a balance between privacy protection and energy consumption. In the paper,we proposed a source-location privacy protocol based on the minimum cost routing( LPBMR) . The protocol is divided into two parts:In the first phase,The data is sent to the phantom node with directional random walk at a certain energy consumption;In the second phase,the phantom node send the data to the Sink along with the minimum energy routing which can avoid the visual of the source node. The results of the simulation showed that LPBMR can achieve a good privacy protection with less energy consumption.
出处 《传感技术学报》 CAS CSCD 北大核心 2014年第3期394-400,共7页 Chinese Journal of Sensors and Actuators
基金 国家自然科学基金项目(61073197) 江苏省科技支撑计划项目(SBE201077457)
关键词 无线传感器网络 隐私保护 源位置 最小能耗路由 wireless sensor network privacy preservation source-location the minimum cost routing
  • 相关文献

参考文献12

  • 1潘巨龙,李善平,张道远.无线医疗传感器网络中基于Feistel加密算法研究[J].传感技术学报,2010,23(7):1030-1036. 被引量:8
  • 2Ye F,Chen A,Lu S,et al.A Sealable Solution to Minimum Cost Forwarding in Large Sensdor Networls [C]//Co,puter Communieations and Networks,2001.Proceedings.Tenth International Confernce on .IEEE,2001:304-309. 被引量:1
  • 3Ozturk C, Zhang Y,Trappe W. Souree-Location Orivacy in Erergy Constrained Sensor Networks Routing [ C ]//Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks ( SASN ). Washing DC, USA,2004:88-93. 被引量:1
  • 4Kokalj-Filipovic S, Le Fessant F.Spasojevic P. Trade-offs of Source Locaton Protection in Globally Attacked Sensor Networks: A Case Analysis[ C ]//Proceedings of the Sensor, Mesh and Ad Hoc Communicatons and NetworksSECON) ,2011 81h Annual IEEE Communications Society Conference,27-30 June 2011:323-331. 被引量:1
  • 5Kamat P,Zhang Y,Trappe W,et al.Enhancing Source-Location Privacy in Sensor Net Routing[C]//Proceedings of the 25th Internatjonal Conference on Distributed Computing Systems(ICDCS), Ohio,USA ,2005:599-608. 被引量:1
  • 6姚剑波,郝晓青,文光俊.无线传感器网络中的位置隐私保护[J].传感技术学报,2008,21(8):1437-1441. 被引量:7
  • 7Wang W P,Chen L,Wang J X.A Source-Location Privacy Protocaol in WSN Based on Locational Angle //Proceedings. of the IEEE International Sngle[C]//Procedddings of the IEEE International Conference on Vommunications(ICC),Beijing, China,,2008 : 1630-1634. 被引量:1
  • 8陈娟,方滨兴,殷丽华,苏申.传感器网络中基于源节点有限洪泛的源位置隐私保护协议[J].计算机学报,2010,33(9):1736-1747. 被引量:53
  • 9Lu Zongqing,Wen Yonggang.Credit Routing for Source-Location Privacy Protectio in Wireless Sensor Networks[C]//Mobile Adhoc and Sensor Systems(MASS),2012 IEEE 9th International Conference on.8-11 Oct.2012:164-172. 被引量:1
  • 10Yun L,Lightfoot L,JIAN R.Routing -Based Source-Location Privacy Protection in Wireless Sensor Networks[C]//Proceddings of the Electro/Information Technology,2009 IEEE International Confernce,2009:29-34. 被引量:1

二级参考文献33

共引文献60

同被引文献54

  • 1裴庆祺,沈玉龙,马建峰.无线传感器网络安全技术综述[J].通信学报,2007,28(8):113-122. 被引量:93
  • 2GAIKWAD S M, DHAMDHERE V. A Review of PrivacyPreserving Techniques in Wireless Sensor Network [ J ].Network and Complex Systems,2014,4(3) :1-6. 被引量:1
  • 3MANJULA R, DATTA R. An energy-efficient routingtechnique for privacy preservation of assets monitored withWSN [ C ]//Students ’ Technology Symposium ( Tech-Sym) . Jodhpur, India: IEEE, 2014 : 325-330. 被引量:1
  • 4TAO Z, LIU Y,LI C. Strategy of source-location privacypreservation in WSNs based on phantom single-path rou-ting[ J ]. Journal of Chongqing University of Posts andTelecommunications : Natural Science Edition, 2013 , 25(2): 178-183. 被引量:1
  • 5LI Y,REN J. Source-location privacy through dynamic rou-ting in wireless sensor networks [ C J//INFOCOM, 2010Proceedings IEEE. San Diego, CA, US : IEEE ,2010 : 1-9. 被引量:1
  • 6HUANG J, MEISONG S. A Source-location Privacy Pro-tection Strategy via Pseudo Normal Distribution-basedPhantom Routing in WSNs[ C] // Proceedings of the 30thAnnual ACM Symposium on Applied Computing.Salamanca, Spain; ACM, 2015: 688-694. 被引量:1
  • 7KAMAT P,ZHANG Y,TRAPPE W, et al. Enhancingsource-location privacy in sensor network routing [C]//Distributed Computing Systems, 2005. ICDCS 2005.Proceedings. 25th IEEE International Conference on.Ohio, USA: IEEE, 2005: 599-608. 被引量:1
  • 8YAO J. Source-Location Privacy Based on DirectedGreedy Walk in Wireless Sensor Networks[ C] //WirelessCommunications Networking and Mobile Computing(WiCOM ),2010 6th International Conference on.Chengdu, China: IEEE, 2010: 14. 被引量:1
  • 9RIOS R, LOPEZ J. Analysis of location privacy solutionsin wireless sensor networks [ J]. Communications,IET,2011,5(17) : 2518-2532. 被引量:1
  • 10LI Y, REN J, WU J. Quantitative measurement and de-sign of source-location privacy schemes for wireless sensornetworks [ J ]. Parallel and Distributed Systems,IEEETransactions on, 2012, 23(7) : 1302-1311. 被引量:1

引证文献11

二级引证文献28

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部