期刊文献+

一种改进的WSN源位置隐私保护路由算法 被引量:3

An Improved Routing Algorithm for Source Location Privacy Protection in Wireless Sensor Network
下载PDF
导出
摘要 在无线传感器网络通信中,针对已有幻象路由协议可能因失效路径而降低源节点安全时间的问题,提出了一种基于最短距离路由的无线传感器网络源节点位置隐私保护路由算法。该路由算法包括初始化过程、改进的源节点幻象路由策略和避开源节点可视区的最短距离路由策略。理论分析和实验结果表明,与已有的幻象路由协议相比,该路由算法生成的幻象节点能较好地远离源节点,并且提高了源节点的安全时间,可以较好地保护源节点位置的隐私安全。 After introducing the background and significance of the research on the source location privacy protection in wireless sensor network, an improved routing algorithm for wireless sensor network source node location privacy pro- tection based on the minimum path routing is proposed on the problem of low security time of source node in PUS- BRF,PSRMPN and LPBMR. And then, the initialization process, the improved strategy of source node phantom routing and the minimum path routing strategy to avoid the visual area of source node about the new routing algorithm are detailedly explained. Theoretical analysis and experimental results show that the improved routing algorithm has higher security time of source node and does better in protecting source location privacy in wireless sensor network.
出处 《传感技术学报》 CAS CSCD 北大核心 2017年第3期438-449,共12页 Chinese Journal of Sensors and Actuators
基金 贵州省基础研究重大项目(黔科合JZ字[2014]2001-21) 国家自然科学基金项目(61540049) 贵州大学研究生创新基金项目(研理工2015085)
关键词 无线传感器网络 源节点 位置隐私保护 局部流量攻击 最短距离路由 wireless sensor network source node location privacy protection local traffic attack the minimumpath routing
  • 相关文献

参考文献7

二级参考文献72

  • 1Shao M,Zhu S,Zhang W,Cao G.pDCS:Security and privacy support for data-centric sensor networks//Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM).Alaska,USA,2007:1298-1306. 被引量:1
  • 2Joseph M,Choudhury R R.Hiding stars with fireworks location privacy through camouflage//Proceedings of the ACM Special Interest Group on Mobility of Systems,Users,Data and Computing (SIGMOBILE).Beijing,China,2009:345-356. 被引量:1
  • 3Hoh B,Gruteser M,Xiong H,Alrabady A.Enhancing security and privacy in traffic-monitoring systems.IEEE Pervasive Computing,2006,5(4):38-46. 被引量:1
  • 4Chen X Q,Makki K,Yen K.Sensor network security:A survey.IEEE Communications Surveys & Tutorials,2009,11(2):52-73. 被引量:1
  • 5Ozturk C,Zhang Y,Trappe W.Source-location privacy in energy constrained sensor networks routing//Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Net-works (SASN).Washington DC,USA,2004:88-93. 被引量:1
  • 6Kamat P,Zhang Y,Trappe W,Ozturk C.Enhancing source-location privacy in sensor network routing//Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS).Ohio,USA,2005:599-608. 被引量:1
  • 7Wang W P,Chen L,Wang J X.A source-location privacy protocol in WSN based on locational angle//Proceedings of the IEEE International Conference on Communications (ICC).Beijing,China,2008:1630-1634. 被引量:1
  • 8Kang L.Protecting location privacy in large-scale wireless sensor networks//Proceedings of the IEEE International Conference on Communications (ICC).Dresden,Germany,2009. 被引量:1
  • 9Mehta K,Liu D,Wright M.Location privacy in sensor networks against a global eavesdropper//Proceedings of the IEEE International Conference on Network Protocols (ICNP).Beijing,China,2007:314-323. 被引量:1
  • 10Yang Y,Shao M,Zhu S,Urgaonkar B,Cao G.Towards event source unobservability with minimum network traffic in sensor networks//Proceedings of the ACM Conference on Wireless Network Security (WiSec).Alexandria,Virginia,USA,2008:77-88. 被引量:1

共引文献296

同被引文献29

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部