
浏览全部资源
扫码关注微信
1. 南京航空航天大学计算机科学与技术学院,江苏 南京 211106
2. 江苏省物联网与控制技术重点实验室,江苏 南京 211106
Online First:2018-01,
Published:25 January 2018
移动端阅览
Qian ZHOU, Xiaolin QIN, Youwei DING. Preserving source-location privacy efficiently based on attack-perceiving in wireless sensor network[J]. Journal on Communications, 2018, 39(1): 101-116.
Qian ZHOU, Xiaolin QIN, Youwei DING. Preserving source-location privacy efficiently based on attack-perceiving in wireless sensor network[J]. Journal on Communications, 2018, 39(1): 101-116. DOI: 10.11959/j.issn.1000-436x.2018001.
提出了一种静默池机制方法(SPA
silent-pool approach),当传感器节点感知到附近移动攻击者的存在,通过控制节点的转发状态从而阻止和减少攻击者收到有效数据分组。在此基础上,进一步提出了对当前路由路径没有任何影响的安全机制——池外虚假信息注入(DPIOP
dummy packet injection out pool)法,诱使攻击者远离传输路径。实验结果验证了SPA和DPIOP的隐私性能,与现有方法相比可减少能耗约为63%,降低时延约为35%。
Sensors’ ability was utilized to perceive the mobile attacker nearby
and SPA (silent-pool approach) was proposed
which was able to hinder or reduce the packets hunted by the attacker by controlling the forwarding state of the nodes.In addition
a novel DPIOP (dummy packet injection out pool) method was proposed to entice the adversary far away from the transmission path without changing the original routing path.Through simulation studies and experiments
the outstanding performance of SPA and DPIOP in privacy preservation were demonstrated
with saving energy by about 63%
and reducing delay by about 35%.
牛晓光 , 魏川博 , 姚亚兰 . 传感网中能量均衡高效的源位置隐私保护协议 [J ] . 通信学报 , 2016 , 37 ( 4 ): 23 - 33 .
NIU X G , WEI C B , YAO Y L . Energy-consumption-balanced efficient source-location privacy preserving protocol in WSN [J ] . Journal on Communication , 2016 , 37 ( 4 ): 23 - 33 .
LIGHTFOOT L , LI Y , REN J . STaR:design and quantitative measurement of source-location privacy for wireless sensor networks [J ] . Secur Commun Netw , 2016 , 9 ( 3 ): 220 - 228 .
周倩 , 秦小麟 , 丁有伟 . 无线传感器网络中基于哈希函数的上下文隐私保护 [J ] . 南京理工大学学报 , 2017 , 41 ( 6 ): 753 - 759 .
ZHOU Q , QIN X L , DING Y W . Hash-based contextual privacy preservation in wireless sensor networks [J ] . Journal of Nanjing University of Science and Technology , 2017 , 41 ( 6 ): 753 - 759 .
KAMAT P , ZHANG Y , TRAPPE W , et al . Enhancing source-location privacy in sensor network routing [C ] // 25th IEEE International Conference on Distributed Computing Systems(ICDCS) . 2005 : 599 - 608 .
ZHANG Y , WANG G , HU Q , et al . Design and performance study of a topology-hiding multipath routing protocol for mobile ad hoc networks [C ] // IEEE INFOCOM . 2012 : 10 - 18 .
RAHAT A A M , EVERSON R M , FIELDSEND J E . Evolutionary multi-path routing for network lifetime and robustness in wireless sensor networks [J ] . Ad Hoc Netw , 2016 ( 52 ): 130 - 145 .
MEHTA K , LIU D , WRIGHT M . Protecting location privacy in sensor networks against a global eavesdropper [J ] . IEEE Trans Mob Comput , 2012 , 11 ( 2 ): 320 - 336 .
YANG Y , SHAO M , ZHU S , et al . Towards statistically strong source anonymity for sensor networks [J ] . ACM Trans Sen Netw , 2013 , 9 ( 2 ): 1 - 23 .
LOURENÇO P , BATISTA P , OLIVEIRA P , et al . Simultaneous localization and mapping in sensor networks:a GES sensor-based filter with moving object tracking [C ] // European Control Conference (ECC) . 2015 : 2354 - 2359 .
NANDHINI S A , RADHA S . Compressed sensing based object detection and tracking system using measurement selection process for wireless visual sensor networks [C ] // International Conference on Wireless Communications,Signal Processing and Networking (WiSPNET) . 2016 : 1117 - 1122 .
APICHARTTRISORN D , APICHARTTRISORN K , KASETKASEM T . A moving object tracking algorithm using support vector machines in binary sensor networks [C ] // 13th International Symposium on Communications and Information Technologies (ISCIT) . 2013 : 529 - 534 .
RIOS R , LOPEZ J . Exploiting context-awareness to enhance source-location privacy in wireless sensor networks [J ] . Oxford University Press , 2011 , 54 ( 10 ): 1603 - 1615 .
BURATTI C . Performance analysis of IEEE 802.15.4 beacon-enabled mode [J ] . IEEE Transactions on Vehicular Technology , 2010 , 59 ( 4 ): 2031 - 2045 .
BRADBURY M , LEEKE M , JHUMKA A . A dynamic fake source algorithm for source location privacy in wireless sensor networks [C ] // IEEE Trustcom/BigDataSE/ISPA . 2015 : 531 - 538 .
OUYANG Y , LE Z , LIU D , et al . Source location privacy against laptop-class attacks in sensor networks [C ] // The 4th International Conference on Security and Privacy in Communication Networks . 2008 : 5 - 10 .
RAJ M , LI N , LIU D , et al . Using data mules to preserve source location privacy in wireless sensor networks [J ] . Pervasive & Mobile Computing , 2014 ( 11 ): 244 - 260 .
JHUMKA A , LEEKE M , SHRESTHA S . On the use of fake sources for source location privacy:trade-offs between energy and privacy [J ] . Computer Journal , 2011 , 54 ( 6 ): 860 - 874 .
SHI R , GOSWAMI M , GAO J , et al . Is random walk truly memoryless traffic analysis and source location privacy under random walks [C ] // IEEE INFOCOM . 2013 : 3021 - 3029 .
XI Y , SCHWIEBERT L , SHI W . Preserving source location privacy in monitoring-based wireless sensor networks [C ] // 20th IEEE International Parallel Distributed Processing Symposium . 2006 .
ALOMAIR B , CLARK A , CUELLAR J , et al . Toward a statistical framework for source anonymity in sensor networks [J ] . IEEE Transactions on Mobile Computing , 2013 , 12 ( 2 ): 248 - 260 .
吴博 , 胡小龙 . WSN中基于假路径的源位置保护策略 [J ] . 计算机工程与应用 , 2008 , 44 ( 16 ): 114 - 117 .
WU B , HU X L . Strategy of protecting source-location privacy in WSN based on fake paths [J ] . Computer Engineering and Applications , 2008 , 44 ( 16 ): 114 - 117 .
AMIN R , BISWAS G P . A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks [J ] . Ad Hoc Networks , 2016 , 36 ( 1 ): 58 - 80 .
SRINIVAS J , MUKHOPADHYAY S , MISHRA D . Secure and efficient user authentication scheme for multi-gateway wireless sensor networks [J ] . Ad Hoc Networks , 2017 , 54 : 147 - 169 .
REDDY A G , DAS A K , YOON E J , et al . A secure anonymous authentication protocol for mobile services on elliptic curve cryptography [J ] . IEEE Access , 2016 ( 4 ): 4394 - 4407 .
SHAO M , HU W , ZHU S , et al . Cross-layer enhanced source location privacy in sensor networks [C ] // 6th Annual IEEE Communications Society Conference on Sensor,Mesh and Ad Hoc Communications and Networks . 2009 : 1 - 9 .
XING Y , CHEN Y , YI W , et al . Optimal beacon interval for TDMA-based MAC in wireless sensor networks [C ] // 11th International Conference on Innovations in Information Technology (IIT) . 2015 : 156 - 161 .
HUANG P , LIU C J , XIAO L . TAS-MAC:a traffic-adaptive synchronous MAC protocol for wireless sensor networks [J ] . ACM Transaction Sensor Network , 2016 , 12 ( 1 ): 1 - 30 .
ZHOU L , WAN C , HUANG J , et al . The location privacy of wireless sensor networks:attacks and countermeasures [C ] // Ninth International Conference on Broadband and Wireless Computing,Communication and Applications (BWCCA) . 2014 : 64 - 71 .
POTTIE G J , KAISER W J . Wireless integrated network sensors [J ] . Communication ACM , 2000 , 43 ( 5 ): 51 - 58 .
0
Views
1555
下载量
6
CSCD
Publicity Resources
Related Articles
Related Author
Related Institution
京公网安备11010802024621