通信学报 ›› 2018, Vol. 39 ›› Issue (1): 101-116.doi: 10.11959/j.issn.1000-436x.2018001
周倩1,2,秦小麟1,2,丁有伟1,2
修回日期:
2017-12-02
出版日期:
2018-01-01
发布日期:
2018-02-07
作者简介:
周倩(1983-),女,江苏兴化人,南京航空航天大学博士生,主要研究方向为数据信息安全、传感器网络、数据隐私保护等。|秦小麟(1953-),男,江苏苏州人,南京航空航天大学教授,主要研究方向为分布式数据管理、物联网、数据安全与隐私保护、大数据管理与分析等。|丁有伟(1987-),男,江苏宿迁人,南京航空航天大学博士生,主要研究方向为云计算、能量高效数据管理和数据挖掘等。
基金资助:
Qian ZHOU1,2,Xiaolin QIN1,2,Youwei DING1,2
Revised:
2017-12-02
Online:
2018-01-01
Published:
2018-02-07
Supported by:
摘要:
提出了一种静默池机制方法(SPA,silent-pool approach),当传感器节点感知到附近移动攻击者的存在,通过控制节点的转发状态从而阻止和减少攻击者收到有效数据分组。在此基础上,进一步提出了对当前路由路径没有任何影响的安全机制——池外虚假信息注入(DPIOP,dummy packet injection out pool)法,诱使攻击者远离传输路径。实验结果验证了SPA和DPIOP的隐私性能,与现有方法相比可减少能耗约为63%,降低时延约为35%。
中图分类号:
周倩,秦小麟,丁有伟. 基于攻击感知的能量高效源位置隐私保护算法[J]. 通信学报, 2018, 39(1): 101-116.
Qian ZHOU,Xiaolin QIN,Youwei DING. Preserving source-location privacy efficiently based on attack-perceiving in wireless sensor network[J]. Journal on Communications, 2018, 39(1): 101-116.
[1] | 牛晓光, 魏川博, 姚亚兰 . 传感网中能量均衡高效的源位置隐私保护协议[J]. 通信学报, 2016,37(4): 23-33. |
NIU X G , WEI C B , YAO Y L . Energy-consumption-balanced efficient source-location privacy preserving protocol in WSN[J]. Journal on Communication, 2016,37(4): 23-33. | |
[2] | LIGHTFOOT L , LI Y , REN J . STaR:design and quantitative measurement of source-location privacy for wireless sensor networks[J]. Secur Commun Netw, 2016,9(3): 220-228. |
[3] | 周倩, 秦小麟, 丁有伟 . 无线传感器网络中基于哈希函数的上下文隐私保护[J]. 南京理工大学学报, 2017,41(6): 753-759. |
ZHOU Q , QIN X L , DING Y W . Hash-based contextual privacy preservation in wireless sensor networks[J]. Journal of Nanjing University of Science and Technology, 2017,41(6): 753-759. | |
[4] | KAMAT P , ZHANG Y , TRAPPE W ,et al. Enhancing source-location privacy in sensor network routing[C]// 25th IEEE International Conference on Distributed Computing Systems(ICDCS). 2005: 599-608. |
[5] | ZHANG Y , WANG G , HU Q ,et al. Design and performance study of a topology-hiding multipath routing protocol for mobile ad hoc networks[C]// IEEE INFOCOM. 2012: 10-18. |
[6] | RAHAT A A M , EVERSON R M , FIELDSEND J E . Evolutionary multi-path routing for network lifetime and robustness in wireless sensor networks[J]. Ad Hoc Netw, 2016(52): 130-145. |
[7] | MEHTA K , LIU D , WRIGHT M . Protecting location privacy in sensor networks against a global eavesdropper[J]. IEEE Trans Mob Comput, 2012,11(2): 320-336. |
[8] | YANG Y , SHAO M , ZHU S ,et al. Towards statistically strong source anonymity for sensor networks[J]. ACM Trans Sen Netw, 2013,9(2): 1-23. |
[9] | LOUREN?O P , BATISTA P , OLIVEIRA P ,et al. Simultaneous localization and mapping in sensor networks:a GES sensor-based filter with moving object tracking[C]// European Control Conference (ECC). 2015: 2354-2359. |
[10] | NANDHINI S A , RADHA S . Compressed sensing based object detection and tracking system using measurement selection process for wireless visual sensor networks[C]// International Conference on Wireless Communications,Signal Processing and Networking (WiSPNET). 2016: 1117-1122. |
[11] | APICHARTTRISORN D , APICHARTTRISORN K , KASETKASEM T . A moving object tracking algorithm using support vector machines in binary sensor networks[C]// 13th International Symposium on Communications and Information Technologies (ISCIT). 2013: 529-534. |
[12] | RIOS R , LOPEZ J . Exploiting context-awareness to enhance source-location privacy in wireless sensor networks[J]. Oxford University Press, 2011,54(10): 1603-1615. |
[13] | BURATTI C . Performance analysis of IEEE 802.15.4 beacon-enabled mode[J]. IEEE Transactions on Vehicular Technology, 2010,59(4): 2031-2045. |
[14] | BRADBURY M , LEEKE M , JHUMKA A . A dynamic fake source algorithm for source location privacy in wireless sensor networks[C]// IEEE Trustcom/BigDataSE/ISPA. 2015: 531-538. |
[15] | OUYANG Y , LE Z , LIU D ,et al. Source location privacy against laptop-class attacks in sensor networks[C]// The 4th International Conference on Security and Privacy in Communication Networks. 2008: 5-10. |
[16] | RAJ M , LI N , LIU D ,et al. Using data mules to preserve source location privacy in wireless sensor networks[J]. Pervasive & Mobile Computing, 2014(11): 244-260. |
[17] | JHUMKA A , LEEKE M , SHRESTHA S . On the use of fake sources for source location privacy:trade-offs between energy and privacy[J]. Computer Journal, 2011,54(6): 860-874. |
[18] | SHI R , GOSWAMI M , GAO J ,et al. Is random walk truly memoryless traffic analysis and source location privacy under random walks[C]// IEEE INFOCOM. 2013: 3021-3029. |
[19] | XI Y , SCHWIEBERT L , SHI W . Preserving source location privacy in monitoring-based wireless sensor networks[C]// 20th IEEE International Parallel Distributed Processing Symposium. 2006. |
[20] | ALOMAIR B , CLARK A , CUELLAR J ,et al. Toward a statistical framework for source anonymity in sensor networks[J]. IEEE Transactions on Mobile Computing, 2013,12(2): 248-260. |
[21] | 吴博, 胡小龙 . WSN中基于假路径的源位置保护策略[J]. 计算机工程与应用, 2008,44(16): 114-117. |
WU B , HU X L . Strategy of protecting source-location privacy in WSN based on fake paths[J]. Computer Engineering and Applications, 2008,44(16): 114-117. | |
[22] | AMIN R , BISWAS G P . A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks[J]. Ad Hoc Networks, 2016,36(1): 58-80. |
[23] | SRINIVAS J , MUKHOPADHYAY S , MISHRA D . Secure and efficient user authentication scheme for multi-gateway wireless sensor networks[J]. Ad Hoc Networks, 2017,54: 147-169. |
[24] | REDDY A G , DAS A K , YOON E J ,et al. A secure anonymous authentication protocol for mobile services on elliptic curve cryptography[J]. IEEE Access, 2016(4): 4394-4407. |
[25] | SHAO M , HU W , ZHU S ,et al. Cross-layer enhanced source location privacy in sensor networks[C]// 6th Annual IEEE Communications Society Conference on Sensor,Mesh and Ad Hoc Communications and Networks. 2009: 1-9. |
[26] | XING Y , CHEN Y , YI W ,et al. Optimal beacon interval for TDMA-based MAC in wireless sensor networks[C]// 11th International Conference on Innovations in Information Technology (IIT). 2015: 156-161. |
[27] | HUANG P , LIU C J , XIAO L . TAS-MAC:a traffic-adaptive synchronous MAC protocol for wireless sensor networks[J]. ACM Transaction Sensor Network, 2016,12(1): 1-30. |
[28] | ZHOU L , WAN C , HUANG J ,et al. The location privacy of wireless sensor networks:attacks and countermeasures[C]// Ninth International Conference on Broadband and Wireless Computing,Communication and Applications (BWCCA). 2014: 64-71. |
[29] | POTTIE G J , KAISER W J . Wireless integrated network sensors[J]. Communication ACM, 2000,43(5): 51-58. |
[1] | 赵越, 李赞, 李冰, 郝本建. TDoA定位盲区分析与节点部署策略研究[J]. 通信学报, 2023, 44(1): 1-13. |
[2] | 李翠然, 王雪洁, 谢健骊, 吕安琪. 基于改进PSO的铁路监测线性无线传感器网络路由算法[J]. 通信学报, 2022, 43(5): 155-165. |
[3] | 杜秀娟, 王丽娟, 刘静萍, 金龙. 基于归零神经动力学的水下无线传感器网络节点测距定位方法[J]. 通信学报, 2022, 43(10): 177-185. |
[4] | 晏燕, 丛一鸣, Adnan Mahmood, 盛权政. 基于深度学习的位置大数据统计发布与隐私保护方法[J]. 通信学报, 2022, 43(1): 203-216. |
[5] | 李洪涛, 任晓宇, 王洁, 马建峰. 基于差分隐私的连续位置隐私保护机制[J]. 通信学报, 2021, 42(8): 164-175. |
[6] | 孙爱晶, 李世昌, 张艺才. 基于PSO优化模糊C均值的WSN分簇路由算法[J]. 通信学报, 2021, 42(3): 91-99. |
[7] | 叶阿勇,孟玲玉,赵子文,刁一晴,张娇美. 基于预测和滑动窗口的轨迹差分隐私保护机制[J]. 通信学报, 2020, 41(4): 123-133. |
[8] | 王洁,王春茹,马建峰,李洪涛. 基于位置语义和查询概率的假位置选择算法[J]. 通信学报, 2020, 41(3): 53-61. |
[9] | 王天荆,李秀琴,白光伟,沈航. 无线传感器网络中基于自适应网格的多目标定位算法[J]. 通信学报, 2019, 40(7): 197-207. |
[10] | 李维皓,曹进,李晖. 基于位置服务隐私自关联的隐私保护方案[J]. 通信学报, 2019, 40(5): 57-66. |
[11] | 郝晓辰,姚宁,解力霞,王姣姣,王立元. 联合功率与信道的WSN生命期优化博弈算法[J]. 通信学报, 2019, 40(4): 62-70. |
[12] | 刘琳岚,高声荣,舒坚. 基于随机森林的链路质量预测[J]. 通信学报, 2019, 40(4): 202-211. |
[13] | 张文静,刘樵,朱辉. 基于信息论方法的多等级位置隐私度量与保护[J]. 通信学报, 2019, 40(12): 51-59. |
[14] | 武小年,张楚芸,张润莲,孙亚平. WSN中基于改进粒子群优化算法的分簇路由协议[J]. 通信学报, 2019, 40(12): 114-123. |
[15] | 刘浩然,赵赫瑶,邓玉静,王星淇,尹荣荣. 基于非合作博弈的无线传感器网络覆盖控制算法[J]. 通信学报, 2019, 40(1): 71-78. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||
|