Journal on Communications ›› 2018, Vol. 39 ›› Issue (1): 101-116.doi: 10.11959/j.issn.1000-436x.2018001
• Papers • Previous Articles Next Articles
Qian ZHOU1,2,Xiaolin QIN1,2,Youwei DING1,2
Revised:
2017-12-02
Online:
2018-01-01
Published:
2018-02-07
Supported by:
CLC Number:
Qian ZHOU,Xiaolin QIN,Youwei DING. Preserving source-location privacy efficiently based on attack-perceiving in wireless sensor network[J]. Journal on Communications, 2018, 39(1): 101-116.
[1] | 牛晓光, 魏川博, 姚亚兰 . 传感网中能量均衡高效的源位置隐私保护协议[J]. 通信学报, 2016,37(4): 23-33. |
NIU X G , WEI C B , YAO Y L . Energy-consumption-balanced efficient source-location privacy preserving protocol in WSN[J]. Journal on Communication, 2016,37(4): 23-33. | |
[2] | LIGHTFOOT L , LI Y , REN J . STaR:design and quantitative measurement of source-location privacy for wireless sensor networks[J]. Secur Commun Netw, 2016,9(3): 220-228. |
[3] | 周倩, 秦小麟, 丁有伟 . 无线传感器网络中基于哈希函数的上下文隐私保护[J]. 南京理工大学学报, 2017,41(6): 753-759. |
ZHOU Q , QIN X L , DING Y W . Hash-based contextual privacy preservation in wireless sensor networks[J]. Journal of Nanjing University of Science and Technology, 2017,41(6): 753-759. | |
[4] | KAMAT P , ZHANG Y , TRAPPE W ,et al. Enhancing source-location privacy in sensor network routing[C]// 25th IEEE International Conference on Distributed Computing Systems(ICDCS). 2005: 599-608. |
[5] | ZHANG Y , WANG G , HU Q ,et al. Design and performance study of a topology-hiding multipath routing protocol for mobile ad hoc networks[C]// IEEE INFOCOM. 2012: 10-18. |
[6] | RAHAT A A M , EVERSON R M , FIELDSEND J E . Evolutionary multi-path routing for network lifetime and robustness in wireless sensor networks[J]. Ad Hoc Netw, 2016(52): 130-145. |
[7] | MEHTA K , LIU D , WRIGHT M . Protecting location privacy in sensor networks against a global eavesdropper[J]. IEEE Trans Mob Comput, 2012,11(2): 320-336. |
[8] | YANG Y , SHAO M , ZHU S ,et al. Towards statistically strong source anonymity for sensor networks[J]. ACM Trans Sen Netw, 2013,9(2): 1-23. |
[9] | LOUREN?O P , BATISTA P , OLIVEIRA P ,et al. Simultaneous localization and mapping in sensor networks:a GES sensor-based filter with moving object tracking[C]// European Control Conference (ECC). 2015: 2354-2359. |
[10] | NANDHINI S A , RADHA S . Compressed sensing based object detection and tracking system using measurement selection process for wireless visual sensor networks[C]// International Conference on Wireless Communications,Signal Processing and Networking (WiSPNET). 2016: 1117-1122. |
[11] | APICHARTTRISORN D , APICHARTTRISORN K , KASETKASEM T . A moving object tracking algorithm using support vector machines in binary sensor networks[C]// 13th International Symposium on Communications and Information Technologies (ISCIT). 2013: 529-534. |
[12] | RIOS R , LOPEZ J . Exploiting context-awareness to enhance source-location privacy in wireless sensor networks[J]. Oxford University Press, 2011,54(10): 1603-1615. |
[13] | BURATTI C . Performance analysis of IEEE 802.15.4 beacon-enabled mode[J]. IEEE Transactions on Vehicular Technology, 2010,59(4): 2031-2045. |
[14] | BRADBURY M , LEEKE M , JHUMKA A . A dynamic fake source algorithm for source location privacy in wireless sensor networks[C]// IEEE Trustcom/BigDataSE/ISPA. 2015: 531-538. |
[15] | OUYANG Y , LE Z , LIU D ,et al. Source location privacy against laptop-class attacks in sensor networks[C]// The 4th International Conference on Security and Privacy in Communication Networks. 2008: 5-10. |
[16] | RAJ M , LI N , LIU D ,et al. Using data mules to preserve source location privacy in wireless sensor networks[J]. Pervasive & Mobile Computing, 2014(11): 244-260. |
[17] | JHUMKA A , LEEKE M , SHRESTHA S . On the use of fake sources for source location privacy:trade-offs between energy and privacy[J]. Computer Journal, 2011,54(6): 860-874. |
[18] | SHI R , GOSWAMI M , GAO J ,et al. Is random walk truly memoryless traffic analysis and source location privacy under random walks[C]// IEEE INFOCOM. 2013: 3021-3029. |
[19] | XI Y , SCHWIEBERT L , SHI W . Preserving source location privacy in monitoring-based wireless sensor networks[C]// 20th IEEE International Parallel Distributed Processing Symposium. 2006. |
[20] | ALOMAIR B , CLARK A , CUELLAR J ,et al. Toward a statistical framework for source anonymity in sensor networks[J]. IEEE Transactions on Mobile Computing, 2013,12(2): 248-260. |
[21] | 吴博, 胡小龙 . WSN中基于假路径的源位置保护策略[J]. 计算机工程与应用, 2008,44(16): 114-117. |
WU B , HU X L . Strategy of protecting source-location privacy in WSN based on fake paths[J]. Computer Engineering and Applications, 2008,44(16): 114-117. | |
[22] | AMIN R , BISWAS G P . A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks[J]. Ad Hoc Networks, 2016,36(1): 58-80. |
[23] | SRINIVAS J , MUKHOPADHYAY S , MISHRA D . Secure and efficient user authentication scheme for multi-gateway wireless sensor networks[J]. Ad Hoc Networks, 2017,54: 147-169. |
[24] | REDDY A G , DAS A K , YOON E J ,et al. A secure anonymous authentication protocol for mobile services on elliptic curve cryptography[J]. IEEE Access, 2016(4): 4394-4407. |
[25] | SHAO M , HU W , ZHU S ,et al. Cross-layer enhanced source location privacy in sensor networks[C]// 6th Annual IEEE Communications Society Conference on Sensor,Mesh and Ad Hoc Communications and Networks. 2009: 1-9. |
[26] | XING Y , CHEN Y , YI W ,et al. Optimal beacon interval for TDMA-based MAC in wireless sensor networks[C]// 11th International Conference on Innovations in Information Technology (IIT). 2015: 156-161. |
[27] | HUANG P , LIU C J , XIAO L . TAS-MAC:a traffic-adaptive synchronous MAC protocol for wireless sensor networks[J]. ACM Transaction Sensor Network, 2016,12(1): 1-30. |
[28] | ZHOU L , WAN C , HUANG J ,et al. The location privacy of wireless sensor networks:attacks and countermeasures[C]// Ninth International Conference on Broadband and Wireless Computing,Communication and Applications (BWCCA). 2014: 64-71. |
[29] | POTTIE G J , KAISER W J . Wireless integrated network sensors[J]. Communication ACM, 2000,43(5): 51-58. |
[1] | Xin SUN, Guifu ZHANG, Hongyan XING, Wang Zenghui. Research on intrusion detection for maritime meteorological sensor network based on balancing generative adversarial network [J]. Journal on Communications, 2023, 44(4): 124-136. |
[2] | Yue ZHAO, Zan LI, Bing LI, Benjian HAO. TDoA localization-refused area analysis and node placement strategy research [J]. Journal on Communications, 2023, 44(1): 1-13. |
[3] | Peng QIN, Haoting HE, Xiongwen ZHAO, Yang FU, Yu ZHANG, Miao WANG, Shuo WANG, Xue WU. Efficient resource allocation with context-awareness for parked car road side unit-based Internet of vehicles [J]. Journal on Communications, 2022, 43(7): 113-125. |
[4] | Cuiran LI, Xuejie WANG, Jianli XIE, Anqi LYU. Routing algorithm for railway monitoring linear WSN based on improved PSO [J]. Journal on Communications, 2022, 43(5): 155-165. |
[5] | Xiujuan DU, Lijuan WANG, Jingping LIU, Long JIN. Ranging localization method for nodes in underwater wireless sensor network based on zeroing neural dynamics [J]. Journal on Communications, 2022, 43(10): 177-185. |
[6] | Yan YAN, Yiming CONG, Mahmood Adnan, Quanzheng SHENG. Statistics release and privacy protection method of location big data based on deep learning [J]. Journal on Communications, 2022, 43(1): 203-216. |
[7] | Hongtao LI, Xiaoyu REN, Jie WANG, Jianfeng MA. Continuous location privacy protection mechanism based on differential privacy [J]. Journal on Communications, 2021, 42(8): 164-175. |
[8] | Aijing SUN, Shichang LI, Yicai ZHANG. WSN clustering routing algorithm based on PSO optimized fuzzy C-means [J]. Journal on Communications, 2021, 42(3): 91-99. |
[9] | Zhenyu ZHOU, Zehan JIA, Haijun LIAO, Xiongwen ZHAO, Lei ZHANG. Context-aware learning-based access control method for power IoT [J]. Journal on Communications, 2021, 42(3): 150-159. |
[10] | Yanjing SUN,Junqiu YANG,Yan CHEN,Yanfen WANG,Xiaojing CHEN,Fengzhen LIU,Zhi SUN. RAW online regrouping method in IEEE 802.11ah protocol for industrial Internet of things [J]. Journal on Communications, 2020, 41(4): 92-101. |
[11] | Ayong YE,Lingyu MENG,Ziwen ZHAO,Yiqing DIAO,Jiaomei ZHANG. Trajectory differential privacy protection mechanism based on prediction and sliding window [J]. Journal on Communications, 2020, 41(4): 123-133. |
[12] | Jie WANG,Chunru WANG,Jianfeng MA,Hongtao LI. Dummy location selection algorithm based on location semantics and query probability [J]. Journal on Communications, 2020, 41(3): 53-61. |
[13] | Junbin LIANG,Xiang ZHOU,Fangqiang MA,Chan JIANG,Zongjian HE. Low-latency neighbor discovery algorithm based on multi-beacon message in mobile low-duty-cycle sensor network [J]. Journal on Communications, 2019, 40(8): 178-188. |
[14] | Yongjun XU,Yuan HU,Guoquan LI,Jinzhao LIN,Qianbin CHEN. Robust resource allocation algorithm for heterogeneous wireless networkwith SWIPT [J]. Journal on Communications, 2019, 40(7): 186-196. |
[15] | Tianjing WANG,Xiuqin LI,Guangwei BAI,Hang SHEN. Multi-target localization algorithm based on adaptive grid in wireless sensor network [J]. Journal on Communications, 2019, 40(7): 197-207. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|