首页 | 官方网站   微博 | 高级检索  
     

WSN中基于等高度路由的源位置隐私保护
引用本文:周玲玲,石润华,仲红,章青.WSN中基于等高度路由的源位置隐私保护[J].计算机工程,2014(6):89-94.
作者姓名:周玲玲  石润华  仲红  章青
作者单位:[1]安徽大学计算智能与信号处理教育部重点实验室,合肥230039 [2]安徽大学计算机科学与技术学院,合肥230601
基金项目:国家自然科学基金资助项目(61173187,61173188);安徽省自然科学基金资助项目(11040606M141);安徽大学博士科研启动经费基金资助项目(33190187);安徽大学“信息安全”新专业基金资助项目(17110099).
摘    要:在无线传感器网络中,网络中的攻击者可以通过逆向、逐跳追踪数据包的方式追踪到源节点的位置,进而危害目标对象,所以对源位置的隐私保护很重要,但已有保护源位置隐私的幻影路由协议可能产生失效路径,从而缩短安全时间。为此,提出一种有向等高度路由与幻影路由相结合的源位置隐私保护协议。数据包在进行幻影路由之前先进行h+r跳的有向等高度路由,之后再发起幻影路由过程,以避免失效路径的产生,并增加有效路径的数量。实验结果表明,当源节点位置不变时,增加少量的数据包转发开销,源节点的安全时间可以增加50%,当源节点位置变换频繁时,通信开销也明显低于PUSBRF等协议。

关 键 词:无线传感器网络  源位置  隐私保护  等高度路由  失效路径  有效路径

Source-location Privacy Preservation Based on Constant Altitude Routing in Wireless Sensor Networks
ZHOU Ling-ling,SHI Run-hua,ZHONG Hong,ZHANG Qing.Source-location Privacy Preservation Based on Constant Altitude Routing in Wireless Sensor Networks[J].Computer Engineering,2014(6):89-94.
Authors:ZHOU Ling-ling  SHI Run-hua  ZHONG Hong  ZHANG Qing
Affiliation:1. Key Laboratory of Intelligent Computing & Signal Processing, Ministry of Education, Anhui University, Hefei 230039, China; 2. School of Computer Science and Technology, Anhui University, Hefei 230601, China)
Abstract:In Wireless Sensor Network(WSN), the attacker can reverse locate the location of the source node hop-by-hop and further attack the protected object, so it is essential to protect the source location privacy. For the shortage of routing through the visible area and further shortening the secure time in the existing phantom routing protocols, this paper proposes a new source-location privacy preservation protocol combining the directed constant altitude routing with phantom routing. Theoretical analysis indicates that this protocol completely avoids the failure path and increases the number of the effective paths, and thus it can improve the secure time. Simulation experimental results show that while source node's location is fixed, the protocol can improve the safety time by 50% with litter packet latency and when source location changes frequently, the protocol has obvious advantages in communication compared with the PUSBRF.
Keywords:Wireless Sensor Network(WSN)  source-location  privacy preservation  constant altitude routing  failure path  effective path
本文献已被 CNKI 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号