期刊文献+

WSNs中基于攻击感知的源位置隐私保护路由协议 被引量:3

Attack-perception-based Source-Location Privacy Protection Routing Protocol in Wireless Sensor Networks
在线阅读 下载PDF
导出
摘要 为保护无线传感网络(Wireless Sensor Networks,WSNs)中的源节点位置隐私,提出基于攻击感知的源位置隐私保护路由(Attack-perceiving-based Source-Location Privacy protecting routing,ASPR)。通过sink广播消息,节点获取局部的网络拓扑信息,并建立邻居列表;源节点再计算邻居节点的权重值,并选择权重最小的节点构建路由;当检测到攻击者,节点就发生警告消息,并调整构建路由策略,使攻击无法回溯源节点。仿真实验表明,提出的ASPR路由延长了源节点保持位置隐私的时间,减少了节点能耗,在安全性和网络能耗间达到平衡。 In order to ensure the location privacy of source node in Wireless Sensor Networks(WSNs),attack-perception-based source-location privacy protecting routing(ASPR)is proposed.By messages broadcasted from sink,nodes get the local network topology information and establish a neighbor list.The source node then computes the weight value of the neighbor node and selects the nodes with the smallest weight to construct the routing.When an attacker is detected,the node sends a warning message and adjusts the routing building policy so that the attack cannot get back to the source node.The simulation results show that the proposed ASPR routing extends the safety time for source nodes to maintain location privacy and reduces the energy consumption of nodes,a balance between security and network energy consumption can be achieved.
作者 蔡威 CAI Wei(College of Information Engineering,Zhengzhou University of Industrial Technology,Zhengzhou 451150,China)
出处 《火力与指挥控制》 CSCD 北大核心 2021年第10期121-125,130,共6页 Fire Control & Command Control
基金 河南省科技厅科技攻关支持项目(202102210361)。
关键词 无线传感网络 源节点 位置隐私保护 攻击感知 路由协议 wireless sensor networks,source node source location privacy protection,attack-perception,routing protocol
作者简介 蔡威(1981-)男,河南罗山人,讲师。研究方向:智能信息处理。
  • 相关文献

参考文献12

二级参考文献63

  • 1刘强,黄小红,冷延鹏,李龙江,毛玉明.Deployment Strategy of Wireless Sensor Networks for Internet of Things[J].China Communications,2011,8(8):111-120. 被引量:29
  • 2董颖,苏真真,周占颖,肖匡心.一种基于节点剩余能量和位置的LEACH改进算法[J].四川大学学报(工程科学版),2015,47(2):136-141. 被引量:9
  • 3龚海刚,刘明,余昌远,王晓敏,陈力军.无线传感器网络环境下基于事件驱动应用的节能TDMA协议[J].电子学报,2007,35(10):1843-1848. 被引量:16
  • 4Song J H,Wong V W S, Leung V C M. Wireless Location PrivacyProtection in Vehicular Ad-Hoc Networks[J]. Mobile Networks &Applications, 2010,15( 1): 1-6.
  • 5Mehta K, Liu D, Wright M. Protecting Location Privacy in SensorNetworks against a Global Eavesdropper [J], IEEE Transactionson Mobile Computing,2012,11(2):320-336.
  • 6Na Li, Nan Zhang, Sajal K Das, et al. Privacy Preservation inWireless Sensor Networks: A State-of-the-Art Survey [J]. Ad HocNetworks,2009,7(8) : 1501-1514.
  • 7Mahmoud M M E A, Shen X. A Cloud-Based Scheme for Protect-ing Source- Location Privacy Against Hotspot- Locating Attack inWireless Sensor Networks [J]. IEEE Transactions on Parallel &Distributed Systems,2011,23(10) : 1805-1818.
  • 8Chaum D. Untraceable Electronic Mail, Return Addresses, andDigital Pseudonyms [J]. Communications of the Acm, 1981,24?2):211-219.
  • 9Syverson P F,Goldschlag D M,Reed M G. Anonymous Connec-tions and Onion Routing [J].IEEE Journal on Selected Areas inCommunications, 1998,16(4) : 482-494.
  • 10Kong J, Hong X. ANODH: ANonymous on Demand Routing withUntraceable Routes for Mobile Ad-Hoc Networks [J]. In Proceed-ings of Acm International(Mobihoc * 03) ,2003:291-302.

共引文献87

同被引文献34

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部