|Table of Contents|

Hash-based contextual privacy preservation in wirelesssensor networks(PDF)


Research Field:
Publishing date:


Hash-based contextual privacy preservation in wirelesssensor networks
Zhou Qian 12Qin Xiaolin12Ding Youwei12
1.College of Computer Science and Technology; 2.Jiangsu Key Laboratory of Internet of Things andControl Technologies,Nanjing University of Aeronautics and Astronautics,Nanjing 211106,China
wireless sensor networks Hash contextual privacy preservation the onion router heartbeat packet phantom routing anonymity
TP309; TP393
A maze circle approach(MCA)is proposed based on the node anonymity of Hash to hinder an attacker inferring the location privacy of the key asset by using the context correlation in event-driven sensor networks.Compared with the onion router(Tor),heartbeat packet,phantom routing,MCA is a secure routing protocol which can achieve both node anonymity and contextual privacy by one mechanism.Compared with phantom routing,MCA can decrease the latency and energy consumption by 25%.


[1] 王会霞,李 娜.无线传感器网络中基于能量感知的QoS路由协议[J].南京理工大学学报,2016,40(4):467-471.
Wang Huixia,Li Na.Energy awareness based QoS routing protocol in wireless sensor network[J].Journal of Nanjing University of Science and Technology,2016,40(4):467-471.
[2]WWF Global.WWF conserves our planet,habitats,species like the Panda Tiger[EB/OL].http://wwf.panda.org/,2017-09-24.
[3]Palmieri P.Preserving context privacy in distributed Hash table wireless sensor networks[C]//Information and Communications Security.Beijing,China:Springe,2015:436-444.
Pan Xiao,Xiao Zhen,Meng Xiaofeng.Protecting location privacy in mobile environments[J].Journal of Frontiers of Computer Science and Technology,2007,1(3):268-281.
[5]Spiryakin D,Baranov A,Sleptsov V,et al.Design of smart dust sensor node for combustible gas leakage monitoring[EB/OL].http://pdfs.semanticscholar.org/9b79/ea6d5c97fc3fcb74ad0d5e0a5910a047fd04.pdf,2017-12-03.
[6]刘方斌,刘凤玉,张宏.基于零知识证明的低能耗Ad Hoc 网络匿名路由协议[J].南京理工大学学报,2012,36(5):879-885.
Liu Fangbin,Liu Fengyu,Zhang Hong.Energy efficient anonymous routing protocol for ad hoc network based on zero knowledge proofs[J].Journal of Nanjing University of Science and Technology,2012,36(5):879-885.
[7]Al-Riyami A,Zhang Ning,Keane J.Impact of Hash value truncation on ID anonymity in wireless sensor networks[J].Ad Hoc Networks,2016,45:80-103.
[8]Park J H,Jung Y H,Lee K H.A new privacy scheme for providing anonymity technique on sensor network[C]//2011 International Conference on Ubiquitous Computing and Multimedia Applications.Daejeon,South Korea:IEEE,2011:10-14.
[9]Abdullahi M B,Wang Guojun.A lightweight anonymous on-demand routing scheme in wireless sensor networks[C]//12th IEEE International Conference on Trust,Security and Privacy in Computing and Communications.Melbourne,Victoria,Australia:IEEE,2012:978-985.
[10]Kamat P,Zhang Yanyong,Trappe W,et al.Enhancing source-location privacy in sensor network routing[C]//25th International Conference on Distributed Computing Systems.Columbus,OH,USA:IEEE Computer Society,2005:599-608.
[11]Mehta K,Liu Donggang,Wright M.Protecting location privacy in sensor networks against a global eavesdropper[J].IEEE Transactions on Mobile Computing,2012,11(2):320-336.
[12]Bradbury M,Leeke M,Jhumka A.A dynamic fake source algorithm for source location privacy in wireless sensor networks[C]//Proceedings of the 2015 IEEE Trustcom/BigDataSE/ISPA.Helsinki,Finland:IEEE,2015:531-538.
[13]Syverson P,Goldschlag D M,Reed M.G.Anonymous connections and onion routing[C]//IEEE Symposium on Security and Privacy.Oakland,CA,USA:IEEE,1997:44-54.
[14]Shao Min,Hu Wenhui,Zhu Sencun,et al.Cross-layer enhanced source location privacy in sensor networks[C]//6th Annual IEEE Communications Society Conference on Sensor,Mesh and Ad Hoc Communications and Networks.Rome,Italy:IEEE,2009:1-9.


Last Update: 2017-12-31