|Table of Contents|

Preserving receiver-location privacy based on Kautz graph in WSNs(PDF)


Research Field:
Publishing date:


Preserving receiver-location privacy based on Kautz graph in WSNs
Zhou Qian12Qin Xiaolin12Liu Liang12
1.College of Computer Science and Technology; 2.Jiangsu Key Laboratory of Internet of Thingsand Control Technologies,Nanjing University of Aeronautics and Astronautics,Nanjing 211106,China
wireless sensor networks Kautz graph distributed hash tables location privacy network security
TP309; TP393
In wireless sensor networks,attackers are easy to trace data packets by eavesdropping the traffic and capture the sink nodes. The existing methods of preserving receiver-location privacy usually increases energy consumption by using false packets,raises the delay by probability-based forwarding,and reduces the delivery rate of packets. In order to protect the sink location privacy,a novel zoning patrol approach(ZPA)is proposed based on the Kautz graph. The ZPA can make the network have higher privacy performance and increase the robustness of the network. By using the tree topology constructed in the distributed hash table(DHT),the data packet is transmitted to the intersection point of each partition,and finally routed to the sink node to complete data delivery. The theoretical analysis and simulation experiments show that,compared with the traditional method,the ZPA can reduce the delay by about 52% and the energy consumption by 93%.


[1] 周倩,秦小麟,丁有伟. 无线传感器网络中基于哈希函数的上下文隐私保护[J]. 南京理工大学学报,2017,41(6):753-759.
Zhou Qian,Qin Xiaolin,Ding Youwei. Hash-based contextual privacy preservation in wireless sensor networks[J]. Journal of Nanjing University of Science and Technology,2017,41(6):753-759.
[2]刘方斌,刘凤玉,张宏. 基于零知识证明的低能耗Ad Hoc 网络匿名路由协议[J]. 南京理工大学学报,2012,36(5):879-885.
Liu Fangbin,Liu Fengyu,Zhang Hong. Energy efficient anonymous routing protocol for Ad Hoc network based on zero knowledge proofs[J]. Journal of Nanjing University of Science and Technology,2012,36(5):879-885.
[3]Fan Y,Jiang Y,Zhu H,et al. An efficient privacy-preserving scheme against traffic analysis attacks in network coding[C]//IEEE INFOCOM 2009. Rio de Janeiro,Brazil:IEEE,2009:2213-2221.
[4]王涛春,秦小麟,刘亮,等. 无线传感器网络中安全高效的空间数据聚集算法[J]. 软件学报,2014,25(8):1671-1684.
Wang Taochun,Qin Xiaolin,Liu Liang,et al. Secure and energy-efficient spatial data aggregation algorithm in wireless sensor networks[J]. Journal of Software,2014,25(8):1671-1684.
[5]Kamat P,Zhang Y,Trappe W,et al. Enhancing source-location privacy in sensor network routing[C]//25th IEEE International Conference on Distributed Computing Systems. Columbus,US:IEEE,2005:599-608.
[6]Azzabi T,Farhat H,Sahli N. A survey on wireless sensor networks security issues and military specificities[C]//2017 International Conference on Advanced Systems and Electric Technologies. Hammamet,Tunisia:IEEE,2017:66-72.
[7]周倩,秦小麟,丁有伟. 基于攻击感知的能量高效源位置隐私保护算法[J]. 通信学报,2018,39(1):101-116.
Zhou Qian,Qin Xiaolin,Ding Youwei. Preserving source-location privacy efficiently based on attack-perceiving in wireless sensor network[J]. Journal on Communications,2018,39(1):101-116.
[8]Rios R,Cuellar J,Lopez J. Robust probabilistic fake packet injection for receiver-location privacy in WSN[C]//Computer Security-ESORICS. Pisa,Italy:Springer,2012:163-180.
[9]Deng J,Han R,Mishra S. Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks[C]//International Conference on Dependable Systems and Networks. Florence,Italy:IEEE Computer Society,2004:637-646.
[10]Deng J,Han R,Mishra S. Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks[J]. Pervasive and Mobile Computing,2006(2):159-186.
[11]Deng J,Han R,Mishra S. Countermeasures against traffic analysis attacks in wireless sensor networks[C]//First International Conference on Security and Privacy for Emerging Areas in Communications Networks(SECURECOMM’05). Athens,Greece:IEEE,2005:113-126.
[12]Jian Y,Chen S,Zhang Z,et al. Protecting receiver-location privacy in wireless sensor networks[C]//IEEE INFOCOM 2007-26th IEEE International Conference on Computer Communications. Barcelona,Spain:IEEE,2007:1955-1963.
[13]Mehta K,Liu D,Wright M. Protecting location privacy in sensor networks against a global eavesdropper[J]. IEEE Transactions on Mobile Computing,2012,11(2):320-336.
[14]Xu Junming. Combinatorial theory in networks[M]. Beijing,China:Science Press,2013.
[15]Miller M. Moore graphs and beyond:A survey of the degree/diameter problem[J]. Electronic Journal of Combinatorics,2005,61:1-63.
[16]Sanchez J A,Ruiz P M,Stojmenovic I. Energy-efficient geographic multicast routing for sensor and actuator networks[J]. Comput Commun(Elsevier),2007,30(13):2519-2531.
[17]Pottie G J,Kaiser W J. Wireless integrated network sensors[J]. Commun ACM,2000,43(5):51-58.


Last Update: 2018-04-30