[1]周 倩,秦小麟,丁有伟.无线传感器网络中基于哈希函数的上下文隐私保护[J].南京理工大学学报(自然科学版),2017,41(06):753.[doi:10.14177/j.cnki.32-1397n.2017.41.06.014]
 Zhou Qian,Qin Xiaolin,Ding Youwei.Hash-based contextual privacy preservation in wirelesssensor networks[J].Journal of Nanjing University of Science and Technology,2017,41(06):753.[doi:10.14177/j.cnki.32-1397n.2017.41.06.014]
点击复制

无线传感器网络中基于哈希函数的上下文隐私保护()
分享到:

《南京理工大学学报》(自然科学版)[ISSN:1005-9830/CN:32-1397/N]

卷:
41卷
期数:
2017年06期
页码:
753
栏目:
出版日期:
2017-12-31

文章信息/Info

Title:
Hash-based contextual privacy preservation in wirelesssensor networks
文章编号:
1005-9830(2017)06-0753-07
作者:
周 倩12秦小麟12丁有伟12
南京航空航天大学 1.计算机科学与技术学院; 2.江苏省物联网与控制技术重点实验室,江苏 南京 211106
Author(s):
Zhou Qian 12Qin Xiaolin12Ding Youwei12
1.College of Computer Science and Technology; 2.Jiangsu Key Laboratory of Internet of Things andControl Technologies,Nanjing University of Aeronautics and Astronautics,Nanjing 211106,China
关键词:
无线传感器网络 哈希函数 上下文隐私保护 洋葱路由 心跳包路由 幻影路由 身份匿名
Keywords:
wireless sensor networks Hash contextual privacy preservation the onion router heartbeat packet phantom routing anonymity
分类号:
TP309; TP393
DOI:
10.14177/j.cnki.32-1397n.2017.41.06.014
摘要:
在事件驱动的传感器网络中,为了阻止攻击者利用网络上下文的相关性推断出关键资产的位置隐私信息,该文基于哈希函数的节点匿名方法提出了1种迷宫环机制(MCA)。与洋葱路由(Tor)、心跳包路由和幻影路由相比,MCA是1种可以实现节点的身份匿名和保护位置隐私的安全路由协议。与幻影路由相比,MCA可降低延时和能耗达25%。
Abstract:
A maze circle approach(MCA)is proposed based on the node anonymity of Hash to hinder an attacker inferring the location privacy of the key asset by using the context correlation in event-driven sensor networks.Compared with the onion router(Tor),heartbeat packet,phantom routing,MCA is a secure routing protocol which can achieve both node anonymity and contextual privacy by one mechanism.Compared with phantom routing,MCA can decrease the latency and energy consumption by 25%.

参考文献/References:

[1] 王会霞,李 娜.无线传感器网络中基于能量感知的QoS路由协议[J].南京理工大学学报,2016,40(4):467-471.
Wang Huixia,Li Na.Energy awareness based QoS routing protocol in wireless sensor network[J].Journal of Nanjing University of Science and Technology,2016,40(4):467-471.
[2]WWF Global.WWF conserves our planet,habitats,species like the Panda Tiger[EB/OL].http://wwf.panda.org/,2017-09-24.
[3]Palmieri P.Preserving context privacy in distributed Hash table wireless sensor networks[C]//Information and Communications Security.Beijing,China:Springe,2015:436-444.
[4]潘晓,肖珍,孟小峰.移动环境下的位置隐私[J].计算机科学与探索,2007,1(3):268-281.
Pan Xiao,Xiao Zhen,Meng Xiaofeng.Protecting location privacy in mobile environments[J].Journal of Frontiers of Computer Science and Technology,2007,1(3):268-281.
[5]Spiryakin D,Baranov A,Sleptsov V,et al.Design of smart dust sensor node for combustible gas leakage monitoring[EB/OL].http://pdfs.semanticscholar.org/9b79/ea6d5c97fc3fcb74ad0d5e0a5910a047fd04.pdf,2017-12-03.
[6]刘方斌,刘凤玉,张宏.基于零知识证明的低能耗Ad Hoc 网络匿名路由协议[J].南京理工大学学报,2012,36(5):879-885.
Liu Fangbin,Liu Fengyu,Zhang Hong.Energy efficient anonymous routing protocol for ad hoc network based on zero knowledge proofs[J].Journal of Nanjing University of Science and Technology,2012,36(5):879-885.
[7]Al-Riyami A,Zhang Ning,Keane J.Impact of Hash value truncation on ID anonymity in wireless sensor networks[J].Ad Hoc Networks,2016,45:80-103.
[8]Park J H,Jung Y H,Lee K H.A new privacy scheme for providing anonymity technique on sensor network[C]//2011 International Conference on Ubiquitous Computing and Multimedia Applications.Daejeon,South Korea:IEEE,2011:10-14.
[9]Abdullahi M B,Wang Guojun.A lightweight anonymous on-demand routing scheme in wireless sensor networks[C]//12th IEEE International Conference on Trust,Security and Privacy in Computing and Communications.Melbourne,Victoria,Australia:IEEE,2012:978-985.
[10]Kamat P,Zhang Yanyong,Trappe W,et al.Enhancing source-location privacy in sensor network routing[C]//25th International Conference on Distributed Computing Systems.Columbus,OH,USA:IEEE Computer Society,2005:599-608.
[11]Mehta K,Liu Donggang,Wright M.Protecting location privacy in sensor networks against a global eavesdropper[J].IEEE Transactions on Mobile Computing,2012,11(2):320-336.
[12]Bradbury M,Leeke M,Jhumka A.A dynamic fake source algorithm for source location privacy in wireless sensor networks[C]//Proceedings of the 2015 IEEE Trustcom/BigDataSE/ISPA.Helsinki,Finland:IEEE,2015:531-538.
[13]Syverson P,Goldschlag D M,Reed M.G.Anonymous connections and onion routing[C]//IEEE Symposium on Security and Privacy.Oakland,CA,USA:IEEE,1997:44-54.
[14]Shao Min,Hu Wenhui,Zhu Sencun,et al.Cross-layer enhanced source location privacy in sensor networks[C]//6th Annual IEEE Communications Society Conference on Sensor,Mesh and Ad Hoc Communications and Networks.Rome,Italy:IEEE,2009:1-9.

相似文献/References:

[1]王力立,徐志良,吴晓蓓,等.感知能力异构的无线传感器网络优化部署机制[J].南京理工大学学报(自然科学版),2012,36(03):408.
 WANG Li-li,XU Zhi-liang,WU Xiao-bei,et al.Optimal Deployment Scheme in Sensing-heterogeneous Wireless Sensor Networks[J].Journal of Nanjing University of Science and Technology,2012,36(06):408.
[2]杨靖,秦宁宁,徐迈,等.传感器网络中基于簇的多路径路由协议[J].南京理工大学学报(自然科学版),2012,36(01):49.
 YANG Jing,QIN Ning-ning,XU Mai,et al.Cluster-based Multipath Routing Protocol for Wireless Sensor Networks[J].Journal of Nanjing University of Science and Technology,2012,36(06):49.
[3]高德民,钱焕延,严筱永,等.无线传感器网络最大生命期数据融合算法[J].南京理工大学学报(自然科学版),2012,36(01):55.
 GAO De-min,QIAN Huan-yan,YAN Xiao-yong,et al.Maximum Lifetime Data Aggregation Algorithm for Wireless Sensor Networks[J].Journal of Nanjing University of Science and Technology,2012,36(06):55.
[4]刘宇雷,秦小麟,沈佳佳.能量有效的传感器网络不规则区域时空查询处理算法[J].南京理工大学学报(自然科学版),2011,(01):31.
 LIU Yu-lei,QIN Xiao-lin,SHEN Jia-jia.Energy-efficient Spatio-temporal Query Processing Algorithm on Irregular Region over Sensor Network[J].Journal of Nanjing University of Science and Technology,2011,(06):31.
[5]蒋立平,谭雪琴,姜萍.数据关联的分布式算法[J].南京理工大学学报(自然科学版),2010,(02):243.
 JIANG Li-ping,TAN Xue-qin,JIANG Ping.Distributed Data Association Algorithm[J].Journal of Nanjing University of Science and Technology,2010,(06):243.
[6]向浩,李堃,袁家斌,等.基于6LoWPAN的IPv6无线传感器网络[J].南京理工大学学报(自然科学版),2010,(01):56.
 XIANG Hao,LI Kun,YUAN Jia-bin.IPv6 Wireless Sensor Network Based on 6LoWPAN[J].Journal of Nanjing University of Science and Technology,2010,(06):56.
[7]嵇玮玮.能量有效的无线传感器网络节点选择[J].南京理工大学学报(自然科学版),2009,(04):495.
 JI Wei-wei,LIU Zhong.Energy-efficient Node Selection in Wireless Sensor Networks[J].Journal of Nanjing University of Science and Technology,2009,(06):495.
[8]张捷,薄煜明,吕 明,等.无线传感器网络控制系统故障检测[J].南京理工大学学报(自然科学版),2012,36(06):0.
 ZHANG Jie,BO Yu ming,LV Ming,et al.Fault Detection for Wireless Sensor Networked Control Systems[J].Journal of Nanjing University of Science and Technology,2012,36(06):0.
[9]张生凤,徐志良,吴晓蓓,等.无线传感器网络覆盖空洞动态完全修复[J].南京理工大学学报(自然科学版),2013,37(06):816.
 Zhang Shengfeng,Xu Zhiliang,Wu Xiaobei,et al.Dynamic full repairing of coverage holes in wireless sensor networks[J].Journal of Nanjing University of Science and Technology,2013,37(06):816.
[10]沈海波,姜海涛,庄克琛,等.基于人工免疫的无线传感器网络信任检测方法[J].南京理工大学学报(自然科学版),2014,38(03):318.
 Shen Haibo,Jiang Haitao,Zhuang Kechen,et al.Artificial immunitybased trust detection method for wireless sensor networks[J].Journal of Nanjing University of Science and Technology,2014,38(06):318.

备注/Memo

备注/Memo:
收稿日期:2017-10-10 修回日期:2017-11-09
基金项目:国家自然科学基金(61373015; 61300052; 41301047); 江苏省自然科学基金(BK20140832); 中国博士后基金(2013M540447)
作者简介:周倩(1983-),女,博士生,主要研究方向:数据信息安全、传感器网络、数据隐私保护等,E-mail:lotusqian@nuaa.edu.cn; 通讯作者:秦小麟(1953-),男,教授,博士生导师,主要研究方向:分布式数据管理、物联网、数据安全与隐私保护、大数据管理与分析等,E-mail:qinxcs@nuaa.edu.cn。
引文格式:周倩,秦小麟,丁有伟.无线传感器网络中基于哈希函数的上下文隐私保护[J].南京理工大学学报,2017,41(6):753-759.
投稿网址:http://zrxuebao.njust.edu.cn
更新日期/Last Update: 2017-12-31