[1]周 倩,秦小麟,刘 亮.基于Kautz图的无线传感器网络接收节点位置隐私保护算法[J].南京理工大学学报(自然科学版),2018,42(02):222.[doi:10.14177/j.cnki.32-1397n.2018.42.02.014]
 Zhou Qian,Qin Xiaolin,Liu Liang.Preserving receiver-location privacy based on Kautz graph in WSNs[J].Journal of Nanjing University of Science and Technology,2018,42(02):222.[doi:10.14177/j.cnki.32-1397n.2018.42.02.014]
点击复制

基于Kautz图的无线传感器网络接收节点位置隐私保护算法()
分享到:

《南京理工大学学报》(自然科学版)[ISSN:1005-9830/CN:32-1397/N]

卷:
42卷
期数:
2018年02期
页码:
222
栏目:
出版日期:
2018-04-30

文章信息/Info

Title:
Preserving receiver-location privacy based on Kautz graph in WSNs
文章编号:
1005-9830(2018)02-0222-07
作者:
周 倩12秦小麟12刘 亮12
南京航空航天大学 1.计算机科学与技术学院; 2.江苏省物联网与控制技术重点实验室,江苏 南京 211106
Author(s):
Zhou Qian12Qin Xiaolin12Liu Liang12
1.College of Computer Science and Technology; 2.Jiangsu Key Laboratory of Internet of Thingsand Control Technologies,Nanjing University of Aeronautics and Astronautics,Nanjing 211106,China
关键词:
无线传感器网络 Kautz图 分布式哈希表 位置隐私 网络安全
Keywords:
wireless sensor networks Kautz graph distributed hash tables location privacy network security
分类号:
TP309; TP393
DOI:
10.14177/j.cnki.32-1397n.2018.42.02.014
摘要:
在无线传感器网络(WSNs)中,攻击者可通过窃听网络中的数据流量和跟踪数据包捕获接收节点。现有方法通常利用注入虚假数据包和概率转发的方法来保护点位置隐私,消耗了过多的网络能量,增加了数据包延时,也降低了数据包的投递率。为此,该文提出了一种新颖的基于Kautz图的分区巡逻法(ZPA)。利用分布式哈希表中构建的树形拓扑结构,将数据包传输到每个分区的交叉点,最后路由至接收节点完成数据投递。ZPA方法提高了网络的隐私安全性和鲁棒性。理论分析和仿真实验表明,与传统方法相比,ZPA可降低延时约52%,减少能耗约93%。
Abstract:
In wireless sensor networks,attackers are easy to trace data packets by eavesdropping the traffic and capture the sink nodes. The existing methods of preserving receiver-location privacy usually increases energy consumption by using false packets,raises the delay by probability-based forwarding,and reduces the delivery rate of packets. In order to protect the sink location privacy,a novel zoning patrol approach(ZPA)is proposed based on the Kautz graph. The ZPA can make the network have higher privacy performance and increase the robustness of the network. By using the tree topology constructed in the distributed hash table(DHT),the data packet is transmitted to the intersection point of each partition,and finally routed to the sink node to complete data delivery. The theoretical analysis and simulation experiments show that,compared with the traditional method,the ZPA can reduce the delay by about 52% and the energy consumption by 93%.

参考文献/References:

[1] 周倩,秦小麟,丁有伟. 无线传感器网络中基于哈希函数的上下文隐私保护[J]. 南京理工大学学报,2017,41(6):753-759.
Zhou Qian,Qin Xiaolin,Ding Youwei. Hash-based contextual privacy preservation in wireless sensor networks[J]. Journal of Nanjing University of Science and Technology,2017,41(6):753-759.
[2]刘方斌,刘凤玉,张宏. 基于零知识证明的低能耗Ad Hoc 网络匿名路由协议[J]. 南京理工大学学报,2012,36(5):879-885.
Liu Fangbin,Liu Fengyu,Zhang Hong. Energy efficient anonymous routing protocol for Ad Hoc network based on zero knowledge proofs[J]. Journal of Nanjing University of Science and Technology,2012,36(5):879-885.
[3]Fan Y,Jiang Y,Zhu H,et al. An efficient privacy-preserving scheme against traffic analysis attacks in network coding[C]//IEEE INFOCOM 2009. Rio de Janeiro,Brazil:IEEE,2009:2213-2221.
[4]王涛春,秦小麟,刘亮,等. 无线传感器网络中安全高效的空间数据聚集算法[J]. 软件学报,2014,25(8):1671-1684.
Wang Taochun,Qin Xiaolin,Liu Liang,et al. Secure and energy-efficient spatial data aggregation algorithm in wireless sensor networks[J]. Journal of Software,2014,25(8):1671-1684.
[5]Kamat P,Zhang Y,Trappe W,et al. Enhancing source-location privacy in sensor network routing[C]//25th IEEE International Conference on Distributed Computing Systems. Columbus,US:IEEE,2005:599-608.
[6]Azzabi T,Farhat H,Sahli N. A survey on wireless sensor networks security issues and military specificities[C]//2017 International Conference on Advanced Systems and Electric Technologies. Hammamet,Tunisia:IEEE,2017:66-72.
[7]周倩,秦小麟,丁有伟. 基于攻击感知的能量高效源位置隐私保护算法[J]. 通信学报,2018,39(1):101-116.
Zhou Qian,Qin Xiaolin,Ding Youwei. Preserving source-location privacy efficiently based on attack-perceiving in wireless sensor network[J]. Journal on Communications,2018,39(1):101-116.
[8]Rios R,Cuellar J,Lopez J. Robust probabilistic fake packet injection for receiver-location privacy in WSN[C]//Computer Security-ESORICS. Pisa,Italy:Springer,2012:163-180.
[9]Deng J,Han R,Mishra S. Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks[C]//International Conference on Dependable Systems and Networks. Florence,Italy:IEEE Computer Society,2004:637-646.
[10]Deng J,Han R,Mishra S. Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks[J]. Pervasive and Mobile Computing,2006(2):159-186.
[11]Deng J,Han R,Mishra S. Countermeasures against traffic analysis attacks in wireless sensor networks[C]//First International Conference on Security and Privacy for Emerging Areas in Communications Networks(SECURECOMM’05). Athens,Greece:IEEE,2005:113-126.
[12]Jian Y,Chen S,Zhang Z,et al. Protecting receiver-location privacy in wireless sensor networks[C]//IEEE INFOCOM 2007-26th IEEE International Conference on Computer Communications. Barcelona,Spain:IEEE,2007:1955-1963.
[13]Mehta K,Liu D,Wright M. Protecting location privacy in sensor networks against a global eavesdropper[J]. IEEE Transactions on Mobile Computing,2012,11(2):320-336.
[14]Xu Junming. Combinatorial theory in networks[M]. Beijing,China:Science Press,2013.
[15]Miller M. Moore graphs and beyond:A survey of the degree/diameter problem[J]. Electronic Journal of Combinatorics,2005,61:1-63.
[16]Sanchez J A,Ruiz P M,Stojmenovic I. Energy-efficient geographic multicast routing for sensor and actuator networks[J]. Comput Commun(Elsevier),2007,30(13):2519-2531.
[17]Pottie G J,Kaiser W J. Wireless integrated network sensors[J]. Commun ACM,2000,43(5):51-58.

相似文献/References:

[1]王力立,徐志良,吴晓蓓,等.感知能力异构的无线传感器网络优化部署机制[J].南京理工大学学报(自然科学版),2012,36(03):408.
 WANG Li-li,XU Zhi-liang,WU Xiao-bei,et al.Optimal Deployment Scheme in Sensing-heterogeneous Wireless Sensor Networks[J].Journal of Nanjing University of Science and Technology,2012,36(02):408.
[2]杨靖,秦宁宁,徐迈,等.传感器网络中基于簇的多路径路由协议[J].南京理工大学学报(自然科学版),2012,36(01):49.
 YANG Jing,QIN Ning-ning,XU Mai,et al.Cluster-based Multipath Routing Protocol for Wireless Sensor Networks[J].Journal of Nanjing University of Science and Technology,2012,36(02):49.
[3]高德民,钱焕延,严筱永,等.无线传感器网络最大生命期数据融合算法[J].南京理工大学学报(自然科学版),2012,36(01):55.
 GAO De-min,QIAN Huan-yan,YAN Xiao-yong,et al.Maximum Lifetime Data Aggregation Algorithm for Wireless Sensor Networks[J].Journal of Nanjing University of Science and Technology,2012,36(02):55.
[4]刘宇雷,秦小麟,沈佳佳.能量有效的传感器网络不规则区域时空查询处理算法[J].南京理工大学学报(自然科学版),2011,(01):31.
 LIU Yu-lei,QIN Xiao-lin,SHEN Jia-jia.Energy-efficient Spatio-temporal Query Processing Algorithm on Irregular Region over Sensor Network[J].Journal of Nanjing University of Science and Technology,2011,(02):31.
[5]蒋立平,谭雪琴,姜萍.数据关联的分布式算法[J].南京理工大学学报(自然科学版),2010,(02):243.
 JIANG Li-ping,TAN Xue-qin,JIANG Ping.Distributed Data Association Algorithm[J].Journal of Nanjing University of Science and Technology,2010,(02):243.
[6]向浩,李堃,袁家斌,等.基于6LoWPAN的IPv6无线传感器网络[J].南京理工大学学报(自然科学版),2010,(01):56.
 XIANG Hao,LI Kun,YUAN Jia-bin.IPv6 Wireless Sensor Network Based on 6LoWPAN[J].Journal of Nanjing University of Science and Technology,2010,(02):56.
[7]嵇玮玮.能量有效的无线传感器网络节点选择[J].南京理工大学学报(自然科学版),2009,(04):495.
 JI Wei-wei,LIU Zhong.Energy-efficient Node Selection in Wireless Sensor Networks[J].Journal of Nanjing University of Science and Technology,2009,(02):495.
[8]张捷,薄煜明,吕 明,等.无线传感器网络控制系统故障检测[J].南京理工大学学报(自然科学版),2012,36(06):0.
 ZHANG Jie,BO Yu ming,LV Ming,et al.Fault Detection for Wireless Sensor Networked Control Systems[J].Journal of Nanjing University of Science and Technology,2012,36(02):0.
[9]张生凤,徐志良,吴晓蓓,等.无线传感器网络覆盖空洞动态完全修复[J].南京理工大学学报(自然科学版),2013,37(06):816.
 Zhang Shengfeng,Xu Zhiliang,Wu Xiaobei,et al.Dynamic full repairing of coverage holes in wireless sensor networks[J].Journal of Nanjing University of Science and Technology,2013,37(02):816.
[10]沈海波,姜海涛,庄克琛,等.基于人工免疫的无线传感器网络信任检测方法[J].南京理工大学学报(自然科学版),2014,38(03):318.
 Shen Haibo,Jiang Haitao,Zhuang Kechen,et al.Artificial immunitybased trust detection method for wireless sensor networks[J].Journal of Nanjing University of Science and Technology,2014,38(02):318.

备注/Memo

备注/Memo:
收稿日期:2018-01-08 修回日期:2018-03-07
基金项目:国家自然科学基金(61373015; 61300052; 41301047); 江苏省重大科技成果转化基金(BA2013049); 中国博士后基金(2013M540447)
作者简介:周倩(1983-),女,博士生,主要研究方向:数据信息安全、传感器网络、数据隐私保护等,E-mail:lotusqian@nuaa.edu.cn; 通讯作者:秦小麟(1953-),男,教授,博士生导师,主要研究方向:分布式数据管理、物联网、数据安全与隐私保护、大数据管理与分析等,E-mail:qinxcs@nuaa.edu.cn。
引文格式:周倩,秦小麟,刘亮. 基于Kautz图的无线传感器网络接收节点位置隐私保护算法[J]. 南京理工大学学报,2018,42(2):222-228.
投稿网址:http://zrxuebao.njust.edu.cn
更新日期/Last Update: 2018-04-30