计算机科学 ›› 2020, Vol. 47 ›› Issue (7): 307-313.doi: 10.11896/jsjkx.200100056

• 信息安全 • 上一篇    下一篇

基于改进蚁群算法的WSN源位置隐私保护

郭蕊, 芦天亮, 杜彦辉, 周杨, 潘孝勤, 刘晓晨   

  1. 中国人民公安大学警务信息工程与网络安全学院 北京100038
  • 收稿日期:2020-01-07 出版日期:2020-07-15 发布日期:2020-07-16
  • 通讯作者: 芦天亮(lutianliang@ppsuc.edu.cn)
  • 作者简介:2103008108@qq.com
  • 基金资助:
    国家重点研发计划(20190178);中国人民公安大学 2019年基本科研业务费重大项目(2019JKF108)

WSN Source-location Privacy Protection Based on Improved Ant Colony Algorithm

GUO Rui, LU Tian-liang, DU Yan-hui, ZHOU Yang, PAN Xiao-qin, LIU Xiao-chen   

  1. College of Police Information Engineering and Network Security,People’s Public Security University of China,Beijing 100038,China
  • Received:2020-01-07 Online:2020-07-15 Published:2020-07-16
  • About author:GUO Rui,born in 1996,master.Her main research interests include IoT security and information security.
    LU Tian-liang,born in 1985,Ph.D,associate professor,is a member of China Computer Federation.His main research interests include cyber security and artificial intelligence.
  • Supported by:
    This work was supported by the National Key R&D Program of China(20190178) and Fundamental Research Funds for the Central Universities of PPSUC(2019JKF108)

摘要: 面向目标监测任务的无线传感网(Wireless Sensor Network,WSN)通常部署在无人监管和关键敏感的环境中,无线通信的开放性严重威胁了监测目标的安全性,因此需要对源节点位置隐私进行有效保护。针对现有WSN源位置隐私保护方案普遍存在的高延迟和高能耗问题,提出了一种基于改进蚁群算法的源位置隐私保护方案EESLP-ACA(Energy Efficient Source Location Privacy based on Ant Colony Algorithm)。传感器节点接收到数据包时,将根据信息素浓度和改进的路径启发素含量选择转发节点,以最小化和均衡化网络能耗;同时通过引入参照距离并改进信息素更新机制,增大未选中节点成为转发节点的可能性,构建低概率重复动态路由,减少攻击者能够接收到的数据包数目,增加反向追踪的难度。性能分析表明,所提方案不但能有效提高蚁群算法(Ant Colony Algorithm,ACA)的性能,使其更好地应用于WSN源位置隐私保护领域;而且相较于CDR和ELSP方案,在延长网络生存周期和缩短传输延迟的同时,能有效提升源位置隐私的安全性。

关键词: 动态路由, 无线传感网, 蚁群算法, 隐私保护, 源位置

Abstract: Wireless Sensor Network (WSN) oriented to target monitoring tasks is usually deployed in unsupervised,critical and sensitive environments.The openness of Wireless communication seriously threatens the security of monitoring targets,so it is necessary to effectively protect the location privacy of source nodes.Considering the low computational complexity of ant colony algorithm and its unique advantages in path planning,a source location privacy protection scheme based on improved ant colony algorithm EESLP-ACA (Energy Efficient Source Location Privacy based on Ant Colony Algorithm) is proposed.When the sensor node receives the packet,it will select the forwarding node according to the pheromone concentration and the improved path heuristic content to minimize and balance the network energy consumption.At the same time,by introducing the reference distance and improving the pheromone update mechanism,the possibility of the unselected node becoming the forwarding node is increased,and the repeated dynamic route with low probability is constructed to reduce the number of packets an attacker can receive and increase the difficulty of reverse tracking.The performance analysis shows that it not only effectively improves the performance of ant colony algorithm and makes it better applied in the field of WSN source location privacy protection,but also effectively enhances the security of source location privacy while prolonging the network life cycle and shortening the transmission delay compared with CDR and ELSP schemes.

Key words: Ant colony algorithm, Dynamic route, Privacy protection, Source-location, Wireless sensor network

中图分类号: 

  • TN929.5
[1]LI N,ZHANG N,DAS S K,et al.Privacy preservation in wireless sensor networks:A state-of-the-art survey[J].Ad Hoc Networks,2009,7(8):1501-1514.
[2]OZTURK C,ZHANG Y,TRAPPE W.Source-location privacyin energy constrained sensor network routing[C]//Proceedings of the 2nd ACM workshop on Security of Ad Hoc and Sensor Networks.ACM,2004:88-93.
[3]KAMAT P,ZHANG Y,TRAPPE W,et al.Enhancing source location privacy in sensor network routing[C]//25th IEEE International Conference on Distributed Computing Systems,2005(ICDCS 2005).IEEE,2005:599-608.
[4]WANG W P,CHEN L,WANG J X.A Source-Location Privacy Protocol in WSN Based on Locational Angle[C]// IEEE International Conference on Communications,2008(ICC’08).2008.
[5]CHEN J,FANG B X,YIN L H,et al.A Source-Location Privacy Preservation Protocol in Wireless Sensor Networks Using Source-Based Restricted Flooding[J].Chinese Journal of Computers,2010,33(9):1736-1747.
[6]LIU X J,LI J,LI B.Source-Location Privacy Protocol Based on the Minimum Cost Routing[J].Chinese Journal of Sensors and Actuators,2014,27(3):394-400.
[7]ZHOU L L,SHI R H,ZHONG H,et al.Source-location Privacy Preservation Based on Constant Altitude Routing in Wireless Sensor Networks[J].Computer Engineering,2014,40(6):89-94.
[8]SUN M S,LIU Y B,HUANG J.Source-location privacy protection strategy through pseudo normal distribution-based phantom routing in WSN[J].Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2016,28(1):113-119.
[9]WANG W X,LI P Z.A privacy protection method of source location in wireless sensor networks[J].Journal of Chongqing University,2018,41(3):100-108.
[10]JIA Z P,WEI X J,PENG W P.Privacy protection strategy about source location in WSNs based on random angle and circumfe-rential Routing[J].Application Research of Computers,2016,33(3):886-890.
[11]BAI L Q,LI L,QIAN S G,et al.Source-location privacy protection algorithm in WSNs based on ellipse model[J].Control and Decision,2017,32(2):255-261.
[12]ZHOU C,HU X H.Phantom routing privacy protocol based on directed random in WSN[J].Application Research of Compu-ters,2018,35(10):3109-3112.
[13]SPACHOS P,TOUMPAKARIS D,HATZINAKOS D.Angle-Based Dynamic Routing Scheme for Source Location Privacy in Wireless Sensor Networks[C]//Vehicular Technology Confe-rence.IEEE,2014:1-5.
[14]LIU Y,XU Y J,SONG L.Variable-angle based dynamic routing scheme for source-location privacy protection in wireless sensor networks[J].Application Research of Computers,2018,35(1):257-260,265.
[15]MA W,SONG L.Source location privacy preservation routingprotocol based on multi-path[J].Computer Engineering and Applications,2018,54(16):81-85,106.
[16]REN J,ZHANG Y X,LIU K.An Energy-Efficient Cyclic Diversionary Routing Strategy against Global Eavesdroppers in Wireless Sensor Networks[J].International Journal of Distributed Sensor Networks,2013,2013:1-15.
[17]OUYANG Y,LE X Y,CHEN G L,et al.Entrapping adversaries for source protection in sensor networks[C]//International Symposium on World of Wireless,Mobile and Multimedia Networks,2006(WoWMoM 2006).2006.
[18]ZHANG J N,CHU C L.A Scheme to Protect the Source Location Privacy in Wireless Sensor Networks[J].Chinese Journal of Sensors and Actuators,2016,29(9):1405-1409.
[19]RUAN Z,LIANG W,SUN D,et al.An efficient and lightweight source privacy protecting scheme for sensor networks using group knowledge[J].International Journal of Distributed Sensor Networks,2013,2013:1-14.
[1] 鲁晨阳, 邓苏, 马武彬, 吴亚辉, 周浩浩.
基于分层抽样优化的面向异构客户端的联邦学习
Federated Learning Based on Stratified Sampling Optimization for Heterogeneous Clients
计算机科学, 2022, 49(9): 183-193. https://doi.org/10.11896/jsjkx.220500263
[2] 刘鑫, 王珺, 宋巧凤, 刘家豪.
一种基于AAE的协同多播主动缓存方案
Collaborative Multicast Proactive Caching Scheme Based on AAE
计算机科学, 2022, 49(9): 260-267. https://doi.org/10.11896/jsjkx.210800019
[3] 汤凌韬, 王迪, 张鲁飞, 刘盛云.
基于安全多方计算和差分隐私的联邦学习方案
Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy
计算机科学, 2022, 49(9): 297-305. https://doi.org/10.11896/jsjkx.210800108
[4] 吕由, 吴文渊.
隐私保护线性回归方案与应用
Privacy-preserving Linear Regression Scheme and Its Application
计算机科学, 2022, 49(9): 318-325. https://doi.org/10.11896/jsjkx.220300190
[5] 高文龙, 周天阳, 朱俊虎, 赵子恒.
基于双向蚁群算法的网络攻击路径发现方法
Network Attack Path Discovery Method Based on Bidirectional Ant Colony Algorithm
计算机科学, 2022, 49(6A): 516-522. https://doi.org/10.11896/jsjkx.210500072
[6] 王健.
基于隐私保护的反向传播神经网络学习算法
Back-propagation Neural Network Learning Algorithm Based on Privacy Preserving
计算机科学, 2022, 49(6A): 575-580. https://doi.org/10.11896/jsjkx.211100155
[7] 李利, 何欣, 韩志杰.
群智感知的隐私保护研究综述
Review of Privacy-preserving Mechanisms in Crowdsensing
计算机科学, 2022, 49(5): 303-310. https://doi.org/10.11896/jsjkx.210400077
[8] 王美珊, 姚兰, 高福祥, 徐军灿.
面向医疗集值数据的差分隐私保护技术研究
Study on Differential Privacy Protection for Medical Set-Valued Data
计算机科学, 2022, 49(4): 362-368. https://doi.org/10.11896/jsjkx.210300032
[9] 吕由, 吴文渊.
基于同态加密的线性系统求解方案
Linear System Solving Scheme Based on Homomorphic Encryption
计算机科学, 2022, 49(3): 338-345. https://doi.org/10.11896/jsjkx.201200124
[10] 孔钰婷, 谭富祥, 赵鑫, 张正航, 白璐, 钱育蓉.
基于差分隐私的K-means算法优化研究综述
Review of K-means Algorithm Optimization Based on Differential Privacy
计算机科学, 2022, 49(2): 162-173. https://doi.org/10.11896/jsjkx.201200008
[11] 金华, 朱靖宇, 王昌达.
视频隐私保护技术综述
Review on Video Privacy Protection
计算机科学, 2022, 49(1): 306-313. https://doi.org/10.11896/jsjkx.201200047
[12] 雷羽潇, 段玉聪.
面向跨模态隐私保护的AI治理法律技术化框架
AI Governance Oriented Legal to Technology Bridging Framework for Cross-modal Privacy Protection
计算机科学, 2021, 48(9): 9-20. https://doi.org/10.11896/jsjkx.201000011
[13] 吴成凤, 蔡莉, 李劲, 梁宇.
基于多源位置数据的居民出行频繁模式挖掘
Frequent Pattern Mining of Residents’ Travel Based on Multi-source Location Data
计算机科学, 2021, 48(7): 155-163. https://doi.org/10.11896/jsjkx.200800072
[14] 王辉, 朱国宇, 申自浩, 刘琨, 刘沛骞.
基于用户偏好和位置分布的假位置生成方法
Dummy Location Generation Method Based on User Preference and Location Distribution
计算机科学, 2021, 48(7): 164-171. https://doi.org/10.11896/jsjkx.200800069
[15] 孙振强, 罗永龙, 郑孝遥, 章海燕.
一种融合用户情感与相似度的智能旅游路径推荐方法
Intelligent Travel Route Recommendation Method Integrating User Emotion and Similarity
计算机科学, 2021, 48(6A): 226-230. https://doi.org/10.11896/jsjkx.200900119
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!