计算机科学 ›› 2020, Vol. 47 ›› Issue (7): 307-313.doi: 10.11896/jsjkx.200100056
郭蕊, 芦天亮, 杜彦辉, 周杨, 潘孝勤, 刘晓晨
GUO Rui, LU Tian-liang, DU Yan-hui, ZHOU Yang, PAN Xiao-qin, LIU Xiao-chen
摘要: 面向目标监测任务的无线传感网(Wireless Sensor Network,WSN)通常部署在无人监管和关键敏感的环境中,无线通信的开放性严重威胁了监测目标的安全性,因此需要对源节点位置隐私进行有效保护。针对现有WSN源位置隐私保护方案普遍存在的高延迟和高能耗问题,提出了一种基于改进蚁群算法的源位置隐私保护方案EESLP-ACA(Energy Efficient Source Location Privacy based on Ant Colony Algorithm)。传感器节点接收到数据包时,将根据信息素浓度和改进的路径启发素含量选择转发节点,以最小化和均衡化网络能耗;同时通过引入参照距离并改进信息素更新机制,增大未选中节点成为转发节点的可能性,构建低概率重复动态路由,减少攻击者能够接收到的数据包数目,增加反向追踪的难度。性能分析表明,所提方案不但能有效提高蚁群算法(Ant Colony Algorithm,ACA)的性能,使其更好地应用于WSN源位置隐私保护领域;而且相较于CDR和ELSP方案,在延长网络生存周期和缩短传输延迟的同时,能有效提升源位置隐私的安全性。
中图分类号:
[1]LI N,ZHANG N,DAS S K,et al.Privacy preservation in wireless sensor networks:A state-of-the-art survey[J].Ad Hoc Networks,2009,7(8):1501-1514. [2]OZTURK C,ZHANG Y,TRAPPE W.Source-location privacyin energy constrained sensor network routing[C]//Proceedings of the 2nd ACM workshop on Security of Ad Hoc and Sensor Networks.ACM,2004:88-93. [3]KAMAT P,ZHANG Y,TRAPPE W,et al.Enhancing source location privacy in sensor network routing[C]//25th IEEE International Conference on Distributed Computing Systems,2005(ICDCS 2005).IEEE,2005:599-608. [4]WANG W P,CHEN L,WANG J X.A Source-Location Privacy Protocol in WSN Based on Locational Angle[C]// IEEE International Conference on Communications,2008(ICC’08).2008. [5]CHEN J,FANG B X,YIN L H,et al.A Source-Location Privacy Preservation Protocol in Wireless Sensor Networks Using Source-Based Restricted Flooding[J].Chinese Journal of Computers,2010,33(9):1736-1747. [6]LIU X J,LI J,LI B.Source-Location Privacy Protocol Based on the Minimum Cost Routing[J].Chinese Journal of Sensors and Actuators,2014,27(3):394-400. [7]ZHOU L L,SHI R H,ZHONG H,et al.Source-location Privacy Preservation Based on Constant Altitude Routing in Wireless Sensor Networks[J].Computer Engineering,2014,40(6):89-94. [8]SUN M S,LIU Y B,HUANG J.Source-location privacy protection strategy through pseudo normal distribution-based phantom routing in WSN[J].Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2016,28(1):113-119. [9]WANG W X,LI P Z.A privacy protection method of source location in wireless sensor networks[J].Journal of Chongqing University,2018,41(3):100-108. [10]JIA Z P,WEI X J,PENG W P.Privacy protection strategy about source location in WSNs based on random angle and circumfe-rential Routing[J].Application Research of Computers,2016,33(3):886-890. [11]BAI L Q,LI L,QIAN S G,et al.Source-location privacy protection algorithm in WSNs based on ellipse model[J].Control and Decision,2017,32(2):255-261. [12]ZHOU C,HU X H.Phantom routing privacy protocol based on directed random in WSN[J].Application Research of Compu-ters,2018,35(10):3109-3112. [13]SPACHOS P,TOUMPAKARIS D,HATZINAKOS D.Angle-Based Dynamic Routing Scheme for Source Location Privacy in Wireless Sensor Networks[C]//Vehicular Technology Confe-rence.IEEE,2014:1-5. [14]LIU Y,XU Y J,SONG L.Variable-angle based dynamic routing scheme for source-location privacy protection in wireless sensor networks[J].Application Research of Computers,2018,35(1):257-260,265. [15]MA W,SONG L.Source location privacy preservation routingprotocol based on multi-path[J].Computer Engineering and Applications,2018,54(16):81-85,106. [16]REN J,ZHANG Y X,LIU K.An Energy-Efficient Cyclic Diversionary Routing Strategy against Global Eavesdroppers in Wireless Sensor Networks[J].International Journal of Distributed Sensor Networks,2013,2013:1-15. [17]OUYANG Y,LE X Y,CHEN G L,et al.Entrapping adversaries for source protection in sensor networks[C]//International Symposium on World of Wireless,Mobile and Multimedia Networks,2006(WoWMoM 2006).2006. [18]ZHANG J N,CHU C L.A Scheme to Protect the Source Location Privacy in Wireless Sensor Networks[J].Chinese Journal of Sensors and Actuators,2016,29(9):1405-1409. [19]RUAN Z,LIANG W,SUN D,et al.An efficient and lightweight source privacy protecting scheme for sensor networks using group knowledge[J].International Journal of Distributed Sensor Networks,2013,2013:1-14. |
[1] | 鲁晨阳, 邓苏, 马武彬, 吴亚辉, 周浩浩. 基于分层抽样优化的面向异构客户端的联邦学习 Federated Learning Based on Stratified Sampling Optimization for Heterogeneous Clients 计算机科学, 2022, 49(9): 183-193. https://doi.org/10.11896/jsjkx.220500263 |
[2] | 刘鑫, 王珺, 宋巧凤, 刘家豪. 一种基于AAE的协同多播主动缓存方案 Collaborative Multicast Proactive Caching Scheme Based on AAE 计算机科学, 2022, 49(9): 260-267. https://doi.org/10.11896/jsjkx.210800019 |
[3] | 汤凌韬, 王迪, 张鲁飞, 刘盛云. 基于安全多方计算和差分隐私的联邦学习方案 Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy 计算机科学, 2022, 49(9): 297-305. https://doi.org/10.11896/jsjkx.210800108 |
[4] | 吕由, 吴文渊. 隐私保护线性回归方案与应用 Privacy-preserving Linear Regression Scheme and Its Application 计算机科学, 2022, 49(9): 318-325. https://doi.org/10.11896/jsjkx.220300190 |
[5] | 高文龙, 周天阳, 朱俊虎, 赵子恒. 基于双向蚁群算法的网络攻击路径发现方法 Network Attack Path Discovery Method Based on Bidirectional Ant Colony Algorithm 计算机科学, 2022, 49(6A): 516-522. https://doi.org/10.11896/jsjkx.210500072 |
[6] | 王健. 基于隐私保护的反向传播神经网络学习算法 Back-propagation Neural Network Learning Algorithm Based on Privacy Preserving 计算机科学, 2022, 49(6A): 575-580. https://doi.org/10.11896/jsjkx.211100155 |
[7] | 李利, 何欣, 韩志杰. 群智感知的隐私保护研究综述 Review of Privacy-preserving Mechanisms in Crowdsensing 计算机科学, 2022, 49(5): 303-310. https://doi.org/10.11896/jsjkx.210400077 |
[8] | 王美珊, 姚兰, 高福祥, 徐军灿. 面向医疗集值数据的差分隐私保护技术研究 Study on Differential Privacy Protection for Medical Set-Valued Data 计算机科学, 2022, 49(4): 362-368. https://doi.org/10.11896/jsjkx.210300032 |
[9] | 吕由, 吴文渊. 基于同态加密的线性系统求解方案 Linear System Solving Scheme Based on Homomorphic Encryption 计算机科学, 2022, 49(3): 338-345. https://doi.org/10.11896/jsjkx.201200124 |
[10] | 孔钰婷, 谭富祥, 赵鑫, 张正航, 白璐, 钱育蓉. 基于差分隐私的K-means算法优化研究综述 Review of K-means Algorithm Optimization Based on Differential Privacy 计算机科学, 2022, 49(2): 162-173. https://doi.org/10.11896/jsjkx.201200008 |
[11] | 金华, 朱靖宇, 王昌达. 视频隐私保护技术综述 Review on Video Privacy Protection 计算机科学, 2022, 49(1): 306-313. https://doi.org/10.11896/jsjkx.201200047 |
[12] | 雷羽潇, 段玉聪. 面向跨模态隐私保护的AI治理法律技术化框架 AI Governance Oriented Legal to Technology Bridging Framework for Cross-modal Privacy Protection 计算机科学, 2021, 48(9): 9-20. https://doi.org/10.11896/jsjkx.201000011 |
[13] | 吴成凤, 蔡莉, 李劲, 梁宇. 基于多源位置数据的居民出行频繁模式挖掘 Frequent Pattern Mining of Residents’ Travel Based on Multi-source Location Data 计算机科学, 2021, 48(7): 155-163. https://doi.org/10.11896/jsjkx.200800072 |
[14] | 王辉, 朱国宇, 申自浩, 刘琨, 刘沛骞. 基于用户偏好和位置分布的假位置生成方法 Dummy Location Generation Method Based on User Preference and Location Distribution 计算机科学, 2021, 48(7): 164-171. https://doi.org/10.11896/jsjkx.200800069 |
[15] | 孙振强, 罗永龙, 郑孝遥, 章海燕. 一种融合用户情感与相似度的智能旅游路径推荐方法 Intelligent Travel Route Recommendation Method Integrating User Emotion and Similarity 计算机科学, 2021, 48(6A): 226-230. https://doi.org/10.11896/jsjkx.200900119 |
|