计算机科学 ›› 2021, Vol. 48 ›› Issue (5): 334-340.doi: 10.11896/jsjkx.200400099

• 信息安全 • 上一篇    

WSN中基于目标决策的源位置隐私保护方案

郭蕊, 芦天亮, 杜彦辉   

  1. 中国人民公安大学信息网络安全学院 北京100038
  • 收稿日期:2020-04-22 修回日期:2020-07-07 出版日期:2021-05-15 发布日期:2021-05-09
  • 通讯作者: 芦天亮(lutianliang@ppsuc.edu.cn)
  • 基金资助:
    国家重点研发计划(20190178);中国人民公安大学2019年基本科研业务费重大项目(2019JKF108)

Source-location Privacy Protection Scheme Based on Target Decision in WSN

GUO Rui, LU Tian-liang, DU Yan-hui   

  1. College of Police Information Engineering and Network Security,People's Public Security University of China,Beijing 100038,China
  • Received:2020-04-22 Revised:2020-07-07 Online:2021-05-15 Published:2021-05-09
  • About author:GUO Rui,born in 1996,master.Her main research interests include IoT security and information security.(2103008108@qq.com)
    LU Tian-liang,born in 1985,Ph.D,associate professor,is a member of China Computer Federation.His main research interests include cyber security and artificial intelligence.
  • Supported by:
    National Key R & D Program of China(20190178) and Fundamental Research Funds for the Central Universities of PPSUC(2019JKF108).

摘要: 针对现有基于幻影源的无线传感网(Wireless Sensor Network,WSN)的源位置隐私保护方案,普遍存在无法有效平衡源位置隐私安全性、网络生存周期和传输延迟之间的矛盾关系的问题,提出了一种基于目标决策的幻影源分散路由方案PSSR(Phantom Source Separate path Routing)。该方案采用分段定象随机游走来确定幻影节点的位置,在保证幻影源距离真实源可视区足够远的同时,实现了幻影源位置的多样性,增大了攻击者定位源位置的难度。除此之外,该方案通过考虑节点的能量消耗、剩余能量及其到基站的距离来选取转发节点,实现了低概率重复分散路由的构建,有效平衡了源位置隐私安全性、网络生存周期和传输延迟之间的矛盾关系。仿真实验结果表明,相比EPUSBRF方案、PRLA方案和MPRP方案,PSSR方案在增强源位置隐私安全性的同时,能够有效延长网络生存周期和降低传输延迟。

关键词: 分散路由, 幻影源, 无线传感网, 隐私保护, 源位置

Abstract: Aiming at the problem that the existing schemes of Wireless Sensor Network(WSN) source-location privacy protection based on phantom source can not effectively balance the contradiction among source location privacy security,network life cycle and transmission delay,a phantom source separate path routing scheme (PSSR) based on target decision is proposed.In PSSR scheme,the phantom node location is determined by random walk of segmented fixed image,which ensures that the phantom source is far enough from the real source visible area,and at the same time realizes the diversity of phantom source location,which increases the difficulty of attacker locating the source location.In addition,by considering the energy consumption of the node,the remaining energy and the distance from the node to the base station,the forwarding node is selected to realize the construction of low probability repeated and decentralized routing,effectively balancing the contradiction among the source location privacy security,network life cycle and transmission delay.Compared with EPUSBRF,PRLA and MPRP,PSSR can not only enhance the source location privacy security,but also effectively prolong the network lifetime and reduce the transmission delay.

Key words: Phantom source, Privacy protection, Separate path routing, Source-location, Wireless sensor network

中图分类号: 

  • TN929.5
[1]PENG H,CHEN H,ZHANG X Y,et al.Location privacy preservation in wireless sensor networks[J].Journal of Software,2015,26(3):617-639.
[2]OZTURK C,ZHANG Y,TRAPPE W.Source-location privacy in energy constrained sensor network routing[C]//Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks.ACM,2004:88-93.
[3]KAMAT P,ZHANG Y,TRAPPE W,et al.Enhancing source location privacy in sensor network routing[C]//25th IEEE International Conference on Distributed Computing Systems(ICDCS 2005).IEEE,2005:599-608.
[4]CHEN J,FANG B X,YIN L H,et al.A Source-Location Privacy Preservation Protocol in Wireless Sensor Networks Using Source-Based Restricted Flooding[J].Chinese Journal of Computers,2010,33(9):1736-1747.
[5]YAO J,WEN G.Preserving source-location privacy in energy-constrained wireless sensor networks[C]//Proceedings of the 28th International Conference on Distributed Computing Systems Workshops.2008:412-416.
[6]LI Y,LIGHTFOOT L,REN J.Routing-based source-locationprivacy protection in wireless sensor networks[C]//2009 IEEE International Conference on Electro/Information Technology.Windsor,Ontario,Canada:IEEE,2009:29-34.
[7]WANG W P,CHEN L,WANG J X.A source-location privacyprotocol in WSN based on locational angle[C]//Proceedings of IEEE International Conference on Communications.2008:1630-1634.
[8]LONG J,DONG M,OTA K,et al.Achieving source location privacy and network lifetime maximization through tree-based diversionary routing in wireless sensor networks[J].IEEE Access,2014,2(10):633-651.
[9]KUMAR P,SINGH J P,VISHNOI P,et al.Source location privacy using multiple-phantom nodes in WSN[C]//Proceedings of the Tencon.2015:1-6.
[10]XU Y,CHA Q M,KE M Y,et al.Phantom routing design for source location protection[J].Computer Engineering and Applications,2018,54(19):88-93.
[11]LIU X J,LI J,LI B.Source-Location Privacy Protocol Based on the Minimum Cost Routing[J].Chinese Journal of Sensors and Actuators,2014,27(3):394-400.
[12]YAO J.Source- location privacy based on directed greedy walk in wireless sensor networks[C]//Proceedings of International Conference on Wireless Communications Networking and Mobile Computing.2010:1-4.
[13]ZHOU C,HU X H.Phantom routing privacy protocol based on directed random in WSN[J].Application Research of Computers,2018,35(10):3109-3112.
[14]HUANG J,SUN M S,ZHU S T,et al.A source-location privacyprotection strategy via pseudo normal distribution-based phantom routing in WSNs[C]//Proceedings of the 30th Annual ACM Symposium on Applied Computing.2015:688-694.
[15]JIA Z P,WEI X J,PENG W P.Privacy Protection strategyabout source location in WSNs based on random angle and circumferential routing[J].Application Research of Computers,2016,33(3):886-890.
[16]LIGHTFOOT L,LI Y,REN J.Preserving Source-Location Privacy in Wireless Sensor Network Using STaR Routing[C]//Global Telecommunications Conference (GLOBECOM 2010).2010 IEEE.IEEE,2011.Miami,FL,2010:1-5.
[17]MANJULA R,RAJA DATTA.A novel source location privacy preservation technique to achieve enhanced privacy and network lifetime in WSNs[J].Pervasive and Mobile Computing,2018,44:58-73.
[18]LIU G F,XIAO Y.RSSI positioning method based on improved flower pollination algorithm[J].Transducer and Microsystem Technologies,2019,38(11):42-45.
[1] 鲁晨阳, 邓苏, 马武彬, 吴亚辉, 周浩浩.
基于分层抽样优化的面向异构客户端的联邦学习
Federated Learning Based on Stratified Sampling Optimization for Heterogeneous Clients
计算机科学, 2022, 49(9): 183-193. https://doi.org/10.11896/jsjkx.220500263
[2] 汤凌韬, 王迪, 张鲁飞, 刘盛云.
基于安全多方计算和差分隐私的联邦学习方案
Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy
计算机科学, 2022, 49(9): 297-305. https://doi.org/10.11896/jsjkx.210800108
[3] 吕由, 吴文渊.
隐私保护线性回归方案与应用
Privacy-preserving Linear Regression Scheme and Its Application
计算机科学, 2022, 49(9): 318-325. https://doi.org/10.11896/jsjkx.220300190
[4] 王健.
基于隐私保护的反向传播神经网络学习算法
Back-propagation Neural Network Learning Algorithm Based on Privacy Preserving
计算机科学, 2022, 49(6A): 575-580. https://doi.org/10.11896/jsjkx.211100155
[5] 李利, 何欣, 韩志杰.
群智感知的隐私保护研究综述
Review of Privacy-preserving Mechanisms in Crowdsensing
计算机科学, 2022, 49(5): 303-310. https://doi.org/10.11896/jsjkx.210400077
[6] 王美珊, 姚兰, 高福祥, 徐军灿.
面向医疗集值数据的差分隐私保护技术研究
Study on Differential Privacy Protection for Medical Set-Valued Data
计算机科学, 2022, 49(4): 362-368. https://doi.org/10.11896/jsjkx.210300032
[7] 吕由, 吴文渊.
基于同态加密的线性系统求解方案
Linear System Solving Scheme Based on Homomorphic Encryption
计算机科学, 2022, 49(3): 338-345. https://doi.org/10.11896/jsjkx.201200124
[8] 孔钰婷, 谭富祥, 赵鑫, 张正航, 白璐, 钱育蓉.
基于差分隐私的K-means算法优化研究综述
Review of K-means Algorithm Optimization Based on Differential Privacy
计算机科学, 2022, 49(2): 162-173. https://doi.org/10.11896/jsjkx.201200008
[9] 金华, 朱靖宇, 王昌达.
视频隐私保护技术综述
Review on Video Privacy Protection
计算机科学, 2022, 49(1): 306-313. https://doi.org/10.11896/jsjkx.201200047
[10] 雷羽潇, 段玉聪.
面向跨模态隐私保护的AI治理法律技术化框架
AI Governance Oriented Legal to Technology Bridging Framework for Cross-modal Privacy Protection
计算机科学, 2021, 48(9): 9-20. https://doi.org/10.11896/jsjkx.201000011
[11] 吴成凤, 蔡莉, 李劲, 梁宇.
基于多源位置数据的居民出行频繁模式挖掘
Frequent Pattern Mining of Residents’ Travel Based on Multi-source Location Data
计算机科学, 2021, 48(7): 155-163. https://doi.org/10.11896/jsjkx.200800072
[12] 王辉, 朱国宇, 申自浩, 刘琨, 刘沛骞.
基于用户偏好和位置分布的假位置生成方法
Dummy Location Generation Method Based on User Preference and Location Distribution
计算机科学, 2021, 48(7): 164-171. https://doi.org/10.11896/jsjkx.200800069
[13] 季琰, 戴华, 姜莹莹, 杨庚, 易训.
面向混合云的可并行多关键词Top-k密文检索技术
Parallel Multi-keyword Top-k Search Scheme over Encrypted Data in Hybrid Clouds
计算机科学, 2021, 48(5): 320-327. https://doi.org/10.11896/jsjkx.200300160
[14] 彭春春, 陈燕俐, 荀艳梅.
支持本地化差分隐私保护的k-modes聚类方法
k-modes Clustering Guaranteeing Local Differential Privacy
计算机科学, 2021, 48(2): 105-113. https://doi.org/10.11896/jsjkx.200700172
[15] 郭上铜, 王瑞锦, 张凤荔.
区块链技术原理与应用综述
Summary of Principle and Application of Blockchain
计算机科学, 2021, 48(2): 271-281. https://doi.org/10.11896/jsjkx.200800021
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!