计算机科学 ›› 2021, Vol. 48 ›› Issue (5): 334-340.doi: 10.11896/jsjkx.200400099
• 信息安全 • 上一篇
郭蕊, 芦天亮, 杜彦辉
GUO Rui, LU Tian-liang, DU Yan-hui
摘要: 针对现有基于幻影源的无线传感网(Wireless Sensor Network,WSN)的源位置隐私保护方案,普遍存在无法有效平衡源位置隐私安全性、网络生存周期和传输延迟之间的矛盾关系的问题,提出了一种基于目标决策的幻影源分散路由方案PSSR(Phantom Source Separate path Routing)。该方案采用分段定象随机游走来确定幻影节点的位置,在保证幻影源距离真实源可视区足够远的同时,实现了幻影源位置的多样性,增大了攻击者定位源位置的难度。除此之外,该方案通过考虑节点的能量消耗、剩余能量及其到基站的距离来选取转发节点,实现了低概率重复分散路由的构建,有效平衡了源位置隐私安全性、网络生存周期和传输延迟之间的矛盾关系。仿真实验结果表明,相比EPUSBRF方案、PRLA方案和MPRP方案,PSSR方案在增强源位置隐私安全性的同时,能够有效延长网络生存周期和降低传输延迟。
中图分类号:
[1]PENG H,CHEN H,ZHANG X Y,et al.Location privacy preservation in wireless sensor networks[J].Journal of Software,2015,26(3):617-639. [2]OZTURK C,ZHANG Y,TRAPPE W.Source-location privacy in energy constrained sensor network routing[C]//Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks.ACM,2004:88-93. [3]KAMAT P,ZHANG Y,TRAPPE W,et al.Enhancing source location privacy in sensor network routing[C]//25th IEEE International Conference on Distributed Computing Systems(ICDCS 2005).IEEE,2005:599-608. [4]CHEN J,FANG B X,YIN L H,et al.A Source-Location Privacy Preservation Protocol in Wireless Sensor Networks Using Source-Based Restricted Flooding[J].Chinese Journal of Computers,2010,33(9):1736-1747. [5]YAO J,WEN G.Preserving source-location privacy in energy-constrained wireless sensor networks[C]//Proceedings of the 28th International Conference on Distributed Computing Systems Workshops.2008:412-416. [6]LI Y,LIGHTFOOT L,REN J.Routing-based source-locationprivacy protection in wireless sensor networks[C]//2009 IEEE International Conference on Electro/Information Technology.Windsor,Ontario,Canada:IEEE,2009:29-34. [7]WANG W P,CHEN L,WANG J X.A source-location privacyprotocol in WSN based on locational angle[C]//Proceedings of IEEE International Conference on Communications.2008:1630-1634. [8]LONG J,DONG M,OTA K,et al.Achieving source location privacy and network lifetime maximization through tree-based diversionary routing in wireless sensor networks[J].IEEE Access,2014,2(10):633-651. [9]KUMAR P,SINGH J P,VISHNOI P,et al.Source location privacy using multiple-phantom nodes in WSN[C]//Proceedings of the Tencon.2015:1-6. [10]XU Y,CHA Q M,KE M Y,et al.Phantom routing design for source location protection[J].Computer Engineering and Applications,2018,54(19):88-93. [11]LIU X J,LI J,LI B.Source-Location Privacy Protocol Based on the Minimum Cost Routing[J].Chinese Journal of Sensors and Actuators,2014,27(3):394-400. [12]YAO J.Source- location privacy based on directed greedy walk in wireless sensor networks[C]//Proceedings of International Conference on Wireless Communications Networking and Mobile Computing.2010:1-4. [13]ZHOU C,HU X H.Phantom routing privacy protocol based on directed random in WSN[J].Application Research of Computers,2018,35(10):3109-3112. [14]HUANG J,SUN M S,ZHU S T,et al.A source-location privacyprotection strategy via pseudo normal distribution-based phantom routing in WSNs[C]//Proceedings of the 30th Annual ACM Symposium on Applied Computing.2015:688-694. [15]JIA Z P,WEI X J,PENG W P.Privacy Protection strategyabout source location in WSNs based on random angle and circumferential routing[J].Application Research of Computers,2016,33(3):886-890. [16]LIGHTFOOT L,LI Y,REN J.Preserving Source-Location Privacy in Wireless Sensor Network Using STaR Routing[C]//Global Telecommunications Conference (GLOBECOM 2010).2010 IEEE.IEEE,2011.Miami,FL,2010:1-5. [17]MANJULA R,RAJA DATTA.A novel source location privacy preservation technique to achieve enhanced privacy and network lifetime in WSNs[J].Pervasive and Mobile Computing,2018,44:58-73. [18]LIU G F,XIAO Y.RSSI positioning method based on improved flower pollination algorithm[J].Transducer and Microsystem Technologies,2019,38(11):42-45. |
[1] | 鲁晨阳, 邓苏, 马武彬, 吴亚辉, 周浩浩. 基于分层抽样优化的面向异构客户端的联邦学习 Federated Learning Based on Stratified Sampling Optimization for Heterogeneous Clients 计算机科学, 2022, 49(9): 183-193. https://doi.org/10.11896/jsjkx.220500263 |
[2] | 汤凌韬, 王迪, 张鲁飞, 刘盛云. 基于安全多方计算和差分隐私的联邦学习方案 Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy 计算机科学, 2022, 49(9): 297-305. https://doi.org/10.11896/jsjkx.210800108 |
[3] | 吕由, 吴文渊. 隐私保护线性回归方案与应用 Privacy-preserving Linear Regression Scheme and Its Application 计算机科学, 2022, 49(9): 318-325. https://doi.org/10.11896/jsjkx.220300190 |
[4] | 王健. 基于隐私保护的反向传播神经网络学习算法 Back-propagation Neural Network Learning Algorithm Based on Privacy Preserving 计算机科学, 2022, 49(6A): 575-580. https://doi.org/10.11896/jsjkx.211100155 |
[5] | 李利, 何欣, 韩志杰. 群智感知的隐私保护研究综述 Review of Privacy-preserving Mechanisms in Crowdsensing 计算机科学, 2022, 49(5): 303-310. https://doi.org/10.11896/jsjkx.210400077 |
[6] | 王美珊, 姚兰, 高福祥, 徐军灿. 面向医疗集值数据的差分隐私保护技术研究 Study on Differential Privacy Protection for Medical Set-Valued Data 计算机科学, 2022, 49(4): 362-368. https://doi.org/10.11896/jsjkx.210300032 |
[7] | 吕由, 吴文渊. 基于同态加密的线性系统求解方案 Linear System Solving Scheme Based on Homomorphic Encryption 计算机科学, 2022, 49(3): 338-345. https://doi.org/10.11896/jsjkx.201200124 |
[8] | 孔钰婷, 谭富祥, 赵鑫, 张正航, 白璐, 钱育蓉. 基于差分隐私的K-means算法优化研究综述 Review of K-means Algorithm Optimization Based on Differential Privacy 计算机科学, 2022, 49(2): 162-173. https://doi.org/10.11896/jsjkx.201200008 |
[9] | 金华, 朱靖宇, 王昌达. 视频隐私保护技术综述 Review on Video Privacy Protection 计算机科学, 2022, 49(1): 306-313. https://doi.org/10.11896/jsjkx.201200047 |
[10] | 雷羽潇, 段玉聪. 面向跨模态隐私保护的AI治理法律技术化框架 AI Governance Oriented Legal to Technology Bridging Framework for Cross-modal Privacy Protection 计算机科学, 2021, 48(9): 9-20. https://doi.org/10.11896/jsjkx.201000011 |
[11] | 吴成凤, 蔡莉, 李劲, 梁宇. 基于多源位置数据的居民出行频繁模式挖掘 Frequent Pattern Mining of Residents’ Travel Based on Multi-source Location Data 计算机科学, 2021, 48(7): 155-163. https://doi.org/10.11896/jsjkx.200800072 |
[12] | 王辉, 朱国宇, 申自浩, 刘琨, 刘沛骞. 基于用户偏好和位置分布的假位置生成方法 Dummy Location Generation Method Based on User Preference and Location Distribution 计算机科学, 2021, 48(7): 164-171. https://doi.org/10.11896/jsjkx.200800069 |
[13] | 季琰, 戴华, 姜莹莹, 杨庚, 易训. 面向混合云的可并行多关键词Top-k密文检索技术 Parallel Multi-keyword Top-k Search Scheme over Encrypted Data in Hybrid Clouds 计算机科学, 2021, 48(5): 320-327. https://doi.org/10.11896/jsjkx.200300160 |
[14] | 彭春春, 陈燕俐, 荀艳梅. 支持本地化差分隐私保护的k-modes聚类方法 k-modes Clustering Guaranteeing Local Differential Privacy 计算机科学, 2021, 48(2): 105-113. https://doi.org/10.11896/jsjkx.200700172 |
[15] | 郭上铜, 王瑞锦, 张凤荔. 区块链技术原理与应用综述 Summary of Principle and Application of Blockchain 计算机科学, 2021, 48(2): 271-281. https://doi.org/10.11896/jsjkx.200800021 |
|