Computer Science ›› 2021, Vol. 48 ›› Issue (5): 334-340.doi: 10.11896/jsjkx.200400099

• Information Security • Previous Articles    

Source-location Privacy Protection Scheme Based on Target Decision in WSN

GUO Rui, LU Tian-liang, DU Yan-hui   

  1. College of Police Information Engineering and Network Security,People's Public Security University of China,Beijing 100038,China
  • Received:2020-04-22 Revised:2020-07-07 Online:2021-05-15 Published:2021-05-09
  • About author:GUO Rui,born in 1996,master.Her main research interests include IoT security and information security.(
    LU Tian-liang,born in 1985,Ph.D,associate professor,is a member of China Computer Federation.His main research interests include cyber security and artificial intelligence.
  • Supported by:
    National Key R & D Program of China(20190178) and Fundamental Research Funds for the Central Universities of PPSUC(2019JKF108).

Abstract: Aiming at the problem that the existing schemes of Wireless Sensor Network(WSN) source-location privacy protection based on phantom source can not effectively balance the contradiction among source location privacy security,network life cycle and transmission delay,a phantom source separate path routing scheme (PSSR) based on target decision is proposed.In PSSR scheme,the phantom node location is determined by random walk of segmented fixed image,which ensures that the phantom source is far enough from the real source visible area,and at the same time realizes the diversity of phantom source location,which increases the difficulty of attacker locating the source location.In addition,by considering the energy consumption of the node,the remaining energy and the distance from the node to the base station,the forwarding node is selected to realize the construction of low probability repeated and decentralized routing,effectively balancing the contradiction among the source location privacy security,network life cycle and transmission delay.Compared with EPUSBRF,PRLA and MPRP,PSSR can not only enhance the source location privacy security,but also effectively prolong the network lifetime and reduce the transmission delay.

Key words: Phantom source, Privacy protection, Separate path routing, Source-location, Wireless sensor network

CLC Number: 

  • TN929.5
[1]PENG H,CHEN H,ZHANG X Y,et al.Location privacy preservation in wireless sensor networks[J].Journal of Software,2015,26(3):617-639.
[2]OZTURK C,ZHANG Y,TRAPPE W.Source-location privacy in energy constrained sensor network routing[C]//Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks.ACM,2004:88-93.
[3]KAMAT P,ZHANG Y,TRAPPE W,et al.Enhancing source location privacy in sensor network routing[C]//25th IEEE International Conference on Distributed Computing Systems(ICDCS 2005).IEEE,2005:599-608.
[4]CHEN J,FANG B X,YIN L H,et al.A Source-Location Privacy Preservation Protocol in Wireless Sensor Networks Using Source-Based Restricted Flooding[J].Chinese Journal of Computers,2010,33(9):1736-1747.
[5]YAO J,WEN G.Preserving source-location privacy in energy-constrained wireless sensor networks[C]//Proceedings of the 28th International Conference on Distributed Computing Systems Workshops.2008:412-416.
[6]LI Y,LIGHTFOOT L,REN J.Routing-based source-locationprivacy protection in wireless sensor networks[C]//2009 IEEE International Conference on Electro/Information Technology.Windsor,Ontario,Canada:IEEE,2009:29-34.
[7]WANG W P,CHEN L,WANG J X.A source-location privacyprotocol in WSN based on locational angle[C]//Proceedings of IEEE International Conference on Communications.2008:1630-1634.
[8]LONG J,DONG M,OTA K,et al.Achieving source location privacy and network lifetime maximization through tree-based diversionary routing in wireless sensor networks[J].IEEE Access,2014,2(10):633-651.
[9]KUMAR P,SINGH J P,VISHNOI P,et al.Source location privacy using multiple-phantom nodes in WSN[C]//Proceedings of the Tencon.2015:1-6.
[10]XU Y,CHA Q M,KE M Y,et al.Phantom routing design for source location protection[J].Computer Engineering and Applications,2018,54(19):88-93.
[11]LIU X J,LI J,LI B.Source-Location Privacy Protocol Based on the Minimum Cost Routing[J].Chinese Journal of Sensors and Actuators,2014,27(3):394-400.
[12]YAO J.Source- location privacy based on directed greedy walk in wireless sensor networks[C]//Proceedings of International Conference on Wireless Communications Networking and Mobile Computing.2010:1-4.
[13]ZHOU C,HU X H.Phantom routing privacy protocol based on directed random in WSN[J].Application Research of Computers,2018,35(10):3109-3112.
[14]HUANG J,SUN M S,ZHU S T,et al.A source-location privacyprotection strategy via pseudo normal distribution-based phantom routing in WSNs[C]//Proceedings of the 30th Annual ACM Symposium on Applied Computing.2015:688-694.
[15]JIA Z P,WEI X J,PENG W P.Privacy Protection strategyabout source location in WSNs based on random angle and circumferential routing[J].Application Research of Computers,2016,33(3):886-890.
[16]LIGHTFOOT L,LI Y,REN J.Preserving Source-Location Privacy in Wireless Sensor Network Using STaR Routing[C]//Global Telecommunications Conference (GLOBECOM 2010).2010 IEEE.IEEE,2011.Miami,FL,2010:1-5.
[17]MANJULA R,RAJA DATTA.A novel source location privacy preservation technique to achieve enhanced privacy and network lifetime in WSNs[J].Pervasive and Mobile Computing,2018,44:58-73.
[18]LIU G F,XIAO Y.RSSI positioning method based on improved flower pollination algorithm[J].Transducer and Microsystem Technologies,2019,38(11):42-45.
[1] LU Chen-yang, DENG Su, MA Wu-bin, WU Ya-hui, ZHOU Hao-hao. Federated Learning Based on Stratified Sampling Optimization for Heterogeneous Clients [J]. Computer Science, 2022, 49(9): 183-193.
[2] FAN Xing-ze, YU Mei. Coverage Optimization of WSN Based on Improved Grey Wolf Optimizer [J]. Computer Science, 2022, 49(6A): 628-631.
[3] WANG Mei-shan, YAO Lan, GAO Fu-xiang, XU Jun-can. Study on Differential Privacy Protection for Medical Set-Valued Data [J]. Computer Science, 2022, 49(4): 362-368.
[4] JIN Hua, ZHU Jing-yu, WANG Chang-da. Review on Video Privacy Protection [J]. Computer Science, 2022, 49(1): 306-313.
[5] LEI Yu-xiao , DUAN Yu-cong. AI Governance Oriented Legal to Technology Bridging Framework for Cross-modal Privacy Protection [J]. Computer Science, 2021, 48(9): 9-20.
[6] WANG Guo-wu, CHEN Yuan-yan. Improvement of DV-Hop Location Algorithm Based on Hop Correction and Genetic Simulated Annealing Algorithm [J]. Computer Science, 2021, 48(6A): 313-316.
[7] JIANG Jian-feng, SUN Jin-xia, YOU Lan-tao. Security Clustering Strategy Based on Particle Swarm Optimization Algorithm in Wireless Sensor Network [J]. Computer Science, 2021, 48(11A): 452-455.
[8] WANG Rui-jin, TANG Yu-cheng, PEI Xi-kai, GUO Shang-tong, ZHANG Feng-li. Block-chain Privacy Protection Scheme Based on Lightweight Homomorphic Encryption and Zero-knowledge Proof [J]. Computer Science, 2021, 48(11A): 547-551.
[9] LI Yu, DUAN Hong-yue, YIN Yu-yu, GAO Hong-hao. Survey of Crowdsourcing Applications in Blockchain Systems [J]. Computer Science, 2021, 48(11): 12-27.
[10] YU Qi-long, LU Ning, SHI Wen-bo. Traceable Mixing Scheme for Bitcoin [J]. Computer Science, 2021, 48(11): 72-78.
[11] WEI Li-qi, ZHAO Zhi-hong, BAI Guang-wei, SHEN Hang. Location Privacy Game Mechanism Based on Generative Adversarial Networks [J]. Computer Science, 2021, 48(10): 266-271.
[12] YU Xue-yong, CHEN Tao. Privacy Protection Offloading Algorithm Based on Virtual Mapping in Edge Computing Scene [J]. Computer Science, 2021, 48(1): 65-71.
[13] LI Yan, SHEN De-rong, NIE Tie-zheng, KOU Yue. Multi-keyword Semantic Search Scheme for Encrypted Cloud Data [J]. Computer Science, 2020, 47(9): 318-323.
[14] GUO Rui, LU Tian-liang, DU Yan-hui, ZHOU Yang, PAN Xiao-qin, LIU Xiao-chen. WSN Source-location Privacy Protection Based on Improved Ant Colony Algorithm [J]. Computer Science, 2020, 47(7): 307-313.
[15] WANG Dong, WANG Hu and JIANG Qian-li. Low Power Long Distance Marine Environment Monitoring System Based on 6LoWPAN [J]. Computer Science, 2020, 47(6A): 596-598.
Full text



No Suggested Reading articles found!