Computer Science ›› 2020, Vol. 47 ›› Issue (7): 307-313.doi: 10.11896/jsjkx.200100056

• Information Security • Previous Articles     Next Articles

WSN Source-location Privacy Protection Based on Improved Ant Colony Algorithm

GUO Rui, LU Tian-liang, DU Yan-hui, ZHOU Yang, PAN Xiao-qin, LIU Xiao-chen   

  1. College of Police Information Engineering and Network Security,People’s Public Security University of China,Beijing 100038,China
  • Received:2020-01-07 Online:2020-07-15 Published:2020-07-16
  • About author:GUO Rui,born in 1996,master.Her main research interests include IoT security and information security.
    LU Tian-liang,born in 1985,Ph.D,associate professor,is a member of China Computer Federation.His main research interests include cyber security and artificial intelligence.
  • Supported by:
    This work was supported by the National Key R&D Program of China(20190178) and Fundamental Research Funds for the Central Universities of PPSUC(2019JKF108)

Abstract: Wireless Sensor Network (WSN) oriented to target monitoring tasks is usually deployed in unsupervised,critical and sensitive environments.The openness of Wireless communication seriously threatens the security of monitoring targets,so it is necessary to effectively protect the location privacy of source nodes.Considering the low computational complexity of ant colony algorithm and its unique advantages in path planning,a source location privacy protection scheme based on improved ant colony algorithm EESLP-ACA (Energy Efficient Source Location Privacy based on Ant Colony Algorithm) is proposed.When the sensor node receives the packet,it will select the forwarding node according to the pheromone concentration and the improved path heuristic content to minimize and balance the network energy consumption.At the same time,by introducing the reference distance and improving the pheromone update mechanism,the possibility of the unselected node becoming the forwarding node is increased,and the repeated dynamic route with low probability is constructed to reduce the number of packets an attacker can receive and increase the difficulty of reverse tracking.The performance analysis shows that it not only effectively improves the performance of ant colony algorithm and makes it better applied in the field of WSN source location privacy protection,but also effectively enhances the security of source location privacy while prolonging the network life cycle and shortening the transmission delay compared with CDR and ELSP schemes.

Key words: Ant colony algorithm, Dynamic route, Privacy protection, Source-location, Wireless sensor network

CLC Number: 

  • TN929.5
[1]LI N,ZHANG N,DAS S K,et al.Privacy preservation in wireless sensor networks:A state-of-the-art survey[J].Ad Hoc Networks,2009,7(8):1501-1514.
[2]OZTURK C,ZHANG Y,TRAPPE W.Source-location privacyin energy constrained sensor network routing[C]//Proceedings of the 2nd ACM workshop on Security of Ad Hoc and Sensor Networks.ACM,2004:88-93.
[3]KAMAT P,ZHANG Y,TRAPPE W,et al.Enhancing source location privacy in sensor network routing[C]//25th IEEE International Conference on Distributed Computing Systems,2005(ICDCS 2005).IEEE,2005:599-608.
[4]WANG W P,CHEN L,WANG J X.A Source-Location Privacy Protocol in WSN Based on Locational Angle[C]// IEEE International Conference on Communications,2008(ICC’08).2008.
[5]CHEN J,FANG B X,YIN L H,et al.A Source-Location Privacy Preservation Protocol in Wireless Sensor Networks Using Source-Based Restricted Flooding[J].Chinese Journal of Computers,2010,33(9):1736-1747.
[6]LIU X J,LI J,LI B.Source-Location Privacy Protocol Based on the Minimum Cost Routing[J].Chinese Journal of Sensors and Actuators,2014,27(3):394-400.
[7]ZHOU L L,SHI R H,ZHONG H,et al.Source-location Privacy Preservation Based on Constant Altitude Routing in Wireless Sensor Networks[J].Computer Engineering,2014,40(6):89-94.
[8]SUN M S,LIU Y B,HUANG J.Source-location privacy protection strategy through pseudo normal distribution-based phantom routing in WSN[J].Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2016,28(1):113-119.
[9]WANG W X,LI P Z.A privacy protection method of source location in wireless sensor networks[J].Journal of Chongqing University,2018,41(3):100-108.
[10]JIA Z P,WEI X J,PENG W P.Privacy protection strategy about source location in WSNs based on random angle and circumfe-rential Routing[J].Application Research of Computers,2016,33(3):886-890.
[11]BAI L Q,LI L,QIAN S G,et al.Source-location privacy protection algorithm in WSNs based on ellipse model[J].Control and Decision,2017,32(2):255-261.
[12]ZHOU C,HU X H.Phantom routing privacy protocol based on directed random in WSN[J].Application Research of Compu-ters,2018,35(10):3109-3112.
[13]SPACHOS P,TOUMPAKARIS D,HATZINAKOS D.Angle-Based Dynamic Routing Scheme for Source Location Privacy in Wireless Sensor Networks[C]//Vehicular Technology Confe-rence.IEEE,2014:1-5.
[14]LIU Y,XU Y J,SONG L.Variable-angle based dynamic routing scheme for source-location privacy protection in wireless sensor networks[J].Application Research of Computers,2018,35(1):257-260,265.
[15]MA W,SONG L.Source location privacy preservation routingprotocol based on multi-path[J].Computer Engineering and Applications,2018,54(16):81-85,106.
[16]REN J,ZHANG Y X,LIU K.An Energy-Efficient Cyclic Diversionary Routing Strategy against Global Eavesdroppers in Wireless Sensor Networks[J].International Journal of Distributed Sensor Networks,2013,2013:1-15.
[17]OUYANG Y,LE X Y,CHEN G L,et al.Entrapping adversaries for source protection in sensor networks[C]//International Symposium on World of Wireless,Mobile and Multimedia Networks,2006(WoWMoM 2006).2006.
[18]ZHANG J N,CHU C L.A Scheme to Protect the Source Location Privacy in Wireless Sensor Networks[J].Chinese Journal of Sensors and Actuators,2016,29(9):1405-1409.
[19]RUAN Z,LIANG W,SUN D,et al.An efficient and lightweight source privacy protecting scheme for sensor networks using group knowledge[J].International Journal of Distributed Sensor Networks,2013,2013:1-14.
[1] LU Chen-yang, DENG Su, MA Wu-bin, WU Ya-hui, ZHOU Hao-hao. Federated Learning Based on Stratified Sampling Optimization for Heterogeneous Clients [J]. Computer Science, 2022, 49(9): 183-193.
[2] LIU Xin, WANG Jun, SONG Qiao-feng, LIU Jia-hao. Collaborative Multicast Proactive Caching Scheme Based on AAE [J]. Computer Science, 2022, 49(9): 260-267.
[3] GAO Wen-long, ZHOU Tian-yang, ZHU Jun-hu, ZHAO Zi-heng. Network Attack Path Discovery Method Based on Bidirectional Ant Colony Algorithm [J]. Computer Science, 2022, 49(6A): 516-522.
[4] FAN Xing-ze, YU Mei. Coverage Optimization of WSN Based on Improved Grey Wolf Optimizer [J]. Computer Science, 2022, 49(6A): 628-631.
[5] WANG Mei-shan, YAO Lan, GAO Fu-xiang, XU Jun-can. Study on Differential Privacy Protection for Medical Set-Valued Data [J]. Computer Science, 2022, 49(4): 362-368.
[6] JIN Hua, ZHU Jing-yu, WANG Chang-da. Review on Video Privacy Protection [J]. Computer Science, 2022, 49(1): 306-313.
[7] LEI Yu-xiao , DUAN Yu-cong. AI Governance Oriented Legal to Technology Bridging Framework for Cross-modal Privacy Protection [J]. Computer Science, 2021, 48(9): 9-20.
[8] SUN Zhen-qiang, LUO Yong-long, ZHENG Xiao-yao, ZHANG Hai-yan. Intelligent Travel Route Recommendation Method Integrating User Emotion and Similarity [J]. Computer Science, 2021, 48(6A): 226-230.
[9] WANG Guo-wu, CHEN Yuan-yan. Improvement of DV-Hop Location Algorithm Based on Hop Correction and Genetic Simulated Annealing Algorithm [J]. Computer Science, 2021, 48(6A): 313-316.
[10] GUO Rui, LU Tian-liang, DU Yan-hui. Source-location Privacy Protection Scheme Based on Target Decision in WSN [J]. Computer Science, 2021, 48(5): 334-340.
[11] WANG Rui-jin, TANG Yu-cheng, PEI Xi-kai, GUO Shang-tong, ZHANG Feng-li. Block-chain Privacy Protection Scheme Based on Lightweight Homomorphic Encryption and Zero-knowledge Proof [J]. Computer Science, 2021, 48(11A): 547-551.
[12] JIANG Jian-feng, SUN Jin-xia, YOU Lan-tao. Security Clustering Strategy Based on Particle Swarm Optimization Algorithm in Wireless Sensor Network [J]. Computer Science, 2021, 48(11A): 452-455.
[13] LI Yu, DUAN Hong-yue, YIN Yu-yu, GAO Hong-hao. Survey of Crowdsourcing Applications in Blockchain Systems [J]. Computer Science, 2021, 48(11): 12-27.
[14] YU Qi-long, LU Ning, SHI Wen-bo. Traceable Mixing Scheme for Bitcoin [J]. Computer Science, 2021, 48(11): 72-78.
[15] WEI Li-qi, ZHAO Zhi-hong, BAI Guang-wei, SHEN Hang. Location Privacy Game Mechanism Based on Generative Adversarial Networks [J]. Computer Science, 2021, 48(10): 266-271.
Full text



No Suggested Reading articles found!