|Table of Contents|

Threshold Routing for Source-Location Privacy Protection in Wireless Sensor Networks(PDF)

《南京师大学报(自然科学版)》[ISSN:1001-4616/CN:32-1239/N]

Issue:
2014年01期
Page:
117-
Research Field:
计算机科学
Publishing date:

Info

Title:
Threshold Routing for Source-Location Privacy Protection in Wireless Sensor Networks
Author(s):
Li Jiang1Liu Xuejun1Zhang Wei2
(1.College of Electronics and Information Engineering,Nanjing Tech University,Nanjing 211816,China) (2.73677 PLA Troops,Nanjing 210016,China)
Keywords:
wireless sensor networkprivacy preservationsource locationthreshold routing
PACS:
TP393
DOI:
-
Abstract:
In recent years,along with the wireless sensor network have more and more widely been applied in the field of military and medical treatment field and so on,the wireless sensor network privacy protection and research get more the public attention.We proposed a protocol of Threshold Routing for Source-Location Privacy Protection in Wireless Sensor Networks(here in after referred to as TR).Different from the past agreement of source-location privacy preservation,the protocol which we propose can ensure the privacy of source node cases,and effectively reduce energy consumption.We do the simulation experiments based on NS2.The results show that Threshold Routing in this paper has more efficient safety protection ability and less energy consumption.

References:

[1] 范永健,陈红,张晓莹.无线传感器网络数据隐私保护技术[J].计算机学报,2012,35(6):1 132-1 146.
[2]Kamat P,Zhang Y,Trappe W,et al.Enhancing source-location privacy in sensor net routing[C]//Proccedings of the 25th International Conference on Distributed Computing Systems(ICDCS).Ohio,2005:599-608.
[3]Silvija Kokalj-Filipovic,Fabrice Le Fessant,Predrag Spasojevic.Trade-offs of source location protection in globally attacked sensor networks:a case analysis[C]//2011 8th Annual IEEE Communications Society Conference on Sensor,Mesh and Ad Hoc Communications and Networks.Salt Lake City,2011:323-331.
[4]Ozturk C,Zhang Y,Trappe W.Source-location privacy in energy constrained sensor networks routing[C]//Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks(SASN).Washing DC,2004:88-93.
[5]姚剑波,郝晓青,文光俊.无线传感器网络中的位置隐私保护[J].传感技术学报,2008,21(8):1 437-1 441.
[6]Wang W P,Chen L,Wang J X.A source-location privacy protocol in WSN based on locational angle[C]//Proceedings of the IEEE Intenational Conference on Communications(ICC).Beijing,2008:1 630-1 634.
[7]陈娟,方滨兴,殷丽华,等.传感器网络中基于源节点有限洪泛的源位置隐私保护协议[J].计算机学报,2010,33(9):1 737-1 747.
[8]Edith C H Ngai,Ioana Rodhe.On providing location privacy for mobile sinks in wireless sensor networks[J].Wireless Networks,2013,19(1):115-130.
[9]Yao Lin,Kang Lin,Deng Fangyu,et al.Protecting source-location privacy based on multirings in wireless sensor networks[EB/OL].[2013-06-21]DOI:10.1002/cpe.3075.
[10]马朝,斌贾晋,康张立军.Ad hoc网络中广播风暴的抑制方案[J].中国数据通信,2005(3):35-39.

Memo

Memo:
-
Last Update: 2014-03-30