[1]李 江,刘学军,章 玮.基于门限路由的源节点位置隐私保护协议[J].南京师大学报(自然科学版),2014,37(01):117.
 Li Jiang,Liu Xuejun,Zhang Wei.Threshold Routing for Source-Location Privacy Protection in Wireless Sensor Networks[J].Journal of Nanjing Normal University(Natural Science Edition),2014,37(01):117.
点击复制

基于门限路由的源节点位置隐私保护协议()
分享到:

《南京师大学报(自然科学版)》[ISSN:1001-4616/CN:32-1239/N]

卷:
第37卷
期数:
2014年01期
页码:
117
栏目:
计算机科学
出版日期:
2014-03-30

文章信息/Info

Title:
Threshold Routing for Source-Location Privacy Protection in Wireless Sensor Networks
作者:
李 江1刘学军1章 玮2
(1.南京工业大学电子与信息工程学院,江苏 南京 211816) (2.中国人民解放军73677部队,江苏 南京 210016)
Author(s):
Li Jiang1Liu Xuejun1Zhang Wei2
(1.College of Electronics and Information Engineering,Nanjing Tech University,Nanjing 211816,China) (2.73677 PLA Troops,Nanjing 210016,China)
关键词:
无线传感器网络隐私保护源位置门限路由
Keywords:
wireless sensor networkprivacy preservationsource locationthreshold routing
分类号:
TP393
文献标志码:
A
摘要:
近年来,随着无线传感器网络在军事和医疗等领域的应用越来越多,无线传感器网络的隐私保护研究受到了人们的广泛关注.本文提出了一种门限路由的源节点位置隐私保护协议(Threshold Routing for Source-Location Privacy Protection,TR),与已存在的源位置隐私保护协议不同,该协议可以提供更高效的隐私保护能力和有效地降低能量的消耗.应用NS2进行模拟仿真实验,结果表明与其他的隐私保护协议相比,门限路由协议在能耗和隐私保护方面具有更好的性能.
Abstract:
In recent years,along with the wireless sensor network have more and more widely been applied in the field of military and medical treatment field and so on,the wireless sensor network privacy protection and research get more the public attention.We proposed a protocol of Threshold Routing for Source-Location Privacy Protection in Wireless Sensor Networks(here in after referred to as TR).Different from the past agreement of source-location privacy preservation,the protocol which we propose can ensure the privacy of source node cases,and effectively reduce energy consumption.We do the simulation experiments based on NS2.The results show that Threshold Routing in this paper has more efficient safety protection ability and less energy consumption.

参考文献/References:

[1] 范永健,陈红,张晓莹.无线传感器网络数据隐私保护技术[J].计算机学报,2012,35(6):1 132-1 146.
[2]Kamat P,Zhang Y,Trappe W,et al.Enhancing source-location privacy in sensor net routing[C]//Proccedings of the 25th International Conference on Distributed Computing Systems(ICDCS).Ohio,2005:599-608.
[3]Silvija Kokalj-Filipovic,Fabrice Le Fessant,Predrag Spasojevic.Trade-offs of source location protection in globally attacked sensor networks:a case analysis[C]//2011 8th Annual IEEE Communications Society Conference on Sensor,Mesh and Ad Hoc Communications and Networks.Salt Lake City,2011:323-331.
[4]Ozturk C,Zhang Y,Trappe W.Source-location privacy in energy constrained sensor networks routing[C]//Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks(SASN).Washing DC,2004:88-93.
[5]姚剑波,郝晓青,文光俊.无线传感器网络中的位置隐私保护[J].传感技术学报,2008,21(8):1 437-1 441.
[6]Wang W P,Chen L,Wang J X.A source-location privacy protocol in WSN based on locational angle[C]//Proceedings of the IEEE Intenational Conference on Communications(ICC).Beijing,2008:1 630-1 634.
[7]陈娟,方滨兴,殷丽华,等.传感器网络中基于源节点有限洪泛的源位置隐私保护协议[J].计算机学报,2010,33(9):1 737-1 747.
[8]Edith C H Ngai,Ioana Rodhe.On providing location privacy for mobile sinks in wireless sensor networks[J].Wireless Networks,2013,19(1):115-130.
[9]Yao Lin,Kang Lin,Deng Fangyu,et al.Protecting source-location privacy based on multirings in wireless sensor networks[EB/OL].[2013-06-21]DOI:10.1002/cpe.3075.
[10]马朝,斌贾晋,康张立军.Ad hoc网络中广播风暴的抑制方案[J].中国数据通信,2005(3):35-39.

相似文献/References:

[1]张丽虹.无线传感网络改进混合移动代理路由的研究[J].南京师大学报(自然科学版),2012,35(04):145.
 Zhang Lihong.Study on Improved Hybrid Mobile Agent Routing in Wireless Sensor Networks[J].Journal of Nanjing Normal University(Natural Science Edition),2012,35(01):145.
[2]李致远,朱求志,吴永焜,等.基于小波分析的无线传感网实时异常检测算法[J].南京师大学报(自然科学版),2014,37(01):87.
 Li Zhiyuan,Zhu Qiuzhi,Wu Yongkun,et al.Wavelet Analysis-Based Real-Time Anomaly Detection Algorithm for Wireless Sensor Network[J].Journal of Nanjing Normal University(Natural Science Edition),2014,37(01):87.
[3]王一蕾,吴英杰,孙 岚,等.面向多敏感属性保护的p-覆盖k-匿名算法[J].南京师大学报(自然科学版),2013,36(04):41.
 Wang Yilei,Wu Yingjie,Sun Lan,et al.A p-Cover k-Anonymity Algorithm for Protecting Multiple Sensitive Attributes[J].Journal of Nanjing Normal University(Natural Science Edition),2013,36(01):41.
[4]徐晓菊,唐 翔,黄为勇.一种基于RSSI的煤矿井下WSN节点快速定位算法[J].南京师大学报(自然科学版),2014,37(04):158.
 Xu Xiaoju,Tang Xiang,Huang Weiyong.A Fast Node Localization Algorithm for Coal-mine UndergroundBased on RSSI[J].Journal of Nanjing Normal University(Natural Science Edition),2014,37(01):158.
[5]陈 璟,虞继敏.基于果蝇—广义回归神经网络优化的WSN节点定位算法[J].南京师大学报(自然科学版),2017,40(02):31.[doi:10.3969/j.issn.1001-4616.2017.02.006]
 Chen Jing,Yu Jimin.Node Localization Algorithm of WSN Based on Fruit Flies Optimizationand Generalized Regression Neural Network[J].Journal of Nanjing Normal University(Natural Science Edition),2017,40(01):31.[doi:10.3969/j.issn.1001-4616.2017.02.006]
[6]李邦源,张春辉,常 荣,等.5G边缘计算环境下资源效用与隐私保护权衡的服务迁移方法[J].南京师大学报(自然科学版),2021,44(04):102.[doi:10.3969/j.issn.1001-4616.2021.04.013]
 Li Bangyuan,Zhang Chunhui,Chang Rong,et al.A Service Offloading Method for Resource Utilization and PrivacyPreservation Trade-offs in 5G-Enabled Edge Computing[J].Journal of Nanjing Normal University(Natural Science Edition),2021,44(01):102.[doi:10.3969/j.issn.1001-4616.2021.04.013]

备注/Memo

备注/Memo:
收稿日期:2013-08-10.
通讯联系人:李江,硕士研究生,研究方向:传感器网络.E-mail:15251899213@yeah.net
更新日期/Last Update: 2014-03-30