作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2021, Vol. 47 ›› Issue (8): 170-176,182. doi: 10.19678/j.issn.1000-3428.0059065

• 网络空间安全 • 上一篇    下一篇

基于垂线的WSN基站位置隐私保护算法

于吉喆, 白乐强, 曹科研   

  1. 沈阳建筑大学 信息与控制工程学院, 沈阳 110168
  • 收稿日期:2020-07-27 修回日期:2020-09-02 发布日期:2020-09-02
  • 作者简介:于吉喆(1996-),男,硕士研究生,主研方向为隐私保护算法、无线传感器网络;白乐强,教授、博士;曹科研,副教授、博士。
  • 基金资助:
    国家自然科学基金(61602323);中国博士后基金(2016M591455);辽宁省教育厅科学研究项目(lnqn201913)。

Perpendicular-Based Algorithm for the Protection of Sink Location Privacy in WSN

YU Jizhe, BAI Leqiang, CAO Keyan   

  1. Information & Control Engineering Faculty, Shenyang Jianzhu University, Shenyang 110168, China
  • Received:2020-07-27 Revised:2020-09-02 Published:2020-09-02

摘要: 针对无线传感器网络基站位置隐私保护问题,提出一种基于垂线的基站位置隐私保护算法。根据源节点的位置与坐标轴上一点随机确定一条直线,过基站做直线的垂线,源节点关于该垂线对称的点为第1个预期幻影源节点,使第1个幻影源节点分布具有地理位置多样性。以第1个预期幻影源节点为垂足建立垂线,在该垂线上确定第2个预期幻影源节点,为第2个幻影源节点提供选择方向,2个幻影源节点不仅能够为数据包传输提供多样性,而且分别沿着直线和垂线传输假包,诱导攻击者向远离基站的方向追踪,增大攻击者捕获基站的难度。仿真结果表明,该算法能够有效地诱导攻击者偏离真实路径,提高安全周期。

关键词: 无线传感器网络, 基站位置隐私, 垂线, 幻影源节点, 假包

Abstract: For the protection of sink location privacy in Wireless Sensor Network(WSN), a perpendicular-based algorithm is proposed. A straight line is randomly established, which passes the location of the source node and a random point on the coordinate axis. Then a perpendicular of the straight line is made through the sink, and the symmetrical point of the source node about the perpendicular is the first expected phantom source node, which provides geographic distribution diversity for the first phantom source node. A perpendicular is established with the first expected phantom source node as the foot of a perpendicular. The second expected phantom source node is determined on this perpendicular, which provides direction for the selection of the second phantom source node. The two expected phantom source nodes provide directions for selecting two phantom source nodes. The two phantom source nodes provide diversity for the packet transmission path, and transmit fake packets along the straight line and the perpendicular respectively. So they mislead an adversary from the sink, increasing the difficulty for the attackers to capture the sink. The simulation results show that the algorithm can effectively mislead an adversary from the real path and improve the safe time.

Key words: Wireless Sensor Network(WSN), sink location privacy, perpendicular, phantom source node, fake packet

中图分类号: