计算机工程

• 安全技术 • 上一篇    下一篇

WSN中基于等高度路由的源位置隐私保护

周玲玲1,2,石润华1,2,仲 红1,2,章 青1,2   

  1. (1. 安徽大学计算智能与信号处理教育部重点实验室,合肥 230039;2. 安徽大学计算机科学与技术学院,合肥 230601)
  • 收稿日期:2013-04-15 出版日期:2014-06-15 发布日期:2014-06-13
  • 作者简介:周玲玲(1987-),女,硕士研究生,主研方向:无线传感器网络,隐私保护;石润华、仲 红,教授、博士;章 青,硕士研究生。
  • 基金项目:
    国家自然科学基金资助项目(61173187, 61173188);安徽省自然科学基金资助项目(11040606M141);安徽大学博士科研启动经费基金资助项目(33190187);安徽大学“信息安全”新专业基金资助项目(17110099)。

Source-location Privacy Preservation Based on Constant Altitude Routing in Wireless Sensor Networks

ZHOU Ling-ling  1,2, SHI Run-hua  1,2, ZHONG Hong  1,2, ZHANG Qing  1,2   

  1. (1. Key Laboratory of Intelligent Computing & Signal Processing, Ministry of Education, Anhui University, Hefei 230039, China; 2. School of Computer Science and Technology, Anhui University, Hefei 230601, China)
  • Received:2013-04-15 Online:2014-06-15 Published:2014-06-13

摘要: 在无线传感器网络中,网络中的攻击者可以通过逆向、逐跳追踪数据包的方式追踪到源节点的位置,进而危害目标对象,所以对源位置的隐私保护很重要,但已有保护源位置隐私的幻影路由协议可能产生失效路径,从而缩短安全时间。为此,提出一种有向等高度路由与幻影路由相结合的源位置隐私保护协议。数据包在进行幻影路由之前先进行h+r跳的有向等高度路由,之后再发起幻影路由过程,以避免失效路径的产生,并增加有效路径的数量。实验结果表明,当源节点位置不变时,增加少量的数据包转发开销,源节点的安全时间可以增加50%,当源节点位置变换频繁时,通信开销也明显低于PUSBRF等协议。

关键词: 无线传感器网络, 源位置, 隐私保护, 等高度路由, 失效路径, 有效路径

Abstract: In Wireless Sensor Network(WSN), the attacker can reverse locate the location of the source node hop-by-hop and further attack the protected object, so it is essential to protect the source location privacy. For the shortage of routing through the visible area and further shortening the secure time in the existing phantom routing protocols, this paper proposes a new source-location privacy preservation protocol combining the directed constant altitude routing with phantom routing. Theoretical analysis indicates that this protocol completely avoids the failure path and increases the number of the effective paths, and thus it can improve the secure time. Simulation experimental results show that while source node’s location is fixed, the protocol can improve the safety time by 50% with litter packet latency and when source location changes frequently, the protocol has obvious advantages in communication compared with the PUSBRF.

Key words: Wireless Sensor Network(WSN), source-location, privacy preservation, constant altitude routing, failure path, effective path

中图分类号: