一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級搜索

留言板

尊敬的讀者、作者、審稿人, 關(guān)于本刊的投稿、審稿、編輯和出版的任何問題, 您可以本頁添加留言。我們將盡快給您答復(fù)。謝謝您的支持!

姓名
郵箱
手機號碼
標(biāo)題
留言內(nèi)容
驗證碼

基于Hilbert填充曲線的海洋無線傳感網(wǎng)源節(jié)點位置隱私保護方法

李攀攀 謝正霞 周志剛 樂光學(xué) 鄭仕鏈 楊小牛

李攀攀, 謝正霞, 周志剛, 樂光學(xué), 鄭仕鏈, 楊小牛. 基于Hilbert填充曲線的海洋無線傳感網(wǎng)源節(jié)點位置隱私保護方法[J]. 電子與信息學(xué)報, 2020, 42(6): 1510-1518. doi: 10.11999/JEIT190364
引用本文: 李攀攀, 謝正霞, 周志剛, 樂光學(xué), 鄭仕鏈, 楊小牛. 基于Hilbert填充曲線的海洋無線傳感網(wǎng)源節(jié)點位置隱私保護方法[J]. 電子與信息學(xué)報, 2020, 42(6): 1510-1518. doi: 10.11999/JEIT190364
Panpan LI, Zhengxia XIE, Zhigang ZHOU, Guangxue YUE, Shilian ZHENG, Xiaoniu YANG. A Source-location Privacy Preservation Method Based on Hilbert-filling-curve Routing Protocol in Marine Wireless Sensor Networks[J]. Journal of Electronics & Information Technology, 2020, 42(6): 1510-1518. doi: 10.11999/JEIT190364
Citation: Panpan LI, Zhengxia XIE, Zhigang ZHOU, Guangxue YUE, Shilian ZHENG, Xiaoniu YANG. A Source-location Privacy Preservation Method Based on Hilbert-filling-curve Routing Protocol in Marine Wireless Sensor Networks[J]. Journal of Electronics & Information Technology, 2020, 42(6): 1510-1518. doi: 10.11999/JEIT190364

基于Hilbert填充曲線的海洋無線傳感網(wǎng)源節(jié)點位置隱私保護方法

doi: 10.11999/JEIT190364 cstr: 32379.14.JEIT190364
基金項目: 國家自然科學(xué)基金(U19B2015, 61902226),浙江省教育廳一般科研項目(Y201840356)
詳細信息
    作者簡介:

    李攀攀:男,1983年生,講師,研究方向為隱私保護、網(wǎng)絡(luò)空間安全等

    謝正霞:女,1982年生,工程師,研究方向為傳感器網(wǎng)絡(luò),隱私保護等

    周志剛:男,1986年生,博士,講師,研究方向為隱私保護、網(wǎng)絡(luò)空間安全等

    樂光學(xué):男,1963年生,博士,教授,研究方向為多云融合與協(xié)同服務(wù)、無線Mesh網(wǎng)絡(luò)與移動云計算、網(wǎng)絡(luò)空間安全等

    鄭仕鏈:男,1984年生,博士,高級工程師,研究方向為認知無線電、深度學(xué)習(xí)、通信信號處理等

    楊小牛:男,1961年生,研究員,研究方向為軟件無線電、深度學(xué)習(xí)、通信信號處理等

    通訊作者:

    李攀攀 pli0311@aliyun.com

  • 中圖分類號: TN915.08; TP393.08

A Source-location Privacy Preservation Method Based on Hilbert-filling-curve Routing Protocol in Marine Wireless Sensor Networks

Funds: The National Natural Science Foundation of China(U19B2015, 61902226), The General Research Projects of Zhejiang Provincial Education Department(Y201840356)
  • 摘要:

    節(jié)點位置保護對于海洋無線傳感器網(wǎng)絡(luò)(MWSNs)至關(guān)重要,尤其是對于無人值守的環(huán)境。然而,由于大多數(shù)靜態(tài)部署,傳感器的能量、存儲和通信能力的限制,MWSNs容易受到各種位置(和衍生)攻擊的影響。該文從攻擊和防御兩個方面研究節(jié)點位置隱私保護問題。首先,針對兩種重要節(jié)點(包括基站和源節(jié)點)提出了一種新的二相定位攻擊,它可以在少量的本地?zé)o線傳輸監(jiān)視中找到基站節(jié)點,反向跟蹤源節(jié)點的位置。與現(xiàn)有方法不同,提出的攻擊根據(jù)傳輸方向確定節(jié)點位置,從而突破現(xiàn)有的防御。然后,為了抵御這種攻擊,該文設(shè)計了一種基于Hilbert填充曲線的傳感器網(wǎng)絡(luò)路由節(jié)點位置隱私保護方法(HLPS)。攻防理論分析與對抗實驗表明,該方法能夠保護目標(biāo)節(jié)點的位置隱私,具有較小的通信和計算開銷。

  • 圖  1  海上無線傳感器網(wǎng)絡(luò)示意圖

    圖  2  攻擊者攻擊策略示意圖

    圖  3  隱私保護策略與攻擊者監(jiān)聽域關(guān)系示意圖

    圖  4  基于Hilbert填充曲線的節(jié)點位置隱私保護路由方法示意圖

    圖  5  基于泰森多邊形的多線序區(qū)域劃分實例

    圖  6  HLPS方法在不同沿Hilbert線上路由次數(shù)的通信開銷

    圖  7  HLPS方法在不同可探測角度的通信開銷

    圖  8  HLPS方法在源節(jié)點/基站不同距離下的通信開銷

    圖  9  4種方法通信開銷對比

    圖  10  HLPS方法在路由所需最大Hilbert填充曲線次數(shù)下的可探測角

    圖  11  不同可探測角度情況下4種方法的安全時間對比

  • WALID E, THOMAS N, EOIN O, et al. Trust security mechanism for maritime wireless sensor networks[J]. Concurrency and Computation: Practice and Experience, 2017, 29(23): e3945. doi: 10.1002/cpe.3945
    陳娟, 方濱興, 殷麗華, 等. 傳感器網(wǎng)絡(luò)中基于源節(jié)點有限洪泛的源位置隱私保護協(xié)議[J]. 計算機學(xué)報, 2010, 33(9): 1736–1747. doi: 10.3724/SP.J.1016.2010.01736

    CHEN Juan, FANG Binxing, YIN Lihua, et al. A source-location privacy preservation protocol in wireless sensor networks using source-based restricted flooding[J]. Chinese Journal of Computers, 2010, 33(9): 1736–1747. doi: 10.3724/SP.J.1016.2010.01736
    BAROUTIS N and YOUNIS M. Using fake sinks and deceptive relays to boost base-station anonymity in wireless sensor network[C]. The 40th IEEE Conference on Local Computer Networks, Clearwater Beach, USA, 2015: 109–116. doi: 10.1109/LCN.2015.7366289.
    DI PIETRO R and VIEJO A. Location privacy and resilience in wireless sensor networks querying[J]. Computer Communications, 2011, 34(3): 515–523. doi: 10.1016/j.comcom.2010.05.014
    AL-MISTARIHI M F, TANASH I M, YASEEN F S, et al. Protecting source location privacy in a clustered wireless sensor networks against local eavesdroppers[J]. Mobile Networks and Applications, 2020, 25(1): 42–54. doi: 10.1007/s11036-018-1189-6
    NGAI E C H and RODHE I. On providing location privacy for mobile sinks in wireless sensor networks[J]. Wireless Networks, 2013, 19(1): 115–130. doi: 10.1007/s11276-012-0454-z
    WANG Jian, WANG Fengyu, CAO Zhenzhong, et al. Sink location privacy protection under direction attack in wireless sensor networks[J]. Wireless Networks, 2017, 23(2): 579–591. doi: 10.1007/s11276-015-1179-6
    彭志宇, 李善平. 移動環(huán)境下LBS位置隱私保護[J]. 電子與信息學(xué)報, 2011, 33(5): 1211–1216. doi: 10.3724/SP.J.1146.2010.01050

    PENG Zhiyu and LI Shanping. Protecting location privacy in location-based services in mobile environments[J]. Journal of Electronics &Information Technology, 2011, 33(5): 1211–1216. doi: 10.3724/SP.J.1146.2010.01050
    LONG Jun, LIU Anfeng, DONG Mianxiong, et al. An energy-efficient and sink-location privacy enhanced scheme for WSNs through ring based routing[J]. Journal of Parallel and Distributed Computing, 2015, 81–82: 47–65. doi: 10.1016/j.jpdc.2015.04.003
    LIU Anfeng, LIU Xiao, TANG Zhipeng, et al. Preserving smart sink-location privacy with delay guaranteed routing scheme for WSNs[J]. ACM Transactions on Embedded Computing Systems, 2017, 16(3): 68. doi: 10.1145/2990500
    BAROUTIS N and YOUNIS M. Load-conscious maximization of base-station location privacy in wireless sensor networks[J]. Computer Networks, 2017, 124: 126–139. doi: 10.1016/j.comnet.2017.06.021
    LIN Xiaodong, LU Rongxing, LIANG Xiaohui, et al. STAP: A social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs[C]. 2011 IEEE INFOCOM, Shanghai, China, 2011: 2147–2155. doi: 10.1109/INFCOM.2011.5935026.
    FAN Yanfei, JIANG Yixin, ZHU Haojin, et al. An efficient privacy-preserving scheme against traffic analysis attacks in network coding[C]. The 28th IEEE International Conference on Computer Communications, Rio de Janeiro, Brazil, 2009: 2213–2221. doi: 10.1109/INFCOM.2009.5062146.
    HU Ling, KU W S, BAKIRAS S, et al. Spatial query integrity with voronoi neighbors[J]. IEEE Transactions on Knowledge and Data Engineering, 2013, 25(4): 863–876. doi: 10.1109/tkde.2011.267
    KALNIS P, GHINITA G, MOURATIDIS K, et al. Preventing location-based identity inference in anonymous spatial queries[J]. IEEE Transactions on Knowledge and Data Engineering, 2007, 19(12): 1719–1733. doi: 10.1109/TKDE.2007.190662
    WANG Weiping, CHEN Liang, and WANG Jianxin. A source-location privacy protocol in WSN based on locational angle[C]. 2008 IEEE International Conference on Communications, Beijing, China, 2008: 1630–1634. doi: 10.1109/ICC.2008.315.
  • 加載中
圖(11)
計量
  • 文章訪問數(shù):  3357
  • HTML全文瀏覽量:  1842
  • PDF下載量:  67
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  2019-05-22
  • 修回日期:  2020-03-05
  • 網(wǎng)絡(luò)出版日期:  2020-04-17
  • 刊出日期:  2020-06-22

目錄

    /

    返回文章
    返回