基于Hilbert填充曲線的海洋無線傳感網(wǎng)源節(jié)點位置隱私保護方法
doi: 10.11999/JEIT190364 cstr: 32379.14.JEIT190364
-
1.
嘉興學(xué)院數(shù)理與信息工程學(xué)院 嘉興 314001
-
2.
嘉興學(xué)院建筑工程學(xué)院 嘉興 314001
-
3.
山西財經(jīng)大學(xué)信息管理學(xué)院 太原 030006
-
4.
通信信息控制和安全技術(shù)重點實驗室 嘉興 314033
A Source-location Privacy Preservation Method Based on Hilbert-filling-curve Routing Protocol in Marine Wireless Sensor Networks
-
1.
College of Mathematics and Information Engineering, Jiaxing University, Jiaxing 314001, China
-
2.
College of CML Engineering and Architecture, Jiaxing University, Jiaxing 314001, China
-
3.
College of Information Management, Shanxi University of Finance and Economics, Taiyuan 030006, China
-
4.
Science and Technology on Communication Information Security Control Laboratory, Jiaxing 314033, China
-
摘要:
節(jié)點位置保護對于海洋無線傳感器網(wǎng)絡(luò)(MWSNs)至關(guān)重要,尤其是對于無人值守的環(huán)境。然而,由于大多數(shù)靜態(tài)部署,傳感器的能量、存儲和通信能力的限制,MWSNs容易受到各種位置(和衍生)攻擊的影響。該文從攻擊和防御兩個方面研究節(jié)點位置隱私保護問題。首先,針對兩種重要節(jié)點(包括基站和源節(jié)點)提出了一種新的二相定位攻擊,它可以在少量的本地?zé)o線傳輸監(jiān)視中找到基站節(jié)點,反向跟蹤源節(jié)點的位置。與現(xiàn)有方法不同,提出的攻擊根據(jù)傳輸方向確定節(jié)點位置,從而突破現(xiàn)有的防御。然后,為了抵御這種攻擊,該文設(shè)計了一種基于Hilbert填充曲線的傳感器網(wǎng)絡(luò)路由節(jié)點位置隱私保護方法(HLPS)。攻防理論分析與對抗實驗表明,該方法能夠保護目標(biāo)節(jié)點的位置隱私,具有較小的通信和計算開銷。
-
關(guān)鍵詞:
- 海上無線傳感網(wǎng) /
- 網(wǎng)絡(luò)安全 /
- 網(wǎng)絡(luò)位置隱私保護 /
- Hilbert填充曲線
Abstract:Source node location protection is critical to the Marine Wireless Sensor Networks (MWSNs), especially for unattended environment. However, due to most of the static deployment and the limitations in energy, storage and communication capabilities of the sensors, MWSNs are vulnerable to various location (and derivative) attacks. In this work, the node location privacy protection issues are studied from both aspects of attacks and defenses. First, a new two-phase location attack is proposed for two important types of nodes (including base station and source node). It can locate a base station node within few amounts of local wireless transmission monitoring, and then reversely traces the location of the source node. Different from existing methods, the proposed attack determines the node location based on the transmission direction, which can break through existing defenses. Then, to defend against such attack, a Hilbert-filling-curve-based Location-privacy Protection Scheme (HLPS) is designed for MWSNs. The theory analysis and confrontation experiment of attack and defense show that the proposed scheme owns capable of protecting the location privacy of the target node with moderate communication and computation overhead.
-
WALID E, THOMAS N, EOIN O, et al. Trust security mechanism for maritime wireless sensor networks[J]. Concurrency and Computation: Practice and Experience, 2017, 29(23): e3945. doi: 10.1002/cpe.3945 陳娟, 方濱興, 殷麗華, 等. 傳感器網(wǎng)絡(luò)中基于源節(jié)點有限洪泛的源位置隱私保護協(xié)議[J]. 計算機學(xué)報, 2010, 33(9): 1736–1747. doi: 10.3724/SP.J.1016.2010.01736CHEN Juan, FANG Binxing, YIN Lihua, et al. A source-location privacy preservation protocol in wireless sensor networks using source-based restricted flooding[J]. Chinese Journal of Computers, 2010, 33(9): 1736–1747. doi: 10.3724/SP.J.1016.2010.01736 BAROUTIS N and YOUNIS M. Using fake sinks and deceptive relays to boost base-station anonymity in wireless sensor network[C]. The 40th IEEE Conference on Local Computer Networks, Clearwater Beach, USA, 2015: 109–116. doi: 10.1109/LCN.2015.7366289. DI PIETRO R and VIEJO A. Location privacy and resilience in wireless sensor networks querying[J]. Computer Communications, 2011, 34(3): 515–523. doi: 10.1016/j.comcom.2010.05.014 AL-MISTARIHI M F, TANASH I M, YASEEN F S, et al. Protecting source location privacy in a clustered wireless sensor networks against local eavesdroppers[J]. Mobile Networks and Applications, 2020, 25(1): 42–54. doi: 10.1007/s11036-018-1189-6 NGAI E C H and RODHE I. On providing location privacy for mobile sinks in wireless sensor networks[J]. Wireless Networks, 2013, 19(1): 115–130. doi: 10.1007/s11276-012-0454-z WANG Jian, WANG Fengyu, CAO Zhenzhong, et al. Sink location privacy protection under direction attack in wireless sensor networks[J]. Wireless Networks, 2017, 23(2): 579–591. doi: 10.1007/s11276-015-1179-6 彭志宇, 李善平. 移動環(huán)境下LBS位置隱私保護[J]. 電子與信息學(xué)報, 2011, 33(5): 1211–1216. doi: 10.3724/SP.J.1146.2010.01050PENG Zhiyu and LI Shanping. Protecting location privacy in location-based services in mobile environments[J]. Journal of Electronics &Information Technology, 2011, 33(5): 1211–1216. doi: 10.3724/SP.J.1146.2010.01050 LONG Jun, LIU Anfeng, DONG Mianxiong, et al. An energy-efficient and sink-location privacy enhanced scheme for WSNs through ring based routing[J]. Journal of Parallel and Distributed Computing, 2015, 81–82: 47–65. doi: 10.1016/j.jpdc.2015.04.003 LIU Anfeng, LIU Xiao, TANG Zhipeng, et al. Preserving smart sink-location privacy with delay guaranteed routing scheme for WSNs[J]. ACM Transactions on Embedded Computing Systems, 2017, 16(3): 68. doi: 10.1145/2990500 BAROUTIS N and YOUNIS M. Load-conscious maximization of base-station location privacy in wireless sensor networks[J]. Computer Networks, 2017, 124: 126–139. doi: 10.1016/j.comnet.2017.06.021 LIN Xiaodong, LU Rongxing, LIANG Xiaohui, et al. STAP: A social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs[C]. 2011 IEEE INFOCOM, Shanghai, China, 2011: 2147–2155. doi: 10.1109/INFCOM.2011.5935026. FAN Yanfei, JIANG Yixin, ZHU Haojin, et al. An efficient privacy-preserving scheme against traffic analysis attacks in network coding[C]. The 28th IEEE International Conference on Computer Communications, Rio de Janeiro, Brazil, 2009: 2213–2221. doi: 10.1109/INFCOM.2009.5062146. HU Ling, KU W S, BAKIRAS S, et al. Spatial query integrity with voronoi neighbors[J]. IEEE Transactions on Knowledge and Data Engineering, 2013, 25(4): 863–876. doi: 10.1109/tkde.2011.267 KALNIS P, GHINITA G, MOURATIDIS K, et al. Preventing location-based identity inference in anonymous spatial queries[J]. IEEE Transactions on Knowledge and Data Engineering, 2007, 19(12): 1719–1733. doi: 10.1109/TKDE.2007.190662 WANG Weiping, CHEN Liang, and WANG Jianxin. A source-location privacy protocol in WSN based on locational angle[C]. 2008 IEEE International Conference on Communications, Beijing, China, 2008: 1630–1634. doi: 10.1109/ICC.2008.315. -