计算机与现代化

• 网络与通信 • 上一篇    下一篇

一种WSN中多幻影节点源位置隐私保护协议

  

  1. (南京航空航天大学计算机科学与技术学院,江苏南京210016)
  • 收稿日期:2016-06-27 出版日期:2017-03-09 发布日期:2017-03-20
  • 作者简介:朱世照(1992-),男,安徽明光人,南京航空航天大学计算机科学与技术学院硕士研究生,研究方向:无线传感器网络; 薛善良(1972-),男,副教授,博士,研究方向:无线传感器网络,计算机应用技术,先进制造技术。

A Multiple-phantom Node Source Location Privacy Preserving Protocol in WSN

  1. (College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China)
  • Received:2016-06-27 Online:2017-03-09 Published:2017-03-20

摘要:

在应用于目标监测的无线传感器网络中,攻击者可通过回溯追踪源节点发送数据包而获取源节点位置,从而对监测目标安全造成威胁。因此,需要采取相应策略进行源位置隐私保护。已有基于幻影节点的路由策略选取幻影节点的策略集中在源数据包随机或定向游走,存在幻影节点地理位置不够多样化,随机游走路径易重复等问题。在网络初始化阶段,本文通过选取基站节点的节点三元组过程中,为整个网络节点同时确定2个备选幻影节点,而节点三元组选取策略在地理位置的计算时要确保2个幻影节点的位置均位于可视区之外,以避免失效路径的产生;在路由工作阶段,根据随机数产生机制随机选取一个幻影节点发送数据包,利用中继节点与目标幻影节点间扇形区域划分的方法,有效减少路径重复几率和数据包传输时延。理论分析和仿真实验表明,本文提出的多幻影节点源位置保护策略相比已有多幻影节点策略能提高源节点的安全周期的同时,在通信时延方面也能取得较好平衡。

关键词: 无线传感器网络, 源位置, 隐私保护, 多幻影节点, 扇形区域划分

Abstract:

 In WSN applied for monitoring objects, attackers can get the location of source node by hop-by-hop traceback to data packet, which is an enormous threat to the safety of monitoring object. Thus, it is necessary to apply some appropriate strategies to protect the source location privacy. When existing route strategies based on phantom node select phantom node, these strategies concentrate on source data packet walking randomly or in constructed track, however, the locations of phantom nodes are not diversified and the walk paths overlap easily. During the network initialization phase, we selected two phantom nodes for every node through the triplet creation. The triplet creation method can ensure the two phantom nodes for every node are both outside the visible area by calculating the geographical location of node. During route work phase, source node chose a phantom node through random number and sent data packet, relay nodes transmit data packet by sector region division and selection. Theoretical analysis and simulation experiment shows that, the proposed strategy enhances safety of source node and ensures the balance of transmission delay.

Key words: wireless sensor network, source-location, privacy preserving, multiple-phantom node, sector-region division

中图分类号: