[1]施佳琪,吴蒙.一种改进的源节点位置隐私保护方法[J].计算机技术与发展,2013,(11):141-143.
 SHI Jia-qi[],WU Meng[].An Improved Method of Source Node Location Privacy Protection[J].,2013,(11):141-143.
点击复制

一种改进的源节点位置隐私保护方法()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2013年11期
页码:
141-143
栏目:
安全与防范
出版日期:
1900-01-01

文章信息/Info

Title:
An Improved Method of Source Node Location Privacy Protection
文章编号:
1673-629X(2013)11-0141-03
作者:
施佳琪1吴蒙2
[1]南京邮电大学 计算机学院;[2]南京邮电大学 通信工程学院
Author(s):
SHI Jia-qi[1]WU Meng[2]
关键词:
无线传感器网络位置隐私干扰数据
Keywords:
wireless sensor networklocation privacydummy data
文献标志码:
A
摘要:
当传感器网络中存在一个全局监听者的情况下,为了保护源节点的位置安全,文中提出了一种周期性发送干扰数据的算法。网络中的节点周期性地发送干扰数据包,将真实数据混淆在其中,攻击者无法判断真实数据的流向,从而保护了源节点的安全。同时,文中提出在每个节点中设立数据门限的思想,当节点中的数据超过一定门限值,将根据一定策略暂缓发送干扰数据,从而防止网络拥塞等状况的出现,同时能平衡网络的流量状况,节省资源带宽。从网络流量分析结果可知,该算法有效地保护了源节点的安全
Abstract:
There is always supposed to be an global listener in the sensor network,in order to protect the safety of the location privacy of the source node,an algorithm periodically sending the dummy data is proposed. In this method,nodes in a network periodically send dum-my packets to confuse the real data among them and prevent the attacker to determine the flow of the real data. In the meantime, the thought of setting up data threshold in every node are presented. When it stores the data above a certain threshold,it will be suspended to send any dummy data according to some strategies,preventing network congestion status. In the meantime,this thought can balance the network traffic control and save bandwidth resources. The network traffic analysis result shows that this algorithm is effective to protect the safety of the source node

相似文献/References:

[1]李雷 付东阳.基于分层模型的无线传感器网络分簇路由算法[J].计算机技术与发展,2010,(01):132.
 LI Lei,FU Dong-yang.Clustering Protocol Algorithm of Wireless Sensor Networks Based on Level Model[J].,2010,(11):132.
[2]魏烨嘉 王汝传[] 李伟伟 黄海平[] 孙力娟[].基于普适计算环境的三维空间RSSI位置感知研究[J].计算机技术与发展,2010,(04):183.
 WEI Ye-jia,WANG Ru-ehuan[],LI Wei-wei,et al.Research on RSSI- Based Location- Aware in Three- Dimensional Space for Pervasive Computing Environment[J].,2010,(11):183.
[3]邓黎黎 刘才兴.基于信任的无线传感器网络安全路由研究[J].计算机技术与发展,2010,(06):159.
 DENG Li-li,LIU Cai-xing.Research of Trust-Based Secure Routing Protocols for Wireless Sensor Networks[J].,2010,(11):159.
[4]杜鹏雷 吴晓 杨丽平 江涌.面向精准农业的感知节点传感器驱动与控制[J].计算机技术与发展,2010,(06):233.
 DU Peng-lei,WU Xiao,YANG Li-ping,et al.Drive and Control of Sensor Node Facing Precision Agriculture[J].,2010,(11):233.
[5]程佳 支小莉 大贝 晴俊.基于无线传感器网络和ICA的桥梁诊断系统[J].计算机技术与发展,2009,(06):1.
 CHENG Jia,ZHI Xiao-li,OGAI Harutoshi.A Bridge Diagnosis System Based on Wireless Sensor Network and Independent Component Analysis[J].,2009,(11):1.
[6]汪小龙[] 方潜生 葛运建 张伟林[] 周学海[].基于WSN的智能建筑综合控制系统研究[J].计算机技术与发展,2009,(07):48.
 WANG Xiao-long,FANG Qian-sheng,GE Yun-jian,et al.Research on Integrated- Control- System of Intelligent- Building Based on WSN[J].,2009,(11):48.
[7]户晓玲 曾建潮.基于微粒群模型的移动传感器网络部署研究[J].计算机技术与发展,2009,(10):81.
 HU Xiao-ling,ZENG Jian-chao.Deployment of Wireless Sensor Networks Mobile Nodes Based on Particle Swarm Optimization Model[J].,2009,(11):81.
[8]闫倩倩 许勇 夏海燕.一种ZigBee路由算法的分析与改进[J].计算机技术与发展,2009,(12):59.
 YAN Qian-qian,XU Yong,XIA Hai-yan.Analysis and Improvement of a Routing Algorithm in Wireless Sensor Network Based on ZigBee[J].,2009,(11):59.
[9]刘曙 刘林峰 陶军.一种基于蜂窝结构的改进GAF算法[J].计算机技术与发展,2009,(01):39.
 LIU Shu,LIU Lin-feng,TAO Jun.Improved GAF Algorithm with Hexagon- Based Virtual Infrastructure[J].,2009,(11):39.
[10]邓明 张国枢 陈蕴.一种基于ZigBee协议的矿井人员定位技术研究[J].计算机技术与发展,2009,(02):243.
 DENG Ming,ZHANG Guo-shu,CHEN Yun.Research on Positioning Technology of Mining Personnel Based upon ZigBee Protocol[J].,2009,(11):243.
[11]汪玉美,崔逊学,吴海兵,等. 基于多跳LEACH防御流量分析攻击算法研究[J].计算机技术与发展,2014,24(09):154.
 WANG Yu-mei,CUI Xun-xue,WU Hai-bing,et al. Research on Defense Traffic Analysis Attacks Algorithm Based on Multi-hop LEACH[J].,2014,24(11):154.

更新日期/Last Update: 1900-01-01