Space crowdsourcing network node location method for secret protection
Technical field
The present invention relates to network information security technologies, specifically, being a kind of space crowdsourcing network node location privacy guarantor
Maintaining method.
Background technology
Crowdsourcing refers to the task that a company or mechanism are executed the past by employee, by freely it is voluntary in the form of outside
It wraps to the way of unspecific (and being typically large-scale) public network.Although each contributor is only completed a small portion of task
Point, but the result that everybody makes great efforts will produce unexpected achievement.Just because of crowdsourcing, which can be significantly reduced, completes required by task
Cost, and it is more sufficiently effective utilize labour and resource, so being widely used in various activities.
In such applications, often with promising one kind, it is referred to one group of space tasks crowdsourcing space crowdsourcing right and wrong
To the process of a group worker, and so-called space tasks are related to specific position, and worker needs to physically go to these positions
Set execution inter-related task.Classical space crowdsourcing network includes 3 parts:Task requester, worker and a space crowdsourcing
Central server, this server connect registered task requester and the person of working online, then according to certain criterion point
Dispensing worker's space tasks.
In order to complete task, the distance that worker needs to go to the position of required by task, and walked is for a worker
It receives and performs and is necessary Consideration and crucial cost cost for a task.Existing space crowdsourcing is generally divided into
Two kinds of operating modes:Worker selects task (WST) pattern and server to distribute task (SAT) pattern.Under WST patterns, clothes
Task is published on the net by business device after receiving task, their closer tasks of the chosen distance that worker can be autonomous without
Will with server communication and report themselves current location.But this pattern is possible to will produce a kind of drawback, that is, is permitted
Multiplexing author selects to execute identical a task, is stalled without any worker so as to cause some other tasks
The enthusiasm to them is represented, this is because worker is usually more prone to apart from their closer tasks.In SAT patterns
In, worker usually requires to report their position to server, and server will be according to the global information that it is grasped
A matching algorithm is executed to distribute task to suitable worker.This pattern more sufficiently effective can utilize worker
Labour to obtain higher task completion rate, but need worker that their current positions are supplied to server,
However server is not completely credible, so the location privacy of worker is possible to be leaked.If the position of worker is believed
Breath reveals disclosure by server, and attacker probably accesses and be inferred to the sensitive information of worker.For example, in certain journey
On degree, if attacker has grasped the place at the current place of worker and residing time, they can get worker's
Hobby and interest.Attacker can also track the location of worker, when these positions are exactly such as hospital, church etc
When specific position, can the privacies such as its physical condition or religious belief be carried out with some specific deductions.So location privacy
Protection has become a necessary part of space crowdsourcing application, if the location privacy of worker cannot ensure well, he
Also would not gladly go participate in correlation space task.
Invention content
In order to cope with the worry that location privacy is revealed during the crowdsourcing of space, the present invention proposes a kind of space crowdsourcing network
Node location method for secret protection, specific technical solution are as follows:
A kind of space crowdsourcing network node location method for secret protection, key are to include the following steps:
S1:The step of requestor sends demand for services to server;
S2:The step of worker executes sub-clustering according to oneself position;
S3:The step of cluster head generates virtual cluster center according to cluster membership location's information;
S4:Cluster head randomly chooses a cluster member and as factorage person and is sent to virtual cluster center location information
Step;
S5:The step of factorage person reports virtual cluster center location information to server;
S6:Server selects the virtual cluster center nearest from demand for services place, and assigns the task in the virtual cluster
The step of factorage person corresponding to the heart;
S7:Factorage person will receive the step of task is transmitted to cluster head;
S8:Cluster head assigns the task to the step of cluster member nearest from demand for services place;
S9:The cluster member to receive an assignment executes the step of task and feedback information.
Information exchange is carried out based on the above method, after the completion of the registered person's of working online sub-clustering stage, server receives
Be virtual cluster centre coordinate, which is sent out as agency to server by a randomly selected member in a cluster
It send, when a requestor sends a space tasks to server, execution is also the distribution of two-stage space tasks, in first fraction
With in the stage, server is appointed according to the virtual cluster centre coordinate position collected to be chosen as worker's distribution of agency to those
Business, in the allocated phase of the second level, cluster head receives task from factorage person, and according to the accurate location of worker in cluster come
Task is distributed to some cluster member nearest apart from task point.Therefore, in the assigning process of entire space tasks, each
The specific location privacy of worker is all underground for requestor and server, to reach location privacy protection
Purpose.
As a kind of executive mode, worker actively executes sub-clustering in step S2, specially:
S21:The registered person of working online periodically generates the random number between one (0,1) respectively, if this
Number is less than predetermined threshold value P, then the worker is identified as cluster head;
S22:The worker for regarding as cluster head broadcasts a cluster head solicited message in a manner of single-hop, the cluster head request packet
Cluster head location information is contained;
S23:The operated adjacent person selection one for receiving cluster head solicited message is added apart from nearest cluster head where it
In cluster;
S24:Non- cluster head worker sends confirmation message to the cluster head of affiliated cluster, which includes that the position of itself is believed
Breath.
As another executive mode, worker executes sub-clustering on demand in step S2, specially:
S21':Server receives and broadcasts one to all registered persons of working online after the demand for services of requestor's transmission
Sub-clustering enabling signal;
S22':The registered person of working online receive between one (0,1) is generated after sub-clustering enabling signal respectively with
Machine number, if this number is less than predetermined threshold value P, which is identified as cluster head;
S23':The worker for regarding as cluster head broadcasts a cluster head solicited message in a manner of single-hop, the cluster head solicited message
Contain cluster head location information;
S24':The operated adjacent person selection one for receiving cluster head solicited message is added apart from nearest cluster head where it
In cluster;
S25':Non- cluster head worker sends confirmation message to the cluster head of affiliated cluster, which includes the position of itself
Information.
In the process of implementation, cluster head calculates the location information at virtual cluster center according to following formula in step S3:
Wherein,For cluster CjVirtual cluster center abscissa,For cluster CjVirtual cluster center ordinate, xiFor cluster
CjIn i-th of cluster member WiAbscissa, yiFor cluster CjIn i-th of cluster member WiOrdinate, NjFor cluster CjMiddle cluster member's is total
Number.
The present invention remarkable result be:Principle is simple, and it is convenient to realize, by the position for reporting virtual cluster center to server
Information is distributed to replace the accurate location of worker using two-stage task, and worker's location privacy is efficiently avoided
Leakage, average task response-time is short, and average task expense is small, and algorithm performance is reliable and stable.
Description of the drawings
Fig. 1 is the network topology structure figure of the present invention;
Fig. 2 is the algorithm performance comparison diagram of different sub-clustering modes.
Specific implementation mode
Specific embodiment and working principle of the present invention will be described in further detail below in conjunction with the accompanying drawings.
As shown in Figure 1, crowdsourcing network in space is mainly by requestor requester, worker worker, server
It constitutes, for server distributes mission mode, requestor sends demand for services, clothes to server first when needing service
The task is distributed to some specific worker further according to the position situation of each worker and wanted in above process by business device
Think that the location privacy protection of realization worker, the present invention propose a kind of space crowdsourcing network node location method for secret protection,
Specifically execute according to the following steps:
S1:The step of requestor sends demand for services to server;
S2:The step of worker executes sub-clustering according to oneself position has been divided into n cluster, cluster 1 ... in figure
cluster n;
S3:The step of cluster head generates virtual cluster center according to cluster membership location's information;
S4:Cluster head randomly chooses a cluster member and as factorage person and is sent to virtual cluster center location information
Step, cluster head is head in figure, and factorage person is agent;
S5:The step of factorage person reports virtual cluster center location information to server;
S6:Server selects the virtual cluster center nearest from demand for services place, and assigns the task in the virtual cluster
The step of factorage person corresponding to the heart;
S7:Factorage person will receive the step of task is transmitted to cluster head;
S8:Cluster head assigns the task to the step of cluster member nearest from demand for services place;
S9:The cluster member to receive an assignment executes the step of task and feedback information.
As an implementation, worker actively executes sub-clustering in step S2, specially:
S21:The registered person of working online periodically generates the random number between one (0,1) respectively, if this
Number is less than predetermined threshold value P, then the worker is identified as cluster head;
S22:The worker for regarding as cluster head broadcasts a cluster head solicited message in a manner of single-hop, the cluster head request packet
Cluster head location information is contained;
S23:The operated adjacent person selection one for receiving cluster head solicited message is added apart from nearest cluster head where it
In cluster;
S24:Non- cluster head worker sends confirmation message to the cluster head of affiliated cluster, which includes that the position of itself is believed
Breath.
As another executive mode, worker executes sub-clustering on demand in step S2, specially:
S21':Server receives and broadcasts one to all registered persons of working online after the demand for services of requestor's transmission
Sub-clustering enabling signal;
S22':The registered person of working online receives random between generating one (0,1) after sub-clustering enabling signal respectively
Number, if this number is less than predetermined threshold value P, which is identified as cluster head, predetermined threshold value P (such as P=0.08)
It is the percentage of cluster head in the registered person of working online, is controlled using threshold value, each worker is likely to become cluster head,
This threshold value also determines the average anonymity degree of location privacy protection, i.e. 1/P;
S23':The worker for regarding as cluster head broadcasts a cluster head solicited message in a manner of single-hop, the cluster head solicited message
Contain cluster head location information;
S24':The operated adjacent person selection one for receiving cluster head solicited message is added apart from nearest cluster head where it
In cluster;
S25':Non- cluster head worker sends confirmation message to the cluster head of affiliated cluster, which includes the position of itself
Information.
For the different sub-clustering mode of above two, in active sub-clustering mode, the registered person of working online passes through a little
Communication link to point periodically carries out space cluster algorithm in a manner of single-hop, this mode compared to on-demand sub-clustering mode and
Speech, can faster respond task, but it will produce higher communication overhead.And sub-clustering mode is compared to actively on demand
Lower communication overhead can be generated for sub-clustering mode, but brings response time longer disadvantage.
In executing above-mentioned algorithm, cluster head calculates the location information at virtual cluster center according to following formula in step S3:
Wherein,For cluster CjVirtual cluster center abscissa,For cluster CjVirtual cluster center ordinate, xiFor cluster
CjIn i-th of cluster member WiAbscissa, yiFor cluster CjIn i-th of cluster member WiOrdinate, NjFor cluster CjMiddle cluster member's is total
Number.
For the performance for the scheme that research institute proposes, we are using NS-2 simulation softwares to active sub-clustering and on-demand sub-clustering two
Kind mode is emulated.We represent mobile worker, worker using random way point models in an experiment
Node is randomly placed in the network of a 4000m × 4000m, and wireless transmission model is using the free space that range is 200m
Model.
During the secondary distribution stage, if the worker finally to receive an assignment be in entire cluster member position closest to complete
At required by task in-position, it is accurate that we, which are considered as current task distribution,.From Fig. 2 we can observe that actively
Distribution accuracy with on-demand is average 98% or more, so it is proposed that algorithm reliable Service Quality can be provided
Amount.
Although reference be made herein to invention has been described for the embodiment of the present invention, however, it is to be understood that art technology
Personnel can be designed that a lot of other modification and implementations, these modifications and implementations will be fallen in original disclosed in the present application
Then within scope and spirit.