CN102843673B - Network position privacy protection method of wireless sensor - Google Patents

Network position privacy protection method of wireless sensor Download PDF

Info

Publication number
CN102843673B
CN102843673B CN201210332432.3A CN201210332432A CN102843673B CN 102843673 B CN102843673 B CN 102843673B CN 201210332432 A CN201210332432 A CN 201210332432A CN 102843673 B CN102843673 B CN 102843673B
Authority
CN
China
Prior art keywords
node
east
west
data
fragment data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201210332432.3A
Other languages
Chinese (zh)
Other versions
CN102843673A (en
Inventor
钱萍
刘镇
吴蒙
史金龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nantong Power Supply Co of Jiangsu Electric Power Co Ltd
Original Assignee
Jiangsu University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu University of Science and Technology filed Critical Jiangsu University of Science and Technology
Priority to CN201210332432.3A priority Critical patent/CN102843673B/en
Publication of CN102843673A publication Critical patent/CN102843673A/en
Application granted granted Critical
Publication of CN102843673B publication Critical patent/CN102843673B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a network position privacy protection method of a wireless sensor. The method comprises the following steps: dividing the data to be sent into m fragment data by a source node; routing the m fragment data to n different pseudo phantom nodes which are selected at random though a directional routing method; routing the received fragment data to a target node through the n pseudo phantom nodes; reconstituting the fragment data through the target node after receiving all fragment data. Compared with the prior art, the method of multi-phantom pseudo source node is adopted, then the difficulty of an attacker to track a real source node can be increased, so that the privacy of the position of the source node can be effectively protected; and moreover, the method is suitable for middle and large scaled sensor networks.

Description

A kind of wireless sensor network location privacy protection method
Technical field
The invention belongs to communication technical field, relate to a kind of location privacy protection method for wireless sensor network.
Background technology
In recent years, the application of wireless sensor network (Wireless SensorNetworks, WSN) is day by day extensive, and its safety problem has received the concern of domestic and international researcher more and more.The secret protection technology of wireless sensor network is the important research direction of wireless sensor safe technology, is the significant challenge that wireless sensor network faces.Divide from the main body of research contents, the privacy concern in wireless sensor network can be divided into the personal secrets of data-oriented personal secrets and facing position, and location privacy is the important component part of wireless sensor network privacy.
Through finding the retrieval of prior art; for the location privacy protection of wireless sensor network, study the more ripe phantom Routing Protocol being Ozturk Celal etc. and proposing in document " Source-location privacy in energy-constrained sensor network routing " and document " Enhancing source-location privacy in sensor network routing ".Contain " panda-hunter " model in phantom Routing Protocol, the hunter as malicious attack side wishes that hop-by-hop follows the trail of the position obtaining panda and occur by the monitoring to radio transmission signal in WSN.Agreement is made up of two benches: the first stage is direct walk random, by message walk random to the pseudo-source node of in network; Message is routed to Sink node from pseudo-source node in the mode of inundation route or single path route by second stage.Pseudo-source node is utilized to protect the location privacy of real source node.
The single phantom dummy node method adopted in prior art is mainly applicable to small-sized sensor network, large-scale sensor network in not being suitable for, and single phantom dummy node Privacy Safeguarding is poor.
Summary of the invention
For the defect that prior art exists, the technical problem to be solved in the present invention proposes a kind of more effective location privacy protection method that can be used for larger sensor network.
A kind of wireless sensor network location privacy protection method of the present invention, its implementation procedure comprises following steps:
Step 1: the neighbor node of each node is divided into two classes by east-west direction, a class be east to node, another kind of is that west is to node;
Step 2: send the source node Stochastic choice one number n of data as the number of pseudo-phantom node, and Stochastic choice directed routing direction, namely east to or west to;
Step 3: data to be sent are divided into m fragment data by source node, distinguishes directed routing to the individual different pseudo-phantom node of n according to the directed routing direction selected in step 2 by m fragment data; Intermediate node between source node and pseudo-phantom node is when forwarding fragment data, and the directed routing direction that must set according to each fragment data is with the mode forwarding data of directed routing;
The fragment data received is routed to destination node by step 4:n pseudo-phantom node again, in the process of route, does not need again according to directed routing direction forwarding data;
Step 5: destination node is recombinated to fragment data after receiving all fragment datas.
Described neighbor node refers to the node only having a hop distance with source node, and neighbor node is only positioned at the Due South of source node, the southeast, positive east, north-east, the positive north, northwest, just west and these eight positions of southwest.Described east refers to node the Due South, the southeast, just east and northeastern neighbor node that are positioned at source node, and west refers to be positioned at the positive north of source node, the neighbor node of northwest, just west and southwest to node.Described directed routing dactylus point only sends to the neighbor node identical with the directed routing direction set when forwarding data, namely east is to nodes neighbors or west to nodes neighbors.
Adopt the method for the pseudo-source node of multiple phantom in the present invention, the difficulty that assailant tracks real source node will be increased, thus more effectively can protect the location privacy of source node than existing method.And when during the method is used for during large-scale sensor network, the position distribution of dummy node can be disperseed more, will play better protective effect.
Accompanying drawing explanation
Fig. 1: neighbor node classification schematic diagram in the present invention;
Fig. 2: location privacy protection procedure chart in the present invention.
Embodiment
As shown in Figure 1, node 1 is neighbor nodes of Centroid to node 8, only have the distance of a jumping between them, neighbor node is only positioned at the Due South of source node, the southeast, positive east, north-east, the positive north, northwest, just west and these eight positions of southwest.Node 1 to node 4 be east to node, node 5 is that west is to node to node 8.During directed routing, if directed routing direction be east to, then Centroid can only forwarding data to neighbor node 1 in node 4, if directed routing direction be west to, then Centroid can only forwarding data to neighbor node 5 in node 8.
Fig. 2 indicates location privacy protection procedure chart in the present invention:
(1): the neighbor node of each node is divided into two classes by east-west direction, a class be east to node, another kind of is that west is to node;
(2): send the source node Stochastic choice one number n of data as the number of pseudo-phantom node, and Stochastic choice directed routing direction, namely east to or west to;
(3): data to be sent are divided into m fragment data by source node, according to the directed routing direction selected in step (2), m fragment data is distinguished directed routing to the individual different pseudo-phantom node of n; Intermediate node between source node and pseudo-phantom node is when forwarding fragment data, and the directed routing direction that must set according to each fragment data is with the mode forwarding data of directed routing;
(4): the fragment data received is routed to destination node by n pseudo-phantom node again, in the process of route, does not need again according to directed routing direction forwarding data;
(5): destination node is recombinated to fragment data after receiving all fragment datas.
Described neighbor node refers to the node only having a hop distance with source node, and neighbor node is only positioned at the Due South of source node, the southeast, positive east, north-east, the positive north, northwest, just west and these eight positions of southwest.Described east refers to node the Due South, the southeast, just east and northeastern neighbor node that are positioned at source node, and west refers to be positioned at the positive north of source node, the neighbor node of northwest, just west and southwest to node.Described directed routing dactylus point only sends to the neighbor node identical with the directed routing direction set when forwarding data, namely east is to nodes neighbors or west to nodes neighbors.

Claims (1)

1. a wireless sensor network location privacy protection method, is characterized in that comprising following steps:
Step 1: the neighbor node of each node is divided into two classes by east-west direction, a class be east to node, another kind of is that west is to node;
Step 2: send the source node Stochastic choice one number n of data as the number of pseudo-phantom node, and Stochastic choice directed routing direction, namely east to or west to;
Step 3: data to be sent are divided into m fragment data by source node, distinguishes directed routing to the individual different pseudo-phantom node of n according to the directed routing direction selected in step 2 by m fragment data; Intermediate node between source node and pseudo-phantom node is when forwarding fragment data, and the directed routing direction that must set according to each fragment data is with the mode forwarding data of directed routing;
The fragment data received is routed to destination node by step 4:n pseudo-phantom node again, in the process of route, does not need again according to directed routing direction forwarding data;
Step 5: destination node is recombinated to fragment data after receiving all fragment datas;
Described neighbor node refers to the node only having a hop distance with origin node, and neighbor node is only positioned at the Due South of origin node, the southeast, positive east, north-east, the positive north, northwest, just west and these eight positions of southwest;
Described east refers to node the Due South, the southeast, just east and northeastern neighbor node that are positioned at origin node, and described west refers to be positioned at the positive north of origin node, the neighbor node of northwest, just west and southwest to node;
Described directed routing dactylus point only sends to the neighbor node identical with the directed routing direction set when forwarding data, namely east is to nodes neighbors or west to nodes neighbors.
CN201210332432.3A 2012-09-10 2012-09-10 Network position privacy protection method of wireless sensor Expired - Fee Related CN102843673B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210332432.3A CN102843673B (en) 2012-09-10 2012-09-10 Network position privacy protection method of wireless sensor

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210332432.3A CN102843673B (en) 2012-09-10 2012-09-10 Network position privacy protection method of wireless sensor

Publications (2)

Publication Number Publication Date
CN102843673A CN102843673A (en) 2012-12-26
CN102843673B true CN102843673B (en) 2015-02-11

Family

ID=47370676

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210332432.3A Expired - Fee Related CN102843673B (en) 2012-09-10 2012-09-10 Network position privacy protection method of wireless sensor

Country Status (1)

Country Link
CN (1) CN102843673B (en)

Families Citing this family (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104010295A (en) * 2013-02-22 2014-08-27 中国移动通信集团公司 Sensing-network privacy protection method, sensing network and sensing network nodes
CN103327486B (en) * 2013-05-16 2015-12-23 浙江工商大学 A kind of aggregation node location privacy protection method of wireless sensor network
CN103281743B (en) * 2013-06-18 2015-10-28 清华大学 Based on the anti-trace sources location privacy protection method that path extends
CN103974368B (en) * 2014-05-27 2017-06-16 中南大学 A kind of route constructing method of intense source location privacy protection ability
CN104469754B (en) * 2014-12-01 2017-12-26 南京邮电大学 A kind of source position method for secret protection based on three stages route in wireless sense network
CN104735650B (en) * 2015-03-30 2018-10-12 重庆邮电大学 A kind of source position method for secret protection of Sector effect phantom routing
CN104822143B (en) * 2015-05-04 2018-08-21 东南大学 A kind of source node location method for secret protection of anti-current amount analytical attack
CN104822144A (en) * 2015-05-04 2015-08-05 东南大学 Source position privacy protection method for resisting backward tracing of attacker
WO2017000282A1 (en) * 2015-07-01 2017-01-05 冯旋宇 Method for directed transmission of data in router, and router
CN105099901A (en) * 2015-07-01 2015-11-25 冯旋宇 Method for oriented data transmission in router and router
CN105681362B (en) * 2016-04-01 2018-07-10 公安部第三研究所 The client and server communications method of the geographical location privacy of protection
CN105916118B (en) * 2016-07-08 2019-05-03 河海大学常州校区 Source node method for secret protection in wireless sensor network based on location tracking
CN105979508B (en) * 2016-07-27 2019-05-03 河海大学常州校区 Node method for secret protection based on orientation stochastic route in wireless sensor network
CN108495313B (en) * 2018-03-26 2021-02-23 河南大学 Method for protecting node position privacy in wireless sensor network
CN109660945B (en) * 2019-02-18 2020-07-07 河海大学常州校区 Dynamic multi-route source node position privacy protection method based on multiple sink nodes in WSN
CN110855375B (en) * 2019-12-02 2021-09-28 河海大学常州校区 Source node privacy protection method based on position push in underwater acoustic sensor network
CN113259932B (en) * 2021-05-19 2023-05-05 贵州大学 Source node position privacy protection strategy in WSNs

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101521926A (en) * 2009-04-08 2009-09-02 西安电子科技大学 Cooperative routing method for large-scale wireless distribution network
CN101557608A (en) * 2009-05-14 2009-10-14 北京航空航天大学 Node identity protection method of mobile wireless sensor network on basis of message time delay condition
CN101742554A (en) * 2010-01-15 2010-06-16 南京邮电大学 Congestion control method of multi-path transmission mechanism of wireless multimedia sensor network
CN101800692A (en) * 2009-12-10 2010-08-11 浙江工业大学 Wireless sensor network geographic location route addressing method based on Hull tree

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101521926A (en) * 2009-04-08 2009-09-02 西安电子科技大学 Cooperative routing method for large-scale wireless distribution network
CN101557608A (en) * 2009-05-14 2009-10-14 北京航空航天大学 Node identity protection method of mobile wireless sensor network on basis of message time delay condition
CN101800692A (en) * 2009-12-10 2010-08-11 浙江工业大学 Wireless sensor network geographic location route addressing method based on Hull tree
CN101742554A (en) * 2010-01-15 2010-06-16 南京邮电大学 Congestion control method of multi-path transmission mechanism of wireless multimedia sensor network

Also Published As

Publication number Publication date
CN102843673A (en) 2012-12-26

Similar Documents

Publication Publication Date Title
CN102843673B (en) Network position privacy protection method of wireless sensor
Chen et al. PSSPR: a source location privacy protection scheme based on sector phantom routing in WSNs
Dong et al. Preserving source-location privacy through redundant fog loop for wireless sensor networks
CN103987034B (en) The method for secret protection of soldier information in a kind of field environment
Jain et al. Notice of Violation of IEEE Publication Principles: A Survey on Complex Wormhole Attack in Wireless Ad Hoc Networks
CN104822143B (en) A kind of source node location method for secret protection of anti-current amount analytical attack
Anwar et al. Enhanced trust aware routing against wormhole attacks in wireless sensor networks
Siddiqui et al. A wormhole attack detection and prevention technique in wireless sensor networks
Raju et al. A simple and efficient mechanism to detect and avoid wormhole attacks in mobile ad hoc networks
Nitnaware et al. Black hole attack detection and prevention strategy in DYMO for MANET
Rana et al. Performance analysis of AODV in presence of malicious node
CN103327486A (en) Sink node position privacy protection method for wireless sensor network
Gottumukkala et al. Base-station location anonymity and security technique (BLAST) for wireless sensor networks
Dangore et al. Detecting and overcoming blackhole attack in aodv protocol
Al-Nasser et al. A comprehensive survey on routing and security in mobile wireless sensor networks
Louazani et al. A time Petri net model for wormhole attack detection in wireless sensor networks
Thapar et al. Attacks and security issues of mobile ad hoc networks
Desai et al. Performance evaluation of OLSR protocol in MANET under the influence of routing attack
Ahmed et al. A security scheme against wormhole attack in MAC layer for delay sensitive wireless sensor networks
Choi et al. A secure routing method for detecting false reports and wormhole attacks in wireless sensor networks
Dutta et al. A novel blackhole attack for multipath AODV and its mitigation
Tayebi et al. Wireless sensor network attacks: An overview and critical analysis with detailed investigation on jamming attack effects
Kaur et al. Black hole attack in mobile ad hoc networks: a review
Kibirige et al. Attacks in wireless sensor networks
Sharif et al. The wormhole routing attack in wireless sensor networks (WSN)

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C41 Transfer of patent application or patent right or utility model
CB03 Change of inventor or designer information

Inventor after: Qian Ping

Inventor after: Liu Zhen

Inventor after: Wu Meng

Inventor after: Shi Jinlong

Inventor after: Yuan Jianhua

Inventor after: Qian Shuangqiu

Inventor after: Zhang Jun

Inventor after: Yang Yue

Inventor after: Wu Xiaoyan

Inventor before: Qian Ping

Inventor before: Liu Zhen

Inventor before: Wu Meng

Inventor before: Shi Jinlong

COR Change of bibliographic data
TR01 Transfer of patent right

Effective date of registration: 20160614

Address after: 212003 Zhenjiang City, Jiangsu province dream Creek Road, No. 2

Patentee after: Jiangsu University of Science and Technology

Patentee after: Nantong Power Supply Company, Jiangsu Electric Power Co., Ltd.

Address before: 212003 Zhenjiang City, Jiangsu province dream Creek Road, No. 2

Patentee before: Jiangsu University of Science and Technology

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20150211

Termination date: 20190910