CN105188026A - Privacy protection method of source position in WSN (Wireless Sensor Network) based on angle and phantom source - Google Patents
Privacy protection method of source position in WSN (Wireless Sensor Network) based on angle and phantom source Download PDFInfo
- Publication number
- CN105188026A CN105188026A CN201510481086.9A CN201510481086A CN105188026A CN 105188026 A CN105188026 A CN 105188026A CN 201510481086 A CN201510481086 A CN 201510481086A CN 105188026 A CN105188026 A CN 105188026A
- Authority
- CN
- China
- Prior art keywords
- phantom
- node
- source
- source node
- angle
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
Abstract
To improve the privacy security of a source position and the energy utilization rate of a node, the invention provides a privacy protection method of a source position in a WSN (Wireless Sensor Network) based on an angle and a phantom source. The area of the phantom source is defined and divided; a phantom source node, the geographic position of which is disperse, is generated; a dynamic and enough-long path is formed with the help of energy in an energy abundant area; therefore, a routing path is random and varied; and the position privacy security of a source node can be effectively protected. After the privacy protection method is adopted, the privacy security of the source position can be obviously increased; and simultaneously, the energy utilization rate can be improved.
Description
Technical field
The present invention relates to a seed position method for secret protection, particularly, be a kind of source position method for secret protection based on angle and phantom source, belong to wireless sensor network application.
Background technology
Wireless sensor network (WirelessSensorNetworks, WSN) (also aggregation node is by general sensor nodes (Node) and base station, SinkNode) form, integrate perception, communication and data processing, extend the information obtaining ability of people.Based in event driven WSN, the nearest node of distance monitoring event is called as source node (SourceNode).Node, once monitor event, just produces event message and sends to base station.But the wireless transmission medium shared makes enemy be easy to the sender of localization message.So, although enemy can not obtain the packet content after encryption, can reverse, hop-by-hop trace sources node location.In target tracking and monitor-type WSN are applied, the exposure of source node location is by the safety of serious threat to monitoring target.Such as, a large amount of sensor node deployments is monitored rare animal in the wild or is interspersed among the real-time messages that battlefield obtains army.The position of animal can not be known by poacher, and the position of army can not be grasped by enemy army.Therefore, the physical location secret protection of source node has become a good problem to study.
For the assailant with local flow monitoring capability; phantom Routing Protocol is proposed to protect the location privacy of source node in prior art; still there is following technical problem in the method: the phantom source of generation can high concentration in being the center of circle with real source, with h be radius circle on.For the assailant having certain memory capability, once find this rule, real source position, location has just become easy.In addition, h jumps the mass data produced in flooding process can bring heavier load to system, can shorten network lifecycle.
Summary of the invention
For solving above technical problem; the present invention proposes the source position method for secret protection based on angle and phantom source in a kind of WSN; by producing phantom node based on different angle dynamic randoms; make sensor node utilize the energy formative dynamics in abundant region, sufficiently long path, path, thus while reaching available protecting source node location privacy ensure network life maximize.
For achieving the above object, the present invention adopts following technical scheme: comprise the steps:
(1) netinit, static disposes network node, and realizes each meshed network parameter and be preloaded into;
(2) carry out the phantom route based on angle, first define phantom region, divide phantom region by homogeneous angular method, produce phantom node at random by the zonule selected at random, then packet is forwarded to phantom node from source node;
(3) in the circumference route of circumferentially carrying out certain jumping figure of phantom source node, the communication of phantom source node to intermediary node is completed;
(4) adopt Shortest path routing mode from intermediary node by data packets to base station.
Further, in netinit, first base station is loaded into a pair unsymmetrical key (K
pub, K
pri), each ordinary node is preloaded into the PKI K shared with base station
pub, the minimum range R between phantom source node and real node
minand the ultimate range R between phantom source node and real node
max, base station sets timer also broadcasts initial message bag to the whole network, and the initialization data comprising type of message, base station location, hop count hops and be preloaded into, its Timer duration is netinit stage duration, and hops initial value is 0.Afterwards, for the node receiving message bag first, hops is added 1, upgrade the value of hops and broadcast this message to neighbor node.For the message bag received, self ID and jumping figure hops add in neighbor node table by node, repeat said process until timer expired.
Further, carrying out in the phantom route based on angle, the distance of setting phantom source node and real source node is D ∈ [R
min, R
max], to monitor the real source node of event message for the center of circle, with R
maxfor exradius, R
minfor inner circle radius, form phantom region.Phantom region is evenly divided into μ part, and angle φ=(2 the π)/μ in every part of region, defining these regions is respectively a
1, a
2..., a
μ.Source node, when carrying out the transmission of packet, first selects a region
λ
i∈ [1, μ]; Angle β ∈ [(λ between source node and phantom source
i-1) φ, (λ
i) φ], between source node and phantom source distance d ∈ [R
min, R
max], then the relative position of phantom source node is (Source.xd+dcos (β), Source.yd+dsin (β)), and wherein Sourcexd is the x coordinate of source node, and Sourceyd is the y coordinate of source node.
Further, carrying out in circumference route, the jumping figure of phantom source node route in a circumferential direction
wherein
represent the neighbors number of phantom source node,
represent the shortest path of phantom source node to base station, X is factor of influence.
After adopting the method in a WSN, the phantom source node of generation disperses more, and assailant is difficult to track real source node.According to different network application environments, suitable phantom source region can also be defined, effectively control the distribution of phantom source node.In addition, according to the neighbors number of phantom node and select third party's node as the route intermediary of phantom node to base station to the jumping figure of base station, thus route is spatially occurred in the entire network at random in position, make assailant be difficult to infer from routed path the position source node.Simultaneously owing to not producing flooding process, thus can not produce mass data, therefore system load can not be overweight, and network lifecycle is also extended.
Accompanying drawing explanation
Fig. 1 is method flow diagram of the present invention.
Fig. 2 is the routing procedure figure of the method.
Embodiment
(1) netinit, static disposes network node, and realizes each meshed network parameter and be preloaded into;
(2) carry out the phantom route based on angle, first define phantom region, divide phantom region by homogeneous angular method, produce phantom node at random by the zonule selected at random, then packet is forwarded to phantom node from source node;
(3) in the circumference route of circumferentially carrying out certain jumping figure of phantom source node, the communication of phantom source node to intermediary node is completed;
(4) adopt Shortest path routing mode from intermediary node by data packets to base station.
Further, in netinit, first base station is loaded into a pair unsymmetrical key (K
pub, K
pri), each ordinary node is preloaded into the PKI K shared with base station
pub, the minimum range R between phantom source node and real node
minand the ultimate range R between phantom source node and real node
max, base station sets timer also broadcasts initial message bag to the whole network, and the initialization data comprising type of message, base station location, hop count hops and be preloaded into, its Timer duration is netinit stage duration, and hops initial value is 0.Afterwards, for the node receiving message bag first, hops is added 1, upgrade the value of hops and broadcast this message to neighbor node.For the message bag received, self ID and jumping figure hops add in neighbor node table by node, repeat said process until timer expired.
Further, carrying out in the phantom route based on angle, the distance of setting phantom source node and real source node is D ∈ [R
min, R
max], to monitor the real source node of event message for the center of circle, with R
maxfor exradius, R
minfor inner circle radius, form phantom region.Phantom region is evenly divided into μ part, and angle φ=(2 the π)/μ in every part of region, defining these regions is respectively a
1, a
2..., a
μ.Source node, when carrying out the transmission of packet, first selects a region
λ
i∈ [1, μ]; Angle β ∈ [(λ between source node and phantom source
i-1) φ, (λ
i) φ], between source node and phantom source distance d ∈ [R
min, R
max], then the relative position of phantom source node is (Source.xd+dcos (β), Source.yd+dsin (β)), and wherein Sourcexd is the x coordinate of source node, and Sourceyd is the y coordinate of source node.
Further, carrying out in circumference route, the jumping figure of phantom source node route in a circumferential direction
wherein
represent the neighbors number of phantom source node,
represent the shortest path of phantom source node to base station, X is factor of influence.
In the random selection process of phantom source node, the minimum range of phantom node in location distribution of generation
in different environmental applications, only need choose suitable parameter value μ, R
minand R
max, just effectively can control the distribution of phantom node.
At circumference routing phase, the hop count circumferentially from phantom source node is
the value of X can have influence on the communication overhead of whole Routing Protocol.To balance the integrated communication expense of agreement, the tracing complexity of assailant and network application environment etc. be passed through, the value of Rational choice X.The value of X is related to the integrated communication expense of APS agreement, is also related to the reversely tracing complexity of assailant.The routed path of agreement is longer, and assailant follows the trail of with regard to needing the cost longer time.So the value of X is relatively flexible, mainly see the demand of network.Very high to the security requirement of network, and when passing over communication overhead, the value of X can be less than normal.Otherwise if the communication condition of network is limited, general to security requirement, at this moment the value of X can be bigger than normal.
The benefit of decision circumference hop count like this is the path long enough of strategy, and is random, and it is also random that routed path stops on which position.Thus cause the fascination to assailant, make the other side be difficult to infer from routed path the position of source node.
Random angles method is adopted to produce phantom node at random in the present invention; and sensor node utilize the energy formative dynamics in abundant region, sufficiently long path, path; add the difficulty of assailant's trace sources node; also extend the life-span of network, more effectively can protect the location privacy of source node than existing method.Further, when during the method is used for during large-scale sensor network, the position distribution of phantom node will be disperseed more, and routed path is randomization more, by better prolong network lifetime, play better protection source position effect.
Claims (4)
1. in WSN based on a source position method for secret protection for angle and phantom source, it is characterized in that: comprise the steps:
(1) netinit, static disposes network node, and realizes each meshed network parameter and be preloaded into;
(2) carry out the phantom route based on angle, first define phantom region, divide phantom region by homogeneous angular method, produce phantom node at random by the zonule selected at random, then packet is forwarded to phantom node from source node;
(3) in the circumference route of circumferentially carrying out certain jumping figure of phantom source node, the communication of phantom source node to intermediary node is completed;
(4) adopt Shortest path routing mode from intermediary node by data packets to base station.
2. in a kind of WSN as claimed in claim 1 based on the source position method for secret protection of angle and phantom source, it is characterized in that: in netinit, first base station is loaded into a pair unsymmetrical key (K
pub, K
pri), each ordinary node is preloaded into the PKI K shared with base station
pub, the minimum range R between phantom source node and real node
minand the ultimate range R between phantom source node and real node
max, base station sets timer also broadcasts initial message bag to the whole network, and the initialization data comprising type of message, base station location, hop count hops and be preloaded into, its Timer duration is netinit stage duration, and hops initial value is 0.Afterwards, for the node receiving message bag first, hops is added 1, upgrade the value of hops and broadcast this message to neighbor node.For the message bag received, self ID and jumping figure hops add in neighbor node table by node, repeat said process until timer expired.
3. in a kind of WSN as claimed in claim 1 based on the source position method for secret protection of angle and phantom source, it is characterized in that: carrying out in the phantom route based on angle, the distance of setting phantom source node and real source node is D ∈ [R
min, R
max], to monitor the real source node of event message for the center of circle, with R
maxfor exradius, R
minfor inner circle radius, form phantom region.Phantom region is evenly divided into μ part, and angle φ=(2 the π)/μ in every part of region, defining these regions is respectively a
1, a
2..., a
μ.Source node, when carrying out the transmission of packet, first selects a region
λ
i∈ [1, μ]; Angle β ∈ [(λ between source node and phantom source
i-1) φ, (λ
i) φ], between source node and phantom source distance d ∈ [R
min, R
max], then the relative position of phantom source node is (Source.xd+dcos (β), Source.yd+dsin (β)), and wherein Sourcexd is the x coordinate of source node, and Sourceyd is the y coordinate of source node.
4. in a kind of WSN as claimed in claim 1 based on the source position method for secret protection of angle and phantom source, it is characterized in that: carrying out in circumference route, the jumping figure of phantom source node route in a circumferential direction
wherein Count
pi.neighborrepresent the neighbors number of phantom source node, SP
pi, brepresent the shortest path of phantom source node to base station, X is factor of influence.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510481086.9A CN105188026B (en) | 2015-08-07 | 2015-08-07 | Source position method for secret protection based on angle and phantom source in a kind of WSN |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510481086.9A CN105188026B (en) | 2015-08-07 | 2015-08-07 | Source position method for secret protection based on angle and phantom source in a kind of WSN |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105188026A true CN105188026A (en) | 2015-12-23 |
CN105188026B CN105188026B (en) | 2018-11-09 |
Family
ID=54909819
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510481086.9A Expired - Fee Related CN105188026B (en) | 2015-08-07 | 2015-08-07 | Source position method for secret protection based on angle and phantom source in a kind of WSN |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105188026B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105916118A (en) * | 2016-07-08 | 2016-08-31 | 河海大学常州校区 | Source node privacy protection method based on position tracking in wireless sensor network |
CN105979508A (en) * | 2016-07-27 | 2016-09-28 | 河海大学常州校区 | Node privacy protection method based on directional random routing in wireless sensor network |
CN106102048A (en) * | 2016-06-03 | 2016-11-09 | 上海理工大学 | The security data packet that in a kind of Internet of Things, sensor sends is transferred to the transmission method of base station |
CN107835510A (en) * | 2017-10-31 | 2018-03-23 | 河海大学常州校区 | A kind of wireless sensor network source node location method for secret protection based on phantom route |
CN113259932A (en) * | 2021-05-19 | 2021-08-13 | 贵州大学 | Source node position privacy protection strategy in WSNs |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103747440A (en) * | 2014-01-09 | 2014-04-23 | 东南大学 | Enhanced source position privacy protection method based on phantom single-path routing |
CN104735650A (en) * | 2015-03-30 | 2015-06-24 | 重庆邮电大学 | Source position privacy protection method of fan-shaped domain phantom routing |
-
2015
- 2015-08-07 CN CN201510481086.9A patent/CN105188026B/en not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103747440A (en) * | 2014-01-09 | 2014-04-23 | 东南大学 | Enhanced source position privacy protection method based on phantom single-path routing |
CN104735650A (en) * | 2015-03-30 | 2015-06-24 | 重庆邮电大学 | Source position privacy protection method of fan-shaped domain phantom routing |
Non-Patent Citations (2)
Title |
---|
卢妙杰: "WSN中源位置隐私保护研究", 《硕士学位论文》 * |
赵泽茂,刘洋,张帆,周建钦,张品: "基于角度和概率的WSN源位置隐私保护路由研究", 《山东大学学报》 * |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106102048A (en) * | 2016-06-03 | 2016-11-09 | 上海理工大学 | The security data packet that in a kind of Internet of Things, sensor sends is transferred to the transmission method of base station |
CN106102048B (en) * | 2016-06-03 | 2019-06-04 | 上海理工大学 | Sensor issues the method that security data packet is transferred to base station in a kind of Internet of Things |
CN105916118A (en) * | 2016-07-08 | 2016-08-31 | 河海大学常州校区 | Source node privacy protection method based on position tracking in wireless sensor network |
CN105916118B (en) * | 2016-07-08 | 2019-05-03 | 河海大学常州校区 | Source node method for secret protection in wireless sensor network based on location tracking |
CN105979508A (en) * | 2016-07-27 | 2016-09-28 | 河海大学常州校区 | Node privacy protection method based on directional random routing in wireless sensor network |
CN105979508B (en) * | 2016-07-27 | 2019-05-03 | 河海大学常州校区 | Node method for secret protection based on orientation stochastic route in wireless sensor network |
CN107835510A (en) * | 2017-10-31 | 2018-03-23 | 河海大学常州校区 | A kind of wireless sensor network source node location method for secret protection based on phantom route |
CN107835510B (en) * | 2017-10-31 | 2020-07-14 | 河海大学常州校区 | Phantom routing-based wireless sensor network source node position privacy protection method |
CN113259932A (en) * | 2021-05-19 | 2021-08-13 | 贵州大学 | Source node position privacy protection strategy in WSNs |
Also Published As
Publication number | Publication date |
---|---|
CN105188026B (en) | 2018-11-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Thulasiraman et al. | Topology control of tactical wireless sensor networks using energy efficient zone routing | |
CN105188026A (en) | Privacy protection method of source position in WSN (Wireless Sensor Network) based on angle and phantom source | |
Khan | Secure communication and routing architecture in wireless sensor networks | |
CN107835510B (en) | Phantom routing-based wireless sensor network source node position privacy protection method | |
CN103747440B (en) | A kind of enhancement source position method for secret protection based on phantom single-path routing | |
CN107148013B (en) | Source position privacy protection method of multi-phantom node strategy | |
CN107566984B (en) | Source position privacy protection method based on sector area in WSNs | |
Nam et al. | A fuzzy rule-based path configuration method for LEAP in sensor networks | |
Shaila et al. | Resilience against node capture attack using asymmetric matrices in key predistribution scheme in wireless sensor networks | |
Pandey | Introduction to mobile ad hoc network | |
Chen et al. | Towards efficient anonymous communications in sensor networks | |
Kong et al. | Key pre-distribution schemes for large-scale wireless sensor networks using hexagon partition | |
Haakensen et al. | Enhancing sink node anonymity in tactical sensor networks using a reactive routing protocol | |
Azeem et al. | Security architecture framework and secure routing protocols in wireless sensor networks-survey | |
Gupta et al. | A confidentiality scheme for energy efficient leach protocol using homomorphic encryption | |
Faghani et al. | Sectorized location dependent key management | |
Tanash et al. | Source location privacy in a cluster-based wireless sensor networks against local adversary | |
Thulasiraman et al. | Countering passive cyber attacks against sink nodes in tactical sensor networks using reactive route obfuscation | |
Rao | Secure Routing in Cluster based Wireless Sensor Networks using Symmetric Cryptography with Session Keys | |
Maleh et al. | An efficient key establishment protocol for wireless sensor networks | |
Kaul et al. | Defending against vampire attacks in wireless sensor networks | |
Sbrusch | Authenticated messaging in wireless sensor networks used for surveillance | |
Mubarek et al. | Efficient Symmetric and Heterogeneous Mobile Group-Based Key Management Protocol | |
Ghasemi | Secure Geographic Routing in Wireless Sensor Networks | |
Verma | A Comparative Study of Key Management Protocols for WSN |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20181109 Termination date: 20210807 |
|
CF01 | Termination of patent right due to non-payment of annual fee |