JIA Zongpu, WEI Xiaojuan, GUO Hairu, et al., “A Privacy Protection Strategy for Source Location in WSN Based on Angle and Dynamical Adjustment of Node Emission Radius,” Chinese Journal of Electronics, vol. 26, no. 5, pp. 1064-1072, 2017, doi: 10.1049/cje.2016.08.022
Citation: JIA Zongpu, WEI Xiaojuan, GUO Hairu, et al., “A Privacy Protection Strategy for Source Location in WSN Based on Angle and Dynamical Adjustment of Node Emission Radius,” Chinese Journal of Electronics, vol. 26, no. 5, pp. 1064-1072, 2017, doi: 10.1049/cje.2016.08.022

A Privacy Protection Strategy for Source Location in WSN Based on Angle and Dynamical Adjustment of Node Emission Radius

doi: 10.1049/cje.2016.08.022
Funds:  This work is supported by the National Natural Science Foundation of China (No.61472342), Major Scientific and Technological Projects of Henan Science and Technology Agency (No.132102210123), and the Projects of Education Department Henan Province (No.13A520321).
More Information
  • Corresponding author: WEI Xiaojuan (corresponding author) was born in 1989 in Nanyang City, Henan Province. She is a postgraduate student at the School of Computer Science and Technology in Henan Polytechnic University. Her research interests include Computer Network and Communication technology, Sensor Networks and the Internet of Things. (Email:weixjmm@163.com)
  • Received Date: 2015-07-09
  • Rev Recd Date: 2015-11-08
  • Publish Date: 2017-09-10
  • We propose two novel methods to improve the source location privacy security protection and the node energy utilization in Wireless sensor networks (WSN). A privacy preservation protocol for source location in WSN based on angles(APS) and an Enhanced protocol for source location (EAPS), which dynamically adjusts emission radius during routing. The APS protocol produces geographically dispersed phantom source nodes and utilizes the energy from the energy-abundant regions to make the routing path versatile among the entire network. In the EAPS protocol, according to the number of its own adjacent nodes, residual energy and the distance to the base station, a node adjusts its radius adaptively. Experiments show that the two novel protocols can improve the security and take advantage of the residual energy in the network balance the network life and energy consumption in comparison with the existing routing protocols based on the phantom sources.
  • loading
  • R. Rios and J. Lopez, "Analysis of location privacy solutions in wireless sensor networks", Journal of IET Communications, Vol.5, No.17, pp.18-32, 2011.
    Z.P. Guo, K. Chen and X.S. Qiu, "Relay node placement with base stations in wireless sensor networks fault-tolerant", Chinese Journal of Electronics, Vol.23, No.4, pp.794-800, 2014.
    L.J. Sun, J. Wei, J. Guo, et al., "Node scheduling algorithm for heterogeneous wireless sensor networks", Acta Electronica Sinica, Vol.42, No.10, pp.1907-1912, 2014. (in Chinese)
    K. Wang, Y.L. Liu, Q. Wan, et al., "Compressed sensing of wireless sensor networks data with missed measurements", Chinese Journal of Electronics, Vol.24, No.2, pp.388-392, 2015.
    F. Yang, X.H. Zhou, Q.Y. Zhang, et al., "Researching traceability tracing method of malicious nodes for WSNs", Acta Electronica Sinica, Vol.37, No.1, pp.202-206, 2009. (in Chinese)
    R. Chai and Y. Zhang, "A practical supercapacitor model for power management in Wireless Sensor Nodes", IEEE Transactions on Power Electronics, Vol.30, pp.6720-6730, 2015.
    A.F. Liu, J. Ren, J. Xu, et al., "Energy hole analysis and avoid researching for heterogeneous sensor network", Journal of Software, Vol.23, No.9, pp.2438-2448, 2012. (in Chinese)
    C. Qzturk, Y. Zhang and W. Trappe, "Source-location privacy in energy constrained sensor network routing", Proc. of the ACM Workshop on Security of AdHoc and Sensor Networks (SASN), Washington DC, USA, 2004.
    P. Kamat, Y. Zhang and W. Trappe, et al., "Enhancing sourcelocation privacy in sensor network routing", Proc. of the 25th International Conference on Distributed Computing Systems (ICDCS), Ohio, USA, pp.599-608, 2005.
    J. Chen and B.X. Fang, "In sensor networks the source location privacy protection agreement based on the source node limited flooding", Chinese Journal of Computers, Vol.33, No.9, pp.1736-1747, 2010. (in Chinese)
    M.J. Lu, "Researching for source-location privacy in WSN", Ph.D. Thesis, Hangzhou Dianzi University, China, 2013.
    W.A. Zhou, Principles of Wireless Communications and Applications (Second Edition), Publishing House of Electronics Industry, Beijing, 2009.
    P. Medagliani, M. Martalo and G. Ferrari, "Clustered Zigbee networks with data fusion:Characterization and performance analysis", Ad Hoc Networks, Vol.9, No.7, pp.1083-1103, 2011.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (278) PDF downloads(654) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return