دانلود مقاله ISI انگلیسی شماره 147103
ترجمه فارسی عنوان مقاله

حفاظت کامل حفاظت از منبع در شبکه های حسگر بی سیم

عنوان انگلیسی
Source-location privacy full protection in wireless sensor networks
کد مقاله سال انتشار تعداد صفحات مقاله انگلیسی
147103 2018 29 صفحه PDF
منبع

Publisher : Elsevier - Science Direct (الزویر - ساینس دایرکت)

Journal : Information Sciences, Volume 444, May 2018, Pages 105-121

ترجمه کلمات کلیدی
حفاظت از حریم شخصی منبع، اشتراک پیام شبکه های حسگر بی سیم، بهره وری انرژی،
کلمات کلیدی انگلیسی
Source-location privacy protection; Message sharing; Wireless sensor networks; Energy-efficiency;
پیش نمایش مقاله
پیش نمایش مقاله  حفاظت کامل حفاظت از منبع در شبکه های حسگر بی سیم

چکیده انگلیسی

In many scenarios, the locations of monitored targets need to be reported by source nodes, but should remain anonymous in wireless sensor networks. Source-location privacy protection is an important research topic. Many schemes have been designed based on different adversarial models. In this paper, a scheme named Source-location Privacy Full Protection (SPFP) is proposed. We consider a more practical adversarial model — a smart adversary — which is a combination of global and local models. To defend against the new adversary, first, we design a lightweight message sharing scheme that is based on congruence equations. Second, each message is mapped to a set of shares. The short lengths of the shares enable them to be processed and transmitted in an energy-efficient manner. The correctness and security of the scheme are proved in theorems. In addition, the proposed message sharing scheme can tolerate the unreliability of the sensor nodes and provides a more reliable data transmission mechanism for networks. Third, the source node constructs a cloud around itself based on the shares and dummy packages to hide its location. The radio actions of the nodes in the cloud are carefully arranged to conceal the real shares from the adversaries and render the nodes in the cloud statistically indistinguishable. Last, a random routing algorithm is seamlessly integrated into our scheme to deliver the real shares from the fake source nodes to the sink node, where the original message is reconstructed based on the received shares. The simulation results illustrate that our scheme can provide adequate protection of source-location privacy with a slight increase in energy consumption.