Preserving source-location privacy efficiently based on attack-perceiving in wireless sensor network
Sensors’ ability was utilized to perceive the mobile attacker nearby,and SPA (silent-pool approach) was proposed,which was able to hinder or reduce the packets hunted by the attacker by controlling the forwarding state of the nodes.In addition,a novel DPIOP (dummy packet injection out pool) method w...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2018-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018001/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539456338755584 |
---|---|
author | Qian ZHOU Xiaolin QIN Youwei DING |
author_facet | Qian ZHOU Xiaolin QIN Youwei DING |
author_sort | Qian ZHOU |
collection | DOAJ |
description | Sensors’ ability was utilized to perceive the mobile attacker nearby,and SPA (silent-pool approach) was proposed,which was able to hinder or reduce the packets hunted by the attacker by controlling the forwarding state of the nodes.In addition,a novel DPIOP (dummy packet injection out pool) method was proposed to entice the adversary far away from the transmission path without changing the original routing path.Through simulation studies and experiments,the outstanding performance of SPA and DPIOP in privacy preservation were demonstrated,with saving energy by about 63%,and reducing delay by about 35%. |
format | Article |
id | doaj-art-c20aeefc3d5f4815af03fe0069040dfc |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2018-01-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-c20aeefc3d5f4815af03fe0069040dfc2025-01-14T07:14:07ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2018-01-013910111659715955Preserving source-location privacy efficiently based on attack-perceiving in wireless sensor networkQian ZHOUXiaolin QINYouwei DINGSensors’ ability was utilized to perceive the mobile attacker nearby,and SPA (silent-pool approach) was proposed,which was able to hinder or reduce the packets hunted by the attacker by controlling the forwarding state of the nodes.In addition,a novel DPIOP (dummy packet injection out pool) method was proposed to entice the adversary far away from the transmission path without changing the original routing path.Through simulation studies and experiments,the outstanding performance of SPA and DPIOP in privacy preservation were demonstrated,with saving energy by about 63%,and reducing delay by about 35%.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018001/location privacysensor networkenergy-efficiencyattack-perceivingcontext-aware |
spellingShingle | Qian ZHOU Xiaolin QIN Youwei DING Preserving source-location privacy efficiently based on attack-perceiving in wireless sensor network Tongxin xuebao location privacy sensor network energy-efficiency attack-perceiving context-aware |
title | Preserving source-location privacy efficiently based on attack-perceiving in wireless sensor network |
title_full | Preserving source-location privacy efficiently based on attack-perceiving in wireless sensor network |
title_fullStr | Preserving source-location privacy efficiently based on attack-perceiving in wireless sensor network |
title_full_unstemmed | Preserving source-location privacy efficiently based on attack-perceiving in wireless sensor network |
title_short | Preserving source-location privacy efficiently based on attack-perceiving in wireless sensor network |
title_sort | preserving source location privacy efficiently based on attack perceiving in wireless sensor network |
topic | location privacy sensor network energy-efficiency attack-perceiving context-aware |
url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018001/ |
work_keys_str_mv | AT qianzhou preservingsourcelocationprivacyefficientlybasedonattackperceivinginwirelesssensornetwork AT xiaolinqin preservingsourcelocationprivacyefficientlybasedonattackperceivinginwirelesssensornetwork AT youweiding preservingsourcelocationprivacyefficientlybasedonattackperceivinginwirelesssensornetwork |