当前位置: X-MOL 学术Wirel. Commun. Mob. Comput. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Energy Balanced Source Location Privacy Scheme Using Multibranch Path in WSNs for IoT
Wireless Communications and Mobile Computing Pub Date : 2021-02-25 , DOI: 10.1155/2021/6654427
Huijiao Wang 1 , Lin Wu 1 , Qing Zhao 1 , Yongzhuang Wei 1 , Hua Jiang 1
Affiliation  

Source location privacy, one of the core contents of Wireless Sensor Network (WSN) security, has a significant impact on extensive application of WSNs. In this paper, a novel location privacy protection routing scheme called Energy Balanced Branch Tree (EBBT) is proposed by using multibranch and fake sources. This scheme has three phases. In the first place, the data of the source are randomly sent to a certain intermediate node. Then, a minimum hop routing (MHR) from the intermediate node to the base station is formed. Then, branch paths with fake sources are generated dynamically from some nodes on the MHR path. Finally, a tree-shaped structure from real source nodes and fake source nodes to the base station is achieved. In difference to the previous schemes, the location of the real source in the EBBT scheme does not affect the location and the number of fake sources. During the formation of the tree-shaped multibranch paths, the residual energy of nodes is considered sufficiently, and the control of the direction of each branch path is also involved. The influence of the number and length of branches on the network lifetime and network security is also investigated. Experimental results show that the proposed algorithm has the advantages of long network security period and lifetime, as well as high path diversity. Our simulation further illustrates that the EBBT scheme has favorable privacy of the source location without changing the network lifetime.

中文翻译:

WSN中用于物联网的多分支路径能量平衡源位置隐私方案

源位置隐私是无线传感器网络(WSN)安全的核心内容之一,对WSN的广泛应用具有重大影响。本文提出了一种新的位置隐私保护路由方案,称为能量平衡分支树(EBBT),它使用了多分支和伪造源。该方案分为三个阶段。首先,源的数据被随机发送到某个中间节点。然后,形成了从中间节点到基站的最小跳路由(MHR)。然后,从MHR路径上的某些节点动态生成带有假源的分支路径。最后,实现了从真实源节点和伪源节点到基站的树形结构。与以前的方案不同,EBBT方案中真实源的位置不影响假源的位置和数量。在树形多分支路径的形成过程中,充分考虑了节点的剩余能量,并且还涉及对每个分支路径的方向的控制。还研究了分支的数量和长度对网络寿命和网络安全性的影响。实验结果表明,该算法具有网络安全周期长,生存期长,路径分集高等优点。我们的仿真进一步说明,EBBT方案在不更改网络寿命的情况下,对源位置具有良好的保密性。并且还涉及对每个分支路径的方向的控制。还研究了分支的数量和长度对网络寿命和网络安全性的影响。实验结果表明,该算法具有网络安全周期长,生存期长,路径分集高等优点。我们的仿真进一步说明,EBBT方案在不更改网络寿命的情况下,对源位置具有良好的保密性。并且还涉及对每个分支路径的方向的控制。还研究了分支的数量和长度对网络寿命和网络安全性的影响。实验结果表明,该算法具有网络安全周期长,生存期长,路径分集高等优点。我们的仿真进一步说明,EBBT方案在不更改网络寿命的情况下,对源位置具有良好的保密性。
更新日期:2021-02-25
down
wechat
bug