Citation: | Panpan LI, Zhengxia XIE, Zhigang ZHOU, Guangxue YUE, Shilian ZHENG, Xiaoniu YANG. A Source-location Privacy Preservation Method Based on Hilbert-filling-curve Routing Protocol in Marine Wireless Sensor Networks[J]. Journal of Electronics & Information Technology, 2020, 42(6): 1510-1518. doi: 10.11999/JEIT190364 |
Source node location protection is critical to the Marine Wireless Sensor Networks (MWSNs), especially for unattended environment. However, due to most of the static deployment and the limitations in energy, storage and communication capabilities of the sensors, MWSNs are vulnerable to various location (and derivative) attacks. In this work, the node location privacy protection issues are studied from both aspects of attacks and defenses. First, a new two-phase location attack is proposed for two important types of nodes (including base station and source node). It can locate a base station node within few amounts of local wireless transmission monitoring, and then reversely traces the location of the source node. Different from existing methods, the proposed attack determines the node location based on the transmission direction, which can break through existing defenses. Then, to defend against such attack, a Hilbert-filling-curve-based Location-privacy Protection Scheme (HLPS) is designed for MWSNs. The theory analysis and confrontation experiment of attack and defense show that the proposed scheme owns capable of protecting the location privacy of the target node with moderate communication and computation overhead.
WALID E, THOMAS N, EOIN O, et al. Trust security mechanism for maritime wireless sensor networks[J]. Concurrency and Computation: Practice and Experience, 2017, 29(23): e3945. doi: 10.1002/cpe.3945
|
陈娟, 方滨兴, 殷丽华, 等. 传感器网络中基于源节点有限洪泛的源位置隐私保护协议[J]. 计算机学报, 2010, 33(9): 1736–1747. doi: 10.3724/SP.J.1016.2010.01736
CHEN Juan, FANG Binxing, YIN Lihua, et al. A source-location privacy preservation protocol in wireless sensor networks using source-based restricted flooding[J]. Chinese Journal of Computers, 2010, 33(9): 1736–1747. doi: 10.3724/SP.J.1016.2010.01736
|
BAROUTIS N and YOUNIS M. Using fake sinks and deceptive relays to boost base-station anonymity in wireless sensor network[C]. The 40th IEEE Conference on Local Computer Networks, Clearwater Beach, USA, 2015: 109–116. doi: 10.1109/LCN.2015.7366289.
|
DI PIETRO R and VIEJO A. Location privacy and resilience in wireless sensor networks querying[J]. Computer Communications, 2011, 34(3): 515–523. doi: 10.1016/j.comcom.2010.05.014
|
AL-MISTARIHI M F, TANASH I M, YASEEN F S, et al. Protecting source location privacy in a clustered wireless sensor networks against local eavesdroppers[J]. Mobile Networks and Applications, 2020, 25(1): 42–54. doi: 10.1007/s11036-018-1189-6
|
NGAI E C H and RODHE I. On providing location privacy for mobile sinks in wireless sensor networks[J]. Wireless Networks, 2013, 19(1): 115–130. doi: 10.1007/s11276-012-0454-z
|
WANG Jian, WANG Fengyu, CAO Zhenzhong, et al. Sink location privacy protection under direction attack in wireless sensor networks[J]. Wireless Networks, 2017, 23(2): 579–591. doi: 10.1007/s11276-015-1179-6
|
彭志宇, 李善平. 移动环境下LBS位置隐私保护[J]. 电子与信息学报, 2011, 33(5): 1211–1216. doi: 10.3724/SP.J.1146.2010.01050
PENG Zhiyu and LI Shanping. Protecting location privacy in location-based services in mobile environments[J]. Journal of Electronics &Information Technology, 2011, 33(5): 1211–1216. doi: 10.3724/SP.J.1146.2010.01050
|
LONG Jun, LIU Anfeng, DONG Mianxiong, et al. An energy-efficient and sink-location privacy enhanced scheme for WSNs through ring based routing[J]. Journal of Parallel and Distributed Computing, 2015, 81–82: 47–65. doi: 10.1016/j.jpdc.2015.04.003
|
LIU Anfeng, LIU Xiao, TANG Zhipeng, et al. Preserving smart sink-location privacy with delay guaranteed routing scheme for WSNs[J]. ACM Transactions on Embedded Computing Systems, 2017, 16(3): 68. doi: 10.1145/2990500
|
BAROUTIS N and YOUNIS M. Load-conscious maximization of base-station location privacy in wireless sensor networks[J]. Computer Networks, 2017, 124: 126–139. doi: 10.1016/j.comnet.2017.06.021
|
LIN Xiaodong, LU Rongxing, LIANG Xiaohui, et al. STAP: A social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs[C]. 2011 IEEE INFOCOM, Shanghai, China, 2011: 2147–2155. doi: 10.1109/INFCOM.2011.5935026.
|
FAN Yanfei, JIANG Yixin, ZHU Haojin, et al. An efficient privacy-preserving scheme against traffic analysis attacks in network coding[C]. The 28th IEEE International Conference on Computer Communications, Rio de Janeiro, Brazil, 2009: 2213–2221. doi: 10.1109/INFCOM.2009.5062146.
|
HU Ling, KU W S, BAKIRAS S, et al. Spatial query integrity with voronoi neighbors[J]. IEEE Transactions on Knowledge and Data Engineering, 2013, 25(4): 863–876. doi: 10.1109/tkde.2011.267
|
KALNIS P, GHINITA G, MOURATIDIS K, et al. Preventing location-based identity inference in anonymous spatial queries[J]. IEEE Transactions on Knowledge and Data Engineering, 2007, 19(12): 1719–1733. doi: 10.1109/TKDE.2007.190662
|
WANG Weiping, CHEN Liang, and WANG Jianxin. A source-location privacy protocol in WSN based on locational angle[C]. 2008 IEEE International Conference on Communications, Beijing, China, 2008: 1630–1634. doi: 10.1109/ICC.2008.315.
|