{"title":"无线传感器网络中基于期望虚影源节点的隐私保护算法","authors":"Leqiang Bai, Ling Li, Shiguang Qian, Shihong Zhang","doi":"10.1109/ICSESS.2016.7883231","DOIUrl":null,"url":null,"abstract":"For the problem that the existing source-location privacy protection algorithms have lower safety periods, source-location privacy protection algorithm based on expected phantom source node is proposed. With coordinates of source node and sink node, the algorithm establishes an ellipse and selects a node randomly on the ellipse as expected phantom source node which providing direction for phantom source node. By selecting dispersive expected phantom source nodes, transmission paths of adjacent packets are dispersive. Theoretical analysis shows that the algorithm can increase the probability of packet away from source node and sink node during transmission procedure. The experimental results show that the algorithm can enhance safety period.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Privacy protection algorithm based on expected phantom source node in wireless sensor network\",\"authors\":\"Leqiang Bai, Ling Li, Shiguang Qian, Shihong Zhang\",\"doi\":\"10.1109/ICSESS.2016.7883231\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"For the problem that the existing source-location privacy protection algorithms have lower safety periods, source-location privacy protection algorithm based on expected phantom source node is proposed. With coordinates of source node and sink node, the algorithm establishes an ellipse and selects a node randomly on the ellipse as expected phantom source node which providing direction for phantom source node. By selecting dispersive expected phantom source nodes, transmission paths of adjacent packets are dispersive. Theoretical analysis shows that the algorithm can increase the probability of packet away from source node and sink node during transmission procedure. The experimental results show that the algorithm can enhance safety period.\",\"PeriodicalId\":175933,\"journal\":{\"name\":\"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)\",\"volume\":\"69 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSESS.2016.7883231\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSESS.2016.7883231","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Privacy protection algorithm based on expected phantom source node in wireless sensor network
For the problem that the existing source-location privacy protection algorithms have lower safety periods, source-location privacy protection algorithm based on expected phantom source node is proposed. With coordinates of source node and sink node, the algorithm establishes an ellipse and selects a node randomly on the ellipse as expected phantom source node which providing direction for phantom source node. By selecting dispersive expected phantom source nodes, transmission paths of adjacent packets are dispersive. Theoretical analysis shows that the algorithm can increase the probability of packet away from source node and sink node during transmission procedure. The experimental results show that the algorithm can enhance safety period.