{"title":"基于随机选择假源的wsn源位置隐私保护算法","authors":"Leqiang Bai, Ling Li, Shiguang Qian, Shihong Zhang","doi":"10.1109/FSKD.2016.7603499","DOIUrl":null,"url":null,"abstract":"In order to improve the issue that the existing source location privacy protection algorithms have lower safety periods, the random selection fake source-based algorithm for protecting source-location privacy is put forward. The algorithm selects phantom source node with random walk. The intermediate node is selected from the nodes on the shortest phantom source-sink path with the random number and information about hops to sink. Fake source node is selected by intermediate node through random walk. Analytical results demonstrate that the algorithm can select intermediate node during the process of each packet transmission. The simulation results show that the algorithm can enhance safety period and improve the level of source-location privacy against local adversary.","PeriodicalId":373155,"journal":{"name":"2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Random selection false source-based algorithm for protecting source-location privacy in WSNs\",\"authors\":\"Leqiang Bai, Ling Li, Shiguang Qian, Shihong Zhang\",\"doi\":\"10.1109/FSKD.2016.7603499\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In order to improve the issue that the existing source location privacy protection algorithms have lower safety periods, the random selection fake source-based algorithm for protecting source-location privacy is put forward. The algorithm selects phantom source node with random walk. The intermediate node is selected from the nodes on the shortest phantom source-sink path with the random number and information about hops to sink. Fake source node is selected by intermediate node through random walk. Analytical results demonstrate that the algorithm can select intermediate node during the process of each packet transmission. The simulation results show that the algorithm can enhance safety period and improve the level of source-location privacy against local adversary.\",\"PeriodicalId\":373155,\"journal\":{\"name\":\"2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)\",\"volume\":\"41 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/FSKD.2016.7603499\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FSKD.2016.7603499","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Random selection false source-based algorithm for protecting source-location privacy in WSNs
In order to improve the issue that the existing source location privacy protection algorithms have lower safety periods, the random selection fake source-based algorithm for protecting source-location privacy is put forward. The algorithm selects phantom source node with random walk. The intermediate node is selected from the nodes on the shortest phantom source-sink path with the random number and information about hops to sink. Fake source node is selected by intermediate node through random walk. Analytical results demonstrate that the algorithm can select intermediate node during the process of each packet transmission. The simulation results show that the algorithm can enhance safety period and improve the level of source-location privacy against local adversary.