PRIVACY PROTECTION ALGORITHM FOR SOURCE NODE LOCATION BASED ON PHANTOM ROUTING IN THE INTERNET OF THINGS ENVIRONMENT

被引:1
|
作者
Li, Yihong [1 ]
机构
[1] Wuhan Univ, Sch Remote Sensing & Informat Engn, 129 Luoyu Rd, Wuhan 430079, Peoples R China
关键词
Source location privacy protection; Phantom routing; Internet of Things; Network security; Wireless sensor network; Attacker;
D O I
10.24507/ijicic.17.03.973
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Generally speaking, different source location protection strategies have played an important role in protecting location security of source nodes, and prolonged attackers' time to locate source nodes. Different strategies have different requirements for the network, and the degree of security protection for the source node location is different. In order to ensure the diversification of geographic location for phantom nodes, this paper proposes a privacy protection algorithm for source node location based on phantom routing in the Internet of Things environment. The algorithm more effectively resists attacks from strong visual attackers and strengthens the privacy protection of source location. Firstly, a network model is constructed, base stations are used to broadcast to the entire network for obtaining the hop count of each node and base station, and then a hop count table is constructed. Subsequently, two nodes away from base stations are randomly selected from the hop count table to form a set of candidate phantom nodes. And the data packet with two candidate phantom node IDs is broadcast to the whole network. Further, the phantom node positions are scattered away from source nodes by the twice selection of phantom nodes. In addition, the transmission path avoids nodes that easily cause failure paths, thereby achieving a balance of network security requirements. Finally, the simulation experiment proves that the proposed algorithm has a good privacy protection effect and is better than several comparison algorithms.
引用
收藏
页码:973 / 989
页数:17
相关论文
共 50 条
  • [1] Improving Source location privacy in social Internet of Things using a hybrid phantom routing technique
    Hussain, Tariq
    Yang, Bailin
    Rahman, Haseeb Ur
    Iqbal, Arshad
    Ali, Farman
    Shah, Babar
    COMPUTERS & SECURITY, 2022, 123
  • [2] Source Location Privacy Protection Algorithm Based on Polyhedral Phantom Routing in Underwater Acoustic Sensor Networks
    Han, Guangjie
    Xia, Ru
    Wang, Hao
    Li, Aohan
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (05): : 8459 - 8472
  • [3] PSSPR: A source location privacy protection scheme based on sector phantom routing in WSNs
    Chen, Yuling
    Sun, Jing
    Yang, Yixian
    Li, Tao
    Niu, Xinxin
    Zhou, Huiyu
    International Journal of Intelligent Systems, 2022, 37 (02): : 1204 - 1221
  • [4] PSSPR: A source location privacy protection scheme based on sector phantom routing in WSNs
    Chen, Yuling
    Sun, Jing
    Yang, Yixian
    Li, Tao
    Niu, Xinxin
    Zhou, Huiyu
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (02) : 1204 - 1221
  • [5] PSSPR: A Source Location Privacy Protection Scheme Based on Sector Phantom Routing in WSNs
    Sun, Jing
    Chen, Yuling
    Li, Tao
    Liu, Jia
    Yang, Yixian
    2021 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS DASC/PICOM/CBDCOM/CYBERSCITECH 2021, 2021, : 334 - 340
  • [6] Privacy Protection Algorithm Based on Linear Directional Phantom Source Node in WSN
    Bai, Leqiang
    Li, Guoku
    Zhu, Hongshu
    PROCEEDINGS OF 2017 8TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2017), 2017, : 851 - 854
  • [7] A Source-Location Privacy Protection Algorithm in WSNs Based on Node Distance
    Bai, Leqiang
    Yan, Ye
    Qian, Shiguang
    Zhang, Shihong
    2017 13TH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (ICNC-FSKD), 2017, : 2772 - 2776
  • [8] A source location protection protocol based on dynamic routing in WSNs for the Social Internet of Things
    Han, Guangjie
    Zhou, Lina
    Wang, Hao
    Zhang, Wenbo
    Chan, Sammy
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 82 : 689 - 697
  • [9] Privacy Protection Algorithm Based on Expected Phantom Source Node in Wireless Sensor Network
    Bai, Leqiang
    Li, Ling
    Qian, Shiguang
    Zhang, Shihong
    PROCEEDINGS OF 2016 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2016), 2016, : 985 - 988
  • [10] A Pseudopacket Scheduling Algorithm for Protecting Source Location Privacy in the Internet of Things
    He, Yu
    Han, Guangjie
    Xu, Mengting
    Martinez-Garcia, Miguel
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (12) : 9999 - 10009