文章摘要
Seble Hailu Dady,Wang Jiahao,Qin Zhiguang,Yang Fan.[J].高技术通讯(英文),2015,21(2):140~146
Clustered trajectories anonymity in wireless sensor networks
  
DOI:10.3772/j.issn.1006-6748.2015.02.004
中文关键词: 
英文关键词: clustered trajectories anonymity scheme (CTA), source location privacy, k-anonymity, global attackers, wireless sensor networks (WSNs)
基金项目:
Author NameAffiliation
Seble Hailu Dady  
Wang Jiahao  
Qin Zhiguang  
Yang Fan  
Hits: 802
Download times: 685
中文摘要:
      
英文摘要:
      This paper proposes a clustered trajectories anonymity scheme (CTA) that enhances the k-anonymity scheme to provide the intended level of source location privacy in mobile event monitoring when a global attacker is assumed. CTA applies isomorphic property of rotation to create traces of the fake sources distributions which are similar to those of the real sources. Thus anonymity of each trajectory and that of the clustered is achieved. In addition, location k-diversity is achieved by distributing fake sources around the base station. To reduce the time delay, tree rooted at the base station is constructed to overlap part of the beacon interval of the nodes in the hierarchy. Both the analytical analysis and the simulation results prove that our scheme provides perfect anonymity with improved energy overhead and time delay.
View Full Text   View/Add Comment  Download reader
Close

分享按钮