Seble Hailu Dady,Wang Jiahao,Qin Zhiguang,Yang Fan.[J].高技术通讯(英文),2015,21(2):140~146 |
|
Clustered trajectories anonymity in wireless sensor networks |
|
DOI:10.3772/j.issn.1006-6748.2015.02.004 |
中文关键词: |
英文关键词: clustered trajectories anonymity scheme (CTA), source location privacy, k-anonymity, global attackers, wireless sensor networks (WSNs) |
基金项目: |
Author Name | Affiliation | Seble Hailu Dady | | Wang Jiahao | | Qin Zhiguang | | Yang Fan | |
|
Hits: 905 |
Download times: 798 |
中文摘要: |
|
英文摘要: |
This paper proposes a clustered trajectories anonymity scheme (CTA) that enhances the k-anonymity scheme to provide the intended level of source location privacy in mobile event monitoring when a global attacker is assumed. CTA applies isomorphic property of rotation to create traces of the fake sources distributions which are similar to those of the real sources. Thus anonymity of each trajectory and that of the clustered is achieved. In addition, location k-diversity is achieved by distributing fake sources around the base station. To reduce the time delay, tree rooted at the base station is constructed to overlap part of the beacon interval of the nodes in the hierarchy. Both the analytical analysis and the simulation results prove that our scheme provides perfect anonymity with improved energy overhead and time delay. |
View Full Text
View/Add Comment Download reader |
Close |