مقاله انگلیسی رایگان در مورد مسیریابی تصادفی برای حفاظت از حریم خصوصی موقعیت منبع – الزویر ۲۰۱۹
مشخصات مقاله | |
ترجمه عنوان مقاله | یک طرح مسیریابی تصادفی مبتنی بر بخش برای حفاظت از حریم خصوصی موقعیت منبع در WSNs برای اینترنت اشیا |
عنوان انگلیسی مقاله | A sector-based random routing scheme for protecting the source location privacy in WSNs for the Internet of Things |
انتشار | مقاله سال ۲۰۱۹ |
تعداد صفحات مقاله انگلیسی | ۲۶ صفحه |
هزینه | دانلود مقاله انگلیسی رایگان میباشد. |
پایگاه داده | نشریه الزویر |
نوع نگارش مقاله |
مقاله پژوهشی (Research Article) |
مقاله بیس | این مقاله بیس نمیباشد |
نمایه (index) | Scopus – Master Journals List – JCR |
نوع مقاله | ISI |
فرمت مقاله انگلیسی | |
ایمپکت فاکتور(IF) |
۷٫۰۰۷ در سال ۲۰۱۸ |
شاخص H_index | ۹۳ در سال ۲۰۱۹ |
شاخص SJR | ۰٫۸۳۵ در سال ۲۰۱۸ |
شناسه ISSN | ۰۱۶۷-۷۳۹X |
شاخص Quartile (چارک) | Q1 در سال ۲۰۱۸ |
رشته های مرتبط | مهندسی کامپیوتر، فناوری اطلاعات |
گرایش های مرتبط | هوش مصنوعی، امنیت اطلاعات، اینترنت و شبکه های گسترده |
نوع ارائه مقاله |
ژورنال |
مجله / کنفرانس | سیستم های کامپیوتری نسل آینده-Future Generation Computer Systems |
دانشگاه | College of Internet of Things Engineering, Hohai University, 200 North Jinling Road, Changzhou 213022, China |
کلمات کلیدی | اینترنت اشیا، شبکه های حسگر بی سیم، حریم خصوصی موقعیت منبع، منبع فانتوم |
کلمات کلیدی انگلیسی | wireless sensor networksInternet of things, wireless sensor networks, source location privacy, phantom source |
شناسه دیجیتال – doi |
https://doi.org/10.1016/j.future.2019.02.049 |
کد محصول | E12083 |
وضعیت ترجمه مقاله | ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید. |
دانلود رایگان مقاله | دانلود رایگان مقاله انگلیسی |
سفارش ترجمه این مقاله | سفارش ترجمه این مقاله |
فهرست مطالب مقاله: |
Abstract ۱٫ Introduction ۲٫ Related work ۳٫ The system model and problem statement ۴٫ SRR Scheme ۵٫ Security analysis ۶٫ Simulation results and performance analysis ۷٫ Conclusions Acknowledgments References |
بخشی از متن مقاله: |
Abstract
With the development of the Internet of Things (IoT), Smart Data, which effectively support the IoT for planning, operation, monitoring, control, and intelligent decision making, has received extensive interest by researchers. However, the security of the data source has not been entirely resolved. Wireless sensor networks (WSNs) are vital components of the IoT for event monitoring and information gathering. Recently, source location privacy (SLP) protection in WSNs has attracted attentions as an approach to prevent adversaries from performing a backtracking strategy to capture the data sources. In view of the characteristics of the sensor nodes, the restricted computing power and the energy resource, we propose a sector-based random routing (SRR) scheme to address the SLP problem and reduce the energy consumption. In the SRR, the data packets are sent to random phantom sources that are located in different sectors and are distributed in all directions to reach the sink node. In addition, the concept of a hop threshold is presented to control the routing strategies and reduce the energy consumption. The theoretical analysis and experimental results prove that the proposed protocol efficiently reduces backtracking and direction attacks while safekeeping the balance between security and network lifetime. Introduction The Internet of Things (IoT), in which numerous physical objects are connected to collect and exchange data, has been applied in various domains, such as home automation, patient and industrial monitoring, smart cities, and smart infrastructures [1-2]. In recent years, Smart Data, which refers to valuable data without noise, has played an important role in supporting the development of the IoT. However, researchers have not entirely solved the security issue related to the location of the data origin. As fundamental components of the IoT for event monitoring and information gathering, wireless sensor networks (WSNs) are comprised of abundant resource-constrained and non-rechargeable sensor nodes that are self organized [3-5]. Unlike wired networks, WSNs are flexible to adapt to complex application scenarios. However, with an appropriate wireless device, a person can monitor the communication signals in a wireless sensor domain [6]. In spite of encryption techniques that protect the communication content exchanged between two sensor nodes, the adversaries mostly use powerful equipment for locating the message source by monitoring the communication patterns between the nodes without accessing the communication content. Therefore, many researchers have focused on source location privacy (SLP) protection in recent years. SLP is a significant and challenging security issue [6]. In the absence of SLP, vital information on the physical objective may be revealed. Numerous research studies related to SLP have been conducted in the last decade. Ozturk et al. [7] proposed the classical Panda-Hunter Game and the phantom routing algorithm. Wang et al. [8] first presented the concept of a visible area. Yao et al. [9] put forward a scheme based on a multi-ring centered at the sink node. Chen et al. [10] used constrained offset angles and probabilistic routing to balance the energy consumption and the security requirements. However, to our best knowledge, most existing schemes do not consider balancing energy consumption and security based on the location of the source node. |