مقاله انگلیسی رایگان در مورد مسیریابی تصادفی برای حفاظت از حریم خصوصی موقعیت منبع – الزویر ۲۰۱۹

مقاله انگلیسی رایگان در مورد مسیریابی تصادفی برای حفاظت از حریم خصوصی موقعیت منبع – الزویر ۲۰۱۹

 

مشخصات مقاله
ترجمه عنوان مقاله یک طرح مسیریابی تصادفی مبتنی بر بخش برای حفاظت از حریم خصوصی موقعیت منبع در WSNs برای اینترنت اشیا
عنوان انگلیسی مقاله A sector-based random routing scheme for protecting the source location privacy in WSNs for the Internet of Things
انتشار مقاله سال ۲۰۱۹
تعداد صفحات مقاله انگلیسی  ۲۶ صفحه
هزینه دانلود مقاله انگلیسی رایگان میباشد.
پایگاه داده نشریه الزویر
نوع نگارش مقاله
مقاله پژوهشی (Research Article)
مقاله بیس این مقاله بیس نمیباشد
نمایه (index) Scopus – Master Journals List – JCR
نوع مقاله ISI
فرمت مقاله انگلیسی  PDF
ایمپکت فاکتور(IF)
۷٫۰۰۷ در سال ۲۰۱۸
شاخص H_index ۹۳ در سال ۲۰۱۹
شاخص SJR ۰٫۸۳۵ در سال ۲۰۱۸
شناسه ISSN ۰۱۶۷-۷۳۹X
شاخص Quartile (چارک) Q1 در سال ۲۰۱۸
رشته های مرتبط  مهندسی کامپیوتر، فناوری اطلاعات
گرایش های مرتبط  هوش مصنوعی، امنیت اطلاعات، اینترنت و شبکه های گسترده
نوع ارائه مقاله
ژورنال
مجله / کنفرانس  سیستم های کامپیوتری نسل آینده-Future Generation Computer Systems
دانشگاه  College of Internet of Things Engineering, Hohai University, 200 North Jinling Road, Changzhou 213022, China
کلمات کلیدی  اینترنت اشیا، شبکه های حسگر بی سیم، حریم خصوصی موقعیت منبع، منبع فانتوم
کلمات کلیدی انگلیسی wireless sensor networksInternet of things, wireless sensor networks, source location privacy, phantom source
شناسه دیجیتال – doi
https://doi.org/10.1016/j.future.2019.02.049
کد محصول  E12083
وضعیت ترجمه مقاله  ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید.
دانلود رایگان مقاله دانلود رایگان مقاله انگلیسی
سفارش ترجمه این مقاله سفارش ترجمه این مقاله

 

فهرست مطالب مقاله:
Abstract
۱٫ Introduction
۲٫ Related work
۳٫ The system model and problem statement
۴٫ SRR Scheme
۵٫ Security analysis
۶٫ Simulation results and performance analysis
۷٫ Conclusions
Acknowledgments
References

 

بخشی از متن مقاله:
Abstract

With the development of the Internet of Things (IoT), Smart Data, which effectively support the IoT for planning, operation, monitoring, control, and intelligent decision making, has received extensive interest by researchers. However, the security of the data source has not been entirely resolved. Wireless sensor networks (WSNs) are vital components of the IoT for event monitoring and information gathering. Recently, source location privacy (SLP) protection in WSNs has attracted attentions as an approach to prevent adversaries from performing a backtracking strategy to capture the data sources. In view of the characteristics of the sensor nodes, the restricted computing power and the energy resource, we propose a sector-based random routing (SRR) scheme to address the SLP problem and reduce the energy consumption. In the SRR, the data packets are sent to random phantom sources that are located in different sectors and are distributed in all directions to reach the sink node. In addition, the concept of a hop threshold is presented to control the routing strategies and reduce the energy consumption. The theoretical analysis and experimental results prove that the proposed protocol efficiently reduces backtracking and direction attacks while safekeeping the balance between security and network lifetime.

Introduction

The Internet of Things (IoT), in which numerous physical objects are connected to collect and exchange data, has been applied in various domains, such as home automation, patient and industrial monitoring, smart cities, and smart infrastructures [1-2]. In recent years, Smart Data, which refers to valuable data without noise, has played an important role in supporting the development of the IoT. However, researchers have not entirely solved the security issue related to the location of the data origin. As fundamental components of the IoT for event monitoring and information gathering, wireless sensor networks (WSNs) are comprised of abundant resource-constrained and non-rechargeable sensor nodes that are self organized [3-5]. Unlike wired networks, WSNs are flexible to adapt to complex application scenarios. However, with an appropriate wireless device, a person can monitor the communication signals in a wireless sensor domain [6]. In spite of encryption techniques that protect the communication content exchanged between two sensor nodes, the adversaries mostly use powerful equipment for locating the message source by monitoring the communication patterns between the nodes without accessing the communication content. Therefore, many researchers have focused on source location privacy (SLP) protection in recent years. SLP is a significant and challenging security issue [6]. In the absence of SLP, vital information on the physical objective may be revealed. Numerous research studies related to SLP have been conducted in the last decade. Ozturk et al. [7] proposed the classical Panda-Hunter Game and the phantom routing algorithm. Wang et al. [8] first presented the concept of a visible area. Yao et al. [9] put forward a scheme based on a multi-ring centered at the sink node. Chen et al. [10] used constrained offset angles and probabilistic routing to balance the energy consumption and the security requirements. However, to our best knowledge, most existing schemes do not consider balancing energy consumption and security based on the location of the source node.

ثبت دیدگاه