Paper
8 December 2022 Source location privacy protection mechanism against global attackers
Ruiqi Ma, Ziyong Li, Yuxiang Hu, Jinchuan Pei
Author Affiliations +
Proceedings Volume 12474, Second International Symposium on Computer Technology and Information Science (ISCTIS 2022); 124742K (2022) https://doi.org/10.1117/12.2653558
Event: Second International Symposium on Computer Technology and Information Science (ISCTIS 2022), 2022, Guilin, China
Abstract
For global attackers with stronger attack capabilities, this paper proposes a source location privacy protection (FS-SLP) mechanism based on pseudo-source nodes. The mechanism uses the global view information of the network and the location information of the current source node to dynamically generate multiple evenly distributed pseudo-source nodes in the network. The pseudo-source node transmits fake data to the sink node when the source node transmits real data packets to the sink node. packets, which greatly increases the difficulty of traffic analysis for attackers; to further enhance the security of the source node, this mechanism generates a dynamically adjustable filtering confusion ring near the sink node, and the nodes in the filtering confusion ring reduce the transmission path. At the same time, the transmission path of true and false data packets is confused, which reduces the energy consumption of nodes near the sink node and further increases the analysis difficulty of the attacker. Simulation experiments show that, compared with the existing scheme, this mechanism greatly prolongs the security period of the network on the premise of increasing a small amount of energy consumption.
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Ruiqi Ma, Ziyong Li, Yuxiang Hu, and Jinchuan Pei "Source location privacy protection mechanism against global attackers", Proc. SPIE 12474, Second International Symposium on Computer Technology and Information Science (ISCTIS 2022), 124742K (8 December 2022); https://doi.org/10.1117/12.2653558
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Computer security

Data transmission

Network security

Sensors

Sensor networks

Systems modeling

Data modeling

Back to Top