检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:Seble Hailu Dady Wang Jiahao Qin Zhiguang Yang Fan
机构地区:[1]School of Computer Science & Engineering,University of Electronic Science and Technology of China
出 处:《High Technology Letters》2015年第2期140-146,共7页高技术通讯(英文版)
基 金:Supported by the National Natural Science Foundation of China(No.60903157);the Fundamental Research funds for the Central Universities of China(No.ZYGX2011J066);the Sichuan Science and Technology Support Project(No.2013GZ0022)
摘 要:This paper proposes a clustered trajectories anonymity scheme (CTA) that enhances the kano nymity scheme to provide the intended level of source location privacy in mobile event monitoring when a global attacker is assumed. CTA applies isomorphic property of rotation to create traces of the fake sources distributions which are similar to those of the real sources. Thus anonymity of each trajectory and that of the clustered is achieved. In addition, location kdiversity is achieved by dis tributing fake sources around the base station. To reduce the time delay, tree rooted at the base sta tion is constructed to overlap part of the beacon interval of the nodes in the hierarchy. Both the ana lytical analysis and the simulation results prove that proved energy overhead and time delay. our scheme provides perfect anonymity with improved energy overhead and time delay.This paper proposes a clustered trajectories anonymity scheme(CTA) that enhances the k-anonymity scheme to provide the intended level of source location privacy in mobile event monitoring when a global attacker is assumed.CTA applies isomorphic property of rotation to create traces of the fake sources distributions which are similar to those of the real sources.Thus anonymity of each trajectory and that of the clustered is achieved.In addition,location k-diversity is achieved by distributing fake sources around the base station.To reduce the time delay,tree rooted at the base station is constructed to overlap part of the beacon interval of the nodes in the hierarchy.Both the analytical analysis and the simulation results prove that our scheme provides perfect anonymity with improved energy overhead and time delay.
关 键 词:clustered trajectories anonymity scheme (CTA) source location privacy K-ANONYMITY global attackers wireless sensor networks (WSNs)
分 类 号:TP212.9[自动化与计算机技术—检测技术与自动化装置] TN929.5[自动化与计算机技术—控制科学与工程]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.15