• 제목/요약/키워드: Active/dormant source

검색결과 3건 처리시간 0.01초

휴면 소오스들이 존재하는 환경의 센서 네트워크를 위한 위치 보호 강화 라우팅 (Location Privacy Enhanced Routing for Sensor Networks in the Presence of Dormant Sources)

  • 양기원;임화정;차영환
    • 한국정보과학회논문지:정보통신
    • /
    • 제36권1호
    • /
    • pp.12-23
    • /
    • 2009
  • 전장에서 군 작전을 지원하거나 희귀 동물을 모니터링 하는 센서 네트워크에서는 전송 정보의 보안뿐만 아니라 그러한 관심 대상(asset)들의 위치를 적이나 악의적 추적으로부터 보호할 수 있어야 한다. 본 논문에서는 위치가 보호되어야 할 대상에 근접한 센서 노드들 즉, 휴면(dormant) 소오스들이 존재하는 환경에서, 활동 소오스(즉, 메시지 발생 노드)의 위치 보호를 강화하는 라우팅 프로토콜 GSLP(GPSR-based Source-Location Privacy)를 제안한다. GSLP는 단순하면서도 scalable한 라우팅 기법인 GPSR(greedy perimeter stateless routing)을 확장하여, 확률적으로 임의의 이웃 노드를 메시지 전달 노드로 선정하여 경로의 다양성을 제고하면서 퍼리미터(perimeter) 라우팅을 적용하여 휴면 소오스 노드들을 우회하도록 함으로써 안전 기간(safety period)으로 정의되는 활동 소오스의 위치 보호 능력이 강화되도록 하였다. 휴면 소오스들의 수가 전체 노드의 1.0%에 이르기까지 시뮬레이션을 수행한 결과, 기존의 대표적인 소오스 위치 보호 프로토콜인 PR-SP(Phantom Routing, Single Path)의 안전 기간은 휴면 소오스 노드들이 증가에 따라 급속히 감소하나 제안된 GSLP는 휴면 소오스 노드들의 수와 거의 무관하게 높은 안전 기간을 제공하면서도 평균 전달 지연(delivery latency)은 도착지와의 최단 거리의 약 두 배 이내에 머무는 것으로 확인되었다.

On Sensor Network Routing for Cloaking Source Location Against Packet-Tracing

  • Tscha, Yeong-Hwan
    • 한국통신학회논문지
    • /
    • 제34권3B호
    • /
    • pp.213-224
    • /
    • 2009
  • Most of existing routing methods in wireless sensor networks to counter the local eavesdropping-based packet-tracing deal with a single asset and suffer from the packet-delivery latency as they prefer to take a separate path of many hops for each packet being sent. Recently, the author proposed a routing method, GSLP-w(GPSR-based Source-Location Privacy with crew size w), that enhances location privacy of the packet-originating node(i.e., active source) in the presence of multiple assets, yet taking a path of not too long. In this paper, we present a refined routing(i.e., next-hop selection) procedure of it and empirically study privacy strength and delivery latency with varying the crew size w(i.e., the number of packets being sent per path). It turns out that GSLP-w offers the best privacy strength when the number of packets being sent per path is randomly chosen from the range [$1,h_{s-b}/4$] and that further improvements on the privacy are achieved by increasing the random walk length TTLrw or the probability prw that goes into random walk(where, $h_{s-b}$ is the number of hops of the shortest path between packet-originating node s and sink b).

Routing for Enhancing Source-Location Privacy in Wireless Sensor Networks of Multiple Assets

  • Tscha, Yeong-Hwan
    • Journal of Communications and Networks
    • /
    • 제11권6호
    • /
    • pp.589-598
    • /
    • 2009
  • In wireless sensor networks, a node that reports information gathered from adjacent assets should relay packets appropriately so that its location context is kept private, and thereby helping ensure the security of the assets that are being monitored. Unfortunately, existing routing methods that counter the local eavesdropping-based tracing deal with a single asset, and most of them suffer from the packet-delivery latency as they prefer to take a separate path of many hops for each packet being sent. In this paper, we propose a routing method, greedy perimeter stateless routing-based source-location privacy with crew size w (GSLP-w), that enhances location privacy of the packet-originating node (i.e., active source) in the presence of multiple assets. GSLP-w is a hybrid method, in which the next-hop node is chosen in one of four modes, namely greedy, random, perimeter, and retreat modes. Random forwarding brings the path diversity, while greedy forwarding refrains from taking an excessively long path and leads to convergence to the destination. Perimeter routing makes detours that avoid the nodes near assets so that they cannot be located by an adversary tracing up the route path. We study the performance of GSLP-w with respect to crew size w (the number of packets being sent per path) and the number of sources. GSLP-w is compared with phantom routing-single path (PR-SP), which is a notable routing method for source-location privacy and our simulation results show that improvements from the point of the ratio of safety period and delivery latency become significant as the number of source nodes increases.