An efficient anonymous communication protocol for wireless sensor networks

被引:18
作者
Chen, Juan [2 ]
Du, Xiaojiang [1 ]
Fang, Binxing [2 ]
机构
[1] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
[2] Harbin Inst Technol, Sch Comp Sci & Technol, Harbin 150001, Peoples R China
基金
美国国家科学基金会;
关键词
anonymous communication; sensor networks; security; SECURITY;
D O I
10.1002/wcm.1205
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Anonymous communication is very important for many wireless sensor networks, because it can be used to hide the identity of important nodes, such as the base station and a source node. In sensor networks, anonymous communication includes several important aspects, such as source anonymity, communication relationship anonymity, and base station anonymity. Existing sensor network anonymous schemes either cannot achieve all the anonymities or have large computation, storage, and communication overheads. In this paper, we propose an efficient anonymous communication protocol for sensor networks that can achieve all the anonymities while having small overheads on computation, storage, and communication. We compare our anonymous communication protocol with several existing schemes, and the results show that our protocol provides strong anonymity protection and has low overheads. Copyright (c) 2011 John Wiley & Sons, Ltd.
引用
收藏
页码:1302 / 1312
页数:11
相关论文
共 27 条
[1]  
Akyildiz IF, 2008, IEEE J SEL AREA COMM, V4, P669
[2]  
[Anonymous], 2008, P IEEE INFOCOM 27 C
[3]   Anonymous authentication protocol for GSM networks [J].
Department of Computer Engineering, Sharif University of Technology, Tehran, Iran .
Int. J. Secur. Netw., 2008, 1 (54-62) :54-62
[4]   A survey of anonymity in wireless communication systems [J].
Chen, Hui ;
Xiao, Yang ;
Hong, Xiaoyan ;
Hu, Fei ;
Xie, Jiang .
SECURITY AND COMMUNICATION NETWORKS, 2009, 2 (05) :427-444
[5]   A source-location privacy preservation protocol in wireless sensor networks using source-based restricted flooding [J].
Chen J. ;
Fang B.-X. ;
Yin L.-H. ;
Su S. .
Jisuanji Xuebao/Chinese Journal of Computers, 2010, 33 (09) :1736-1747
[6]  
Chen T, 2010, P 29 C INF COMM INFO
[7]   Sensor Network Security: A Survey [J].
Chen, Xiangqian ;
Makki, Kia ;
Yen, Kang ;
Pissinou, Niki .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2009, 11 (02) :52-73
[8]  
Kang L., 2009, P IEEE INT C COMM IC
[9]  
Kao J. C., 2007, P IEEE WIR COMM NETW
[10]  
Kermarrec AM, 2010, P 11 ACM INT S MOB A