信息网络安全 ›› 2025, Vol. 25 ›› Issue (4): 536-549.doi: 10.3969/j.issn.1671-1122.2025.04.003
收稿日期:2024-11-30
出版日期:2025-04-10
发布日期:2025-04-25
通讯作者:
杨高 作者简介:胡宇涵(2000—),男,湖南,博士研究生,主要研究方向为网络空间安全、人工智能|杨高(2001—),女,广西,博士研究生,主要研究方向为4G/5G安全、移动安全;|蔡红叶(1992—),女,北京,硕士,主要研究方向为车联网安全、4G/5G安全和数据安全|付俊松(1989—),男,河北,副教授,博士,主要研究方向为网络空间安全、车联网安全和4G/5G安全
基金资助:
HU Yuhan1, YANG Gao1(
), CAI Hongye2, FU Junsong1
Received:2024-11-30
Online:2025-04-10
Published:2025-04-25
摘要:
随着5G/6G无线通信技术与新型智能组网技术的协同发展,三维分布式网络架构正逐步实现空天地海全域覆盖。在该网络体系中,大量智能通信节点通过无线互联形成自主化多跳路由系统,实现信息的动态共享。然而,由于无线信道的广播特性,攻击者可通过窃听网络通信行为并进行关联分析,精确重构消息传输路径拓扑。这种路径反演攻击将直接暴露源节点、目的节点及关键中继节点的位置隐私,对网络安全构成严重威胁。针对三维分布式无线网络的路径隐私保护需求,文章提出基于空间信息混淆的数据传输路径隐匿方案。首先,采用三维Delaunay三角剖分算法将网络空间离散化为若干不规则四面体单元,构建节点的通信邻域集与Delaunay邻域集。其次,设计最优虚拟中继位置选择机制,结合通信邻域与Delaunay邻域拓扑特征,开发虚拟位置引导的定向消息传播算法。该算法通过分布式计算,将数据包精准路由至距离虚拟中继位置最近的物理节点(即随机化中继节点),有效实现传输路径与物理拓扑的解耦。最终,由随机化中继节点担任伪源节点完成数据交付,通过时空维度双重混淆提升路径追踪难度。仿真实验表明,该方案通过引入动态虚拟中继机制,可使信道内有效数据包密度降低42.7%,路径重构攻击成功率降至12.3%以下,显著增强了数据传输路径的不可关联性。该成果为三维分布式网络提供了一种轻量级的位置隐私保护解决方案。
中图分类号:
胡宇涵, 杨高, 蔡红叶, 付俊松. 三维分布式无线智能系统数据传输路径隐私保护方案[J]. 信息网络安全, 2025, 25(4): 536-549.
HU Yuhan, YANG Gao, CAI Hongye, FU Junsong. Privacy Protection of Data Transmission Paths in 3D Distributed Wireless Intelligent Systems[J]. Netinfo Security, 2025, 25(4): 536-549.
| [1] | SHEN Xuemin, CHENG Nan, ZHOU Haibo, et al. Space-Air-Ground Integrated Networks: Review and Prospect[J]. Chinese Journal on Internet of Things, 2020, 4(3): 3-19. |
|
沈学民, 承楠, 周海波, 等. 空天地一体化网络技术:探索与展望[J]. 物联网学报, 2020, 4(3): 3-19.
doi: 10.11959/j.issn.2096-3750.2020.00142 |
|
| [2] | GUO Yike, GUO Liang, CHEN Xiaojie, et al. Typical Applications of Air-Space-Ground Intelligent Perception Technology in Territorial Spatial Planning Implementation and Monitoring[J]. Natural Resources Informatization, 2024(6): 93-100, 116. |
| 郭一珂, 郭亮, 陈小杰, 等. 空天地智能感知技术在国土空间规划实施监测中的典型应用[J]. 自然资源信息化, 2024, (6): 93-100, 116. | |
| [3] | DUAN Junjun. Application of Integrated Intelligent Monitoring System of Air, Sky, and Earth Network in Emergency Response of Natural Disasters[J]. Heilongjiang Science, 2024, 15(24): 139-142. |
| 段俊俊. 空天地网一体化智慧监测体系在自然灾害应急处置中的应用[J]. 黑龙江科学, 2024, 15(24): 139-142. | |
| [4] | ALHAMMADI A, ABRAHAM A, FAKHREDDINE A, et al. Envisioning the Future Role of 3D Wireless Networks in Preventing and Managing Disasters and Emergency Situations[EB/OL]. (2024-02-16)[2024-10-20]. https://arxiv.org/abs/2402.10600. |
| [5] | MARINHO R P, VIEIRA L F M, VIEIRA M A M, et al. SAGIN-CAIN: A 3D Routing Protocol for Post-Disaster SAGIN 6G Network[C]// IEEE.2024 the 20th International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT). New York: IEEE, 2024: 685-692. |
| [6] | KHAN W, ZUALKERNAN I. SensePods: A ZigBee-Based Tangible Smart Home Interface[J]. IEEE Transactions on Consumer Electronics, 2018: 145-152. |
| [7] | LI Shining, LUO Guojia. Industrial Internet of Things Technology and Application Overview[J]. Telecommunications Network Technology, 2014 (3): 26-31. |
| 李士宁, 罗国佳. 工业物联网技术及应用概述[J]. 电信网技术, 2014 (3): 26-31. | |
| [8] | ZHU Lina, LI Changle, XIA Bing. A Hybrid Routing Protocol for 3-D Vehicular Ad Hoc Networks[J]. IEEE Systems Journal, 2017, 11(3): 1239-1248. |
| [9] | XU Weichao, WANG Guanling, CHEN Mengyuan. Node Localization of Wireless Sensor Networks Based on SR-CKF Assisted by Unmanned Aerial Vehicle[J]. CAAI Transactions on Intelligent Systems, 2019, 14(3): 575-581. |
| 徐魏超, 王冠凌, 陈孟元. 无人机协助下基于SR-CKF 的无线传感器网络节点定位研究[J]. 智能系统学报, 2019, 14(3): 575-581. | |
| [10] | MORIDI M, KAWAMURA Y, SHARIFZADEH M, et al. Performance Analysis of ZigBee Network Topologies for Underground Space Monitoring and Communication Systems[J]. Tunnelling & Underground Space Technology, 2018, 71: 201-209. |
| [11] | YAN Jing, YANG Xian, LUO Xiaoyuan, et al. Energy-Efficient Data Collection over AUV-Assisted Underwater Acoustic Sensor Network[J]. IEEE Systems Journal, 2018, 12(4): 3519-3530. |
| [12] | OZDEMIR S, CAM H. Integration of False Data Detection with Data Aggregation and Confidential Transmission in Wireless Sensor Networks[J]. IEEE/ACM Transactions on Networking, 2010, 18(3): 736-749. |
| [13] | MAHMOUD M, LIN Xiaodong, SHEN Xuemin. Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks[J]. IEEE Transactions on Parallel and Distributed. Systems, 2015, 26(4): 1140-1153. |
| [14] | QIN Danyang, YANG Songxiang, JIA Shuang, et al. Research on Trust Sensing Based Secure Routing Mechanism for Wireless Sensor Network[J]. IEEE Access, 2017, 5: 9599-9609. |
| [15] | LIU Anfeng, ZHENG Zhongming, ZHANG Chao, et al. Secure and Energy-Efficient Disjoint Multipath Routing for WSNs[J]. IEEE Transactions on Vehicle Technology, 2012, 61(7): 3255-3265. |
| [16] | MAHMOUD M, SHEN Xuemin. A Cloud-Based Scheme for Protecting Source-Location Privacy against Hotspot-Locating Attack in Wireless Sensor Networks[J]. IEEE Transactions on Parallel Distributed System, 2012, 23(10): 1805-1818. |
| [17] |
FAN Chaoqiong, ZHAO Chenglin, LI Bin. Hierarchical Game Based Spectrum Access Optimization for Anti-Jamming in UAV Network[J]. Journal on communications, 2020, 41(6): 26-33.
doi: 10.11959/j.issn.1000-436x.2020114 |
|
范超琼, 赵成林, 李斌. 无人机网络中基于分层博弈的干扰对抗频谱接入优化[J]. 通信学报, 2020, 41(6): 26-33.
doi: 10.11959/j.issn.1000-436x.2020114 |
|
| [18] | WANG Na, FU Junsong, LI Jian, et al. Source-Location Privacy Protection Based on Anonymity Cloud in Wireless Sensor Networks[J]. IEEE Transactions on Information Forensics and Security, 2020, 15: 100-114. |
| [19] | WANG Na, FU Junsong, ZENG Jiwen, et al. Source-Location Privacy Full Protection in Wireless Sensor Networks[J]. Information Sciences, 2018, 444: 105-121. |
| [20] | BICAKCI K, GULREKIN H, TAVLI B, et al. Maximizing Lifetime of Event-Unobservable Wireless Sensor Networks[J]. Computing Standards Interfaces, 2011, 33(4): 401-410. |
| [21] | KARP B, KUNG H. GPSR: Greedy Perimeter Stateless Routing for Wireless Networks[C]// ACM.MobiCom00:The 6th Annual International Conference on Mobile Computing and Networking. New York: ACM, 2000, 243-254. |
| [22] | INTANAGONWIWAT C, GOVINDAN R, ESTRIN D, et al. Directed Diffusion for Wireless Sensor Networking[J]. IEEE/ACM Transactions on Networking, 2003, 11(1):2-16. |
| [23] | KAMAT P, ZHANG Y, TRAPPE W, et al. Enhancing Source Location Privacy in Sensor Network Routing[C]// IEEE. The 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05). New York: IEEE, 2005, 599-608. |
| [24] | WANG Na, ZENG Jiwen. All-Direction Random Routing for Source-Location Privacy Protecting Against Parasitic Sensor Networks[J]. Sensors, 2017, 17(3): 614-631. |
| [25] | ALOMAIR B, CLARK A, CUELLAR J, et al. Toward a Statistical Framework for Source Anonymity in Sensor Networks[J]. IEEE Transactionson Mobile Computing. 2013, 12(2): 248-260. |
| [26] | YANG Yi, SHAO Min, ZHU Sencun, et al. Towards Statistically Strong Source Anonymity for Sensor Networks[J]. ACM Transactions on Sensor Networks (TOSN), 2013, 9(3): 1-23.. |
| [27] | HAN Youjia, HU Huangshui, GUO Yuxin. Energy-Aware and Trust-Based Secure Routing Protocol for Wireless Sensor Networks Using Adaptive Genetic Algorithm[J]. IEEE Access, 2022, 10: 11538-11550. |
| [28] | JI Baofeng, ZHANG Mingkun, XING Ling, et al. Research on Optimal Intelligent Routing Algorithm for IoV with Machine Learning and Smart Contract[J]. Digital Communications and Networks, 2023, 9(1): 47-55. |
| [29] | ZHOU Jiangwei, CHEN Yu, LEONG B, et al. Practical 3D Geographic Routing for Wireless Sensor Networks[C]. // ACM.SenSys '10: Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems. New York: ACM, 2010: 337-350. |
| [30] | LAM S, QIAN Chen. Geographic Routing in D-Dimensional Spaces with Guaranteed Delivery and Low Stretch[J]. ACM SIGMETRICS Performance Evaluation Review, 2011, 39(1): 217-228. |
| [31] | LEONG B, LISKOV B, MORRIS R T. Geographic Routing Without Planarization[C]// USENIX.NSDI ’06: 3rd Symposium on Networked Systems Design & Implementation.California:USENIX, 2006: 339-352. |
| [32] | FU Junsong, CUI Baojiang, WANG Na, et al. A Distributed Position-Based Routing Algorithm in 3-D Wireless Industrial Internet of Things[J]. IEEE Transactions on Industrial Informatics, 2019, 15(10): 5664-5673. |
| [33] | ZHENG Shannong, HUO Jiuyuan, YANG Jiguang, et al. An Energy-Efficient Multi-Hop Routing Protocol for 3D Bridge Wireless Sensor Network Based on Secretary Bird Optimization Algorithm[J]. IEEE Sensors Journal, 2024: 38045-38060. |
| [34] | REN Z, HUSSAIN K, FAHEEM M. K-Means Online-Learning Routing Protocol (K-MORP) for Unmanned Aerial Vehicles (UAV) Adhoc Networks[EB/OL]. (2024-03-01)[2024-10-20]. https://doi.org/10.1016/j.adhoc.2023.103354. |
| [35] | LE D P C, WANG Dong, TU N H. Power Efficiency Optimization and Enhanced Connectivity for Wireless Sensor Networks with the Fuzzy C-Means 3D Model[EB/OL]. (2024-02-03)[2024-10-20]. https://www.preprints.org/manuscript/202402.0462/download/final_file. |
| [36] |
QIAN Kaiguo, BU Chunfen, WANG Yujian, et al. Reliable Beacon-Based and Density-Aware Distance Localization Algorithm for Wireless Sensor Network[J]. Journal of Computer Applications, 2019 (3): 817-823.
doi: 10.11772/j.issn.1001-9081.2018071661 |
|
钱开国, 卜春芬, 王玉见, 等. 基于可靠信标和节点度估计距离的无线传感器网络定位算法[J]. 计算机应用, 2019 (3): 817-823.
doi: 10.11772/j.issn.1001-9081.2018071661 |
|
| [37] | ZHANG Yanchao, LIU Wei, FANG Yuguang, et al. Secure Localization and Authentication in Ultra-Wideband Sensor Networks[J]. IEEE Journal of Selected Areas Communication, 2006, 24(4): 829-835. |
| [38] | CHENG Xiuzhen, THAELE A, XUE Guoliang, et al. TPS: A Time-Based Positioning Scheme for Outdoor Wireless Sensor Networks[J]. IEEE INFOCOM, 2004, 2685-2696. |
| [39] | ZHOU Peide. Computational Geometry: Algorithm Analysis and Design[M]. Beijing: Tsinghua University Press, 2000. |
| 周培德. 计算几何:算法分析与设计[M]. 北京: 清华大学出版社, 2000. |
| [1] | 叶阿勇, 李晴, 金俊林, 孟铃玉. 无线网络接入中用户身份和位置的双重隐身机制研究[J]. 信息网络安全, 2018, 18(7): 29-35. |
| [2] | 刘永磊, 金志刚, 高天迎. 移动支付系统安全性研究综述[J]. 信息网络安全, 2017, 17(2): 1-5. |
| [3] | 赖成喆, 郑东. 3GPP认证和密钥协商协议综述[J]. 信息网络安全, 2016, 16(8): 24-31. |
| [4] | 李赓;赵玉萍;孙春来;肖如吾. CDD无线通信网络安全研究[J]. , 2013, 13(10): 0-0. |
| [5] | 池水明;孙斌. 无线网络安全风险及防范技术刍议[J]. , 2012, 12(3): 0-0. |
| [6] | 任伟. 无线网络安全问题初探[J]. , 2012, 12(1): 0-0. |
| 阅读次数 | ||||||
|
全文 |
|
|||||
|
摘要 |
|
|||||