• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Clustered trajectories anonymity in wireless sensor networks①

    2015-04-17 05:33:38SebleHailuDadyWangJiahao
    High Technology Letters 2015年2期
    關(guān)鍵詞:充分考慮南通原材料

    Seble Hailu Dady, Wang Jiahao

    (School of Computer Science & Engineering, University of Electronic Science and Technology of China, Chengdu 611731, P.R.China)

    ?

    Clustered trajectories anonymity in wireless sensor networks①

    Seble Hailu Dady, Wang Jiahao②

    (School of Computer Science & Engineering, University of Electronic Science and Technology of China, Chengdu 611731, P.R.China)

    This paper proposes a clustered trajectories anonymity scheme (CTA) that enhances the k-anonymity scheme to provide the intended level of source location privacy in mobile event monitoring when a global attacker is assumed. CTA applies isomorphic property of rotation to create traces of the fake sources distributions which are similar to those of the real sources. Thus anonymity of each trajectory and that of the clustered is achieved. In addition, location k-diversity is achieved by distributing fake sources around the base station. To reduce the time delay, tree rooted at the base station is constructed to overlap part of the beacon interval of the nodes in the hierarchy. Both the analytical analysis and the simulation results prove that our scheme provides perfect anonymity with improved energy overhead and time delay.

    clustered trajectories anonymity scheme (CTA), source location privacy, k-anonymity, global attackers, wireless sensor networks (WSNs)

    0 Introduction

    Recently wireless sensor networks (WSNs) are extending their applications into many areas such as health care, environmental monitoring and wild life monitoring. In these application areas source location privacy providing is critical. This is because the exposure of the location of the source node leads to the location of the sensitive object under supervision. But source location privacy providing is a challenging task especially when the attacker is a global attacker and the monitored objects are mobile. One reason is that the spatio-temporal data associated with the mobile object is rich in correlation information.

    Solutions proposed to provide source location privacy against global attacker[1,2]introduce excessive energy overhead due to network wide dummy message injection. To trade off privacy with communication cost and latency, Mehta, et al.[1]proposed source simulation. In source simulation few sensor nodes are randomly selected to simulate the mobility of the monitored object. But building and implementing the object’s mobility profile is still an open research topic[1]. Scheme proposed in Ref.[3] switch statistically strong source anonymity (SSSA) scheme in Ref.[2] to a k-anonymity scheme in Ref.[1] on demand, but mobile event monitoring which can create real trajectory is not considered. Trajectory anonymity is addressed in a distributed manner in Ref.[4] but the solution applies only for events that start at the perimeter of the network and end somewhere inside the network.

    Spatio-temporal data expose not only the movement pattern of each monitored object but also the relationship between different monitored objects and their interaction with the environment. One aspect of this is hotspot. As discussed in Ref.[5] hotspot phenomenon causes an obvious inconsistency in the network traffic pattern. This is because a large volume of packets are originating from a small area. Thus, analysis of traffic may also lead to a cluster of trajectories that expose the mobility patterns of a collection of monitored objects.

    This paper considers WSNs deployed for wild life monitoring that demand privacy but tolerate time delay in the order of few seconds. Based on this application, but not limited to it, a clustered trajectories anonymity scheme (CTA) is proposed. This scheme provides anonymity to all possible correlation information that can be deduced from the spatio-temporal data associated with event reporting such as trajectory made by monitored object or cluster of trajectories made by the collection of monitored objects. In addition, location k-diversity is achieved by selecting fake sources distributed around the base station (BS). Our scheme also satisfies that fake sources should be comparable to the real source with respect to their distances to the BS[6]. To achieve all these there is no need to know the mobility pattern and movement speed of the monitored objects as in Refs[1,4]. Instead our scheme applies isomorphic property of rotation at BS to select fake sources. To reduce energy cost dummy messages are on demand and the beacon frames at MAC layer are used to send event notification message to the BS. Time delay during event notification is reduced by constructing tree rooted at BS to overlap part of the beacon intervals of nodes in the hierarchy. The analytical analysis and the simulation results show that our scheme provides perfect source location anonymity with improved energy cost and time delay.

    1 Related work

    Several protocols to provide source location privacy have been proposed[1-7], but a solution that guarantees efficient privacy against global attackers remains hard to pin down. The threat of global adversaries is first considered by Mehta et al.[1]. The authors proposed the periodic collection and source simulation schemes. Periodic collection scheme provides maximum location privacy but the network wide dummy messages consume significant amount of sensor energy while increasing the network collisions and decreasing the packet delivery ratio. Shao, et al.[7]proposed a scheme which conveyed data to the base station only using beacon frames at the MAC layer. Since beacons are periodically broadcasted regardless of the occurrence of real events, this approach provides perfect event source unobservability at no additional energy cost. However, since the time between consecutive beacons is relatively large, the solution is impractical for nodes that have successive messages to send.

    Mehta, et al.[1]proposed a second technique called source simulation which aimed at trading off energy consumption with privacy. In this scheme the real event is hidden among k-1 fixed fake events simulating the mobility patterns of the monitored object. But randomly selecting the nodes that simulate the movement patterns of the monitored object and the constant number of fake events may leak correlation information when multiple objects are monitored. Also in applications that monitor heterogeneous objects there is a need to implement multiple models to the sensor nodes which increases complication and overhead. The solution proposed in Ref.[3] randomly selects fake sources when it switches from SSSA to k-anonymity scheme, but trajectory anonymity is not considered. The advanced form of k-anonymity scheme called l-diversity is proposed in Ref.[3]. L-diversity is used in this scheme to diversify location of fake sources in order to decrease the attacker information gain when he tries to search the object in the suspected areas. Unobservable handoff trajectory protocol is proposed in Ref.[4] to hide trajectory of events that may change frequently in a distributed environment. Even if this scheme provides solution to handoff problem for the events with the assumed movement speed, it does not provide privacy for events that start inside the network such as wild life monitoring.

    2 Problem formulation

    2.1 Network model

    Beacon-enabled IEEE 802.15.4 is proposed used in wireless sensor network platforms such as ZigBee[8]to announce node presence and exchange system parameters. Beacon interval ranges from 15.36 milliseconds to 786.432 seconds as defined in IEEE 802.15.4. The considered WSN consists of the BS and a large number of homogenous sensor nodes which are randomly deployed in an area of interest as illustrated in Fig.1. The sensor nodes are resource constrained devices with low battery power and computation capacity but equipped with sensing, data processing, and communicating components. A BS connecting to the outside infrastructure such as the Internet collects data from the network. We assume it is located at the centre of the deployment area and is resourceful. Each sensor node is assumed to know its location with Global Positioning System (GPS) or other mechanisms mentioned in Ref.[9] and share this information with the neighbouring nodes and the BS. Message between sensor node and the BS is communicated by using encryption techniques. Although key management and the packet content confidentiality are beyond the scope of this paper, we recommend[10]it for further reading.

    Fig.1 The architecture of the considered network

    2.2 Attacker model

    A global attacker that is assumed in this work can eavesdrop every packet transmission in the network, examine the encrypted packets, analyze network-wide traffic, determine traffic density on every link in the wireless sensor network and search the place where he suspects the object. However, the attacker cannot inject, modify or interrupt packet transmissions and can neither decrypt the content of captured packets.

    2.3 Problem definition

    Conventional k-anonymity schemes randomly select fake sources to provide source location privacy against global attackers. But these schemes have limitations to provide anonymity to trajectories and other correlation information from traffic analysis of spatio-temporal data collected when mobile objects are monitored. Traffic information collected from a WSN for a discrete time interval {t1, t2, …, tn} includes tuples (x1, y1, t1), (x2, y2, t2), …, (xn, yn, tn) where (xi, yi) is the location of a node that reports event occurrence and tiis the event reporting time. Analysis of these might provide the trajectory made by the monitored object defined as:

    Ti={(x1, y1, t1), (x2, y2, t2),…, (xk, yk, tk)}, where (t1

    Definition 1 (Trajectory Similarity): Two trajectories Tiand Tjare said to be similar if:

    i. for any tuple (xk, yk, tk)∈Ti, ?(xh, yh, tk)∈Tjand

    ii. for any (xk, yk, tk), (xk+1, yk+1, tk+1)∈Tiand (xh, yh, tk), (xh+1, yh+1, tk+1)∈Tj, it holds that ‖(xk, yk), (xk+1, yk+1)‖≈

    ‖(xh, yh), (xh+1, yh+1)‖

    This implies that two trajectories are similar if they are defined in the same time interval and distances travelled by the two trajectories are almost the same at each time interval.

    For a WSN applied to monitor a collection of objects, trajectory anonymity of each object to be monitored may not be enough. Because collection of trajectories can also provide correlation information such as hot spot created by group movement of the monitored objects or nature of objects to visit the same place for some purposes. Thus, distribution of the monitored objects in the monitored area needs also anonymity. This distribution is defined as cluster of trajectories.

    Definition 2 (Clustered Trajectories Similarity): A collection of trajectories TC={T0, T1,…,Tn} and TF={Tf0, Tf1,…, Tfn} are similar if

    i. ?Ti∈TC, ?Tfk∈TFsuch that Tiand Tfksatisfy trajectory similarity and

    ii. ?Th, Ti∈TC, ?TfkTfl∈TFsuch that Dist (Th, Ti)≈ Dist (Tfk, Tfl) at all corresponding points.

    Hence clustered trajectories similarity implies trajectory similarity and collection of trajectories location relationship anonymity in terms of distance between trajectories. If the real trajectories are collected in one place, the same thing will happen for fake trajectories.

    Definition 3 (Clustered Trajectories k-anonymity): A cluster of real object trajectories Tcis k-anonymous if there are k-l clusters of fake trajectories TF1, TF2,…,TF(k-1)that are similar to Tc.

    This implies clustered trajectories k-anonymity also satisfies trajectory k-anonymity. Because ?Ti∈Tc,?Tfj∈TFjwhere j=1,2,…,k-1 such that Tiis similar to Tfj.

    For an attacker that performs an onsite examination distributing the suspected nodes affects his cost of finding the source node[3]. Based on this l-diversity[3]is adopted to WSNs in order to improve location diversity of the fake sources. The idea is that suppose the network area is divided into L(L>0) partitions of almost the same size. For the total number N of the sensor nodes in the WSN, assume S denotes a set of nodes where S?N and P(S) denotes the total number of different partitions that nodes in S are from. If P(S)≥l for 0

    Definition 4 (Spatial k-diversity): A set of nodes S?N has a property of spatial k-diversity if P(S)=L=k.

    The other problem in the k-anonymity scheme is that dummy traffics are on demand for reducing energy cost. This in turn needs a message to initiate communication. In the presence of global attackers, initiating communication without scarifying anonymity, energy overhead and time delay is a challenging issue. Previous researches have only partially addressed all problems mentioned above. This has motivated us to design clustered trajectories anonymity scheme (CTA).

    3 Clustered trajectories anonymity scheme (CTA)

    In this section three phases of CTA scheme are described bootstrapping (beacon interval) phase, fake source location calculation phase, and fake source assignment and message transfer phase.

    3.1 Beacon interval

    To trade off privacy with energy efficiency, the best method is reducing the number of fake sources and initiating fake message only when there is an event to report. To make fake message generation on demand we use the beacon frame at MAC layer in beacon enabled WSN. In CTA the source node inserts event notification message that contains event id, timestamp, event location and number of messages to be sent in the beacon payload.

    In beacon enabled WSNs every node in the network has independent beacon interval and sends the beacon message at the end of this interval. This introduces cumulative delay in sending event notification to the BS. To reduce time delay we use hierarchical routing which is common in WSNs[11]. A tree rooted at the BS is constructed as shown in Fig.2. The purpose of this tree is to overlap the delay of the beacon messages for nodes in the hierarchy.

    Fig.2 Hierarchical transfer of beacon messages

    A leaf node sends beacon messages to the parent node at the end of the beacon interval. The parent node initiates a beacon message when it accepts beacon message from the child node. The parent node decrypts and processes the accepted beacon message and sends it to its parent node without additional delay. This will continue until the beacon message reaches to the BS. Thus the beacon interval for each node starts from the time it sends a beacon message until the next beacon message arrives to it which also includes part of the delay at the leaf node. To do this the BS needs only to identify the leaf nodes and assign interval on these nodes. These nodes initiate beacon messages based on their interval.

    As illustrated in Fig.3, the beacon interval starts at t0. Leaf node L sends its beacon massage at t1which is the end of the first beacon interval. Parent P1sends the beacon message only by taking time to process beacon from L, parent P2do the same after accepting the beacon from P1and finally P2sends the beacon to the BS. The process will continue with this pattern for all time intervals t1, t2…. Thus the average time delay for event notification message that is hidden in the beacon frame to reach the BS is td/2 where tdis the beacon interval. The BS calculates fake sources locations and initiates message communication at the end of each beacon interval.

    Fig.3 Beacon interval overlaps

    3.2 Fake source location calculation

    Traffic collected from WSN deployed to monitor mobile objects exposes correlation information such as the trajectory made by the monitored object and how monitored objects are distributed in the network area which may in turn lead to the current source node location. To provide real event report distribution we use isomorphism which is studied in mathematics in order to extend insights from one phenomenon to others. If two objects are isomorphic, then any property which is preserved by an isomorphism and which is true of one of the objects is also true of the other.

    The distance between the nodes that report event occurrences are the main sources of correlation information for an adversary. One example of isometric functions that preserve distance is rotation. The point (x, y) is rotated by angle β to find (x′, y′) using the following formula:

    x′=xcosβ-ysinβ, y′=xsinβ+ycosβ

    Generally rotation about a fixed point preserves distance and angle. This advantage is taken to create k-1 sets of fake reports; each set will have distances between fake sources similar to the distances between sources that report real event occurrences. Every time when the source sends event notification to BS, BS calculates the fake sources locations by rotating the source node location by angles β, 2β,…, (k-1)β. In our case β is calculated as β=360/k to diversify the k nodes around the BS. Algorithm 1 describes the details of how the BS calculates fake source locations from the real source location.

    Algorithm 1: Fake source location calculation.

    From Fig.4 for k=4 fake sources F1, F2 and F3 are located by rotating real source location R by an angle β=360/4=900, 1800, and 2700. When the new source location is R’ the new fake sources are located by the same calculation but by the coordinate of R’. Thus the distance RR’ is maintained by the fake sources distances F1F1’, F2F2’ and F3F3’.

    Fig.4 Locating fake sources around the BS

    3.3 Fake sources assignment and message transfer

    Calculating location of fake sources based on Algorithm 1 provides ideal location. That is, there may not be a sensor node at the calculated location. In this case BS selects nodes that are closer to the calculated points as fake sources, and then it broadcasts the fake sources assignment message by introducing the real source location. Following this the fake and real sources start to generate messages at the same pattern. In the case when BS accepts event notification from a large number of source nodes, it schedules the fake assignment or drops the old event notification message if more than one source node detects the same event. This contributes to the reduction of energy consumption.

    3.4 Discussion

    Random location of BS: for BS located randomly in WSN we can apply translation instead of rotation to select fake sources which also has isomorphic property to preserve distance.

    Non-beacon enabled WSNs: In this type of WSN it is possible to make every node to generate fake event notification messages at the beacon interval to provide un-observablity to the source with real event notification. To minimize energy cost, message size at this interval can be smaller than the size of the event reporting message in this interval.

    4 Analysis of the scheme

    4.1 Analytical analysis

    4.1.1 Privacy analysis

    Theorem 1: CTA satisfies clustered trajectories k-anonymity property.

    Proof: To prove that CTA satisfies clustered trajectories k-anonymity, first we have to show that CTA satisfies trajectory similarity and Ti={(x0, y0, t0), (x1, y1, t1),…,(xn, yn, tn)} is a real trajectory of the monitored object analyzed from the traffic collected at discrete time intervals {t0, t1,…,tn} where (t1

    To show the distance travelled by the fake trajectory (D′) at any point is the same as the real trajectory distance (D), suppose (xi, yi) and (xj, yj) are random locations of nodes that report real event occurrences at time tiand tj, distance D between (xi, yi) and (xj, yj) is

    公司產(chǎn)品的價(jià)格制定,一定要充分考慮收益、利潤(rùn)及價(jià)格與企業(yè)長(zhǎng)期發(fā)展的關(guān)系等因素。隨著紡織原材料價(jià)格的不斷增長(zhǎng),勞動(dòng)力成本的水漲船高,南通鵬越紡織有限公司一定要明確定價(jià)目標(biāo),創(chuàng)新定價(jià)方法,優(yōu)化定價(jià)策略。

    (1)

    Distance D′ after rotation of (xi, yi) and (xj, yj) at an angle j×β where 0

    This implies D=D′ when there is a deviation of the actual fake source location from the calculated

    D≈D′

    (2)

    Because of the dense deployment of WSN, this deviation is insignificant to differentiate the fake trajectory from the real one. Thus from Eqs(1,2) CTA satisfies trajectory similarity. And since a single source node location is rotated by angles β, 2β,…, (k-1)β, K-1 fake trajectories exist for each real trajectory, which implies CTA satisfies trajectory k-anonymity. Also for each real trajectory in trajectory set {T0, T1,…,Tn} which are analyzed from the traffic collected, it is possible to find k-1 collections of fake trajectories. When we categorize the fake trajectories by the angles of rotation we will find k-1 cluster of trajectories {C1, C2,…,Ck-1). C1contains a cluster of trajectories found by rotating points in T0, T1, …, Tnby an angle β, C2by an angle 2β,… and Ck-1by an angle (k-1)β. Thus ?Th, Ti∈{T0, T1,…,Tn}, ?Tjl, Tkl∈Clwhere l=1,2,…, k-1 such that Dist (Th, Ti)≈Dist (Tjl, Tkl). Therefore it is concluded that CTA satisfies clustered trajectories k-anonymity.

    Theorem 2: CTA satisfies the property of location k-diversity.

    4.1.2 Time delay analysis

    The time delay of CTA for sending messages is the same with that of the dynamic source anonymity after the fake sources are selected. However when the time it takes to send an event occurrence message to BS for fake source request, each node has its independent beacon interval: t=(td/2+ts)h, where h is the maximum number of hops from the BS, tsis the time to send event notification message and td/2 is the average time delay of a beacon message on each node that participates in forwarding the beacon message. But in CTA, beacon intervals overlap so that t=td/2 which is independent of h and ts. In case of dynamic source anonymity the time delay for sending fake request is t=(ts+tsd)h+tw, where tsdis the shortest on each sensor node, h is the number of hops from source to the BS and twis the waiting time at BS before it broadcasts the fake source assignment message.

    4.1.3 Energy overhead

    The energy overhead for dynamic source anonymity scheme when a single source node reports event related information is: ET=Ed+knEm, where Edis the average energy cost of sending event notification message, k is the total number of nodes that participate in sending messages at the same time interval, n is the total number of messages sent by each node, and Emis the average cost of sending a single message from source to BS. But since beacon messages have no energy overhead for CTA, ET= knEm.

    4.2 Simulation results

    A discrete simulator has been built up to evaluate the performance and security of our scheme using TinyOS. 1,000 sensor nodes are randomly deployed in a round area network with a diameter of 50. The transmission range is set to 1. The base station is located at the centre of the network. The network has one hot spot that is randomly located and fixed during each simulation run to show the hot spot created due to different objects that visit the area from different directions. In our simulation 10 objects visit the hot spot area repeatedly.

    4.2.1 Privacy analysis

    The false positive hot spot detection ratio of the attacker is compared when random selection and CTA scheme are applied. The attacker first performs rate monitoring to detect the most visited area and then studies the trajectory around the detected hot spot area to determine whether it is the real hot spot area or a fake one. In random selection, fake sources may or may not form the hot spot areas as randomly selecting fake sources which are distributed throughout the network. Even when fake sources form hot spots by chance there may not form a pattern of movement that resemble the real event movement around the hot spot. But in case of CTA isomorphic property of rotation copies any pattern observed by the real event report on fake reports.

    As it can be seen from Fig.5, when the number of traffic collected for analysis increases, the probability of detecting false hot spots increases. This is because hot spot is created when there is large volume of data in the network. When we compare the false positive hot spot detection ratio of our scheme with random selection, our scheme gives 90% of the time hot spot that is false positive for k=10. This is because there are exactly 9 false hot spots for a single hot spot which provides exact k-anonymity. But random selection of fake sources ends up in 50% probability of detecting false positive hot spot. Generaly, when we see the number of hot spots detected for different values of k, in the proposed scheme k hot spots are detected as we can see from Fig.6, which implies the probability of detecting the real hot spot is 1/k. But the number of hot spots detected in random selection is always less than k as indicated in Fig.6 and hence there is a chance to detect the real hot spot only.

    Fig.5 False positive hot spot detection ratio for k=10

    4.2.2 Time delay

    We compare the time delay for sending event notification in the case of Dynamic SSSA, CTA without beacon interval overlaps, and CTA. Dynamic SSSA has less time delay when there is less frequent fake request from the source node. But when the number of fake requests increases, the attacker may detect a consecutive short time delay which in turn implies that there are real event notifications. Thus, time delay increases for providing source location privacy. CTA without beacon interval overlap has a large time delay because each node has independent beacon interval and consequently cumulative delay is introduced for the event notification to arrive at BS. But the time delay decreases with significant amount when the beacon intervals overlap as we can see from Fig.7.

    Fig.6 Hot spots detected for different values of k

    Fig.7 Time delay comparison

    4.2.3 Energy consumption

    To send the same amount of message within a given time T, SSSA consumes more energy due to network wise dummy message injection. Dynamic SSSA reduces the energy cost by extending the delay of network wise dummy message injection. CTA consumes the least energy as fake request is sent within the beacon frames at MAC layer which have no energy overhead. Fig.8 shows this clearly.

    5 Conclusion

    This study proposes a scheme that provides perfect k-anonymity to the source that reports event occurrence in mobile events monitoring application against a global attacker. The analytical analysis and the simulation results show that our scheme is efficient and effective in providing the desired anonymity.

    Fig.8 Energy overhead

    [ 1] Mehta K, Liu D, Wright M. Location privacy in sensor networks against a global eavesdropper. In: Proceedings of the IEEE International Conference on Network Protocols, Beijing, China, 2007. 314-323

    [ 2] Shao M, Yang Y, Zhu S C, et al. Towards statistically strong source anonymity for sensor networks. In: Proceedings of the 27th IEEE Communications Society Conference on Computer Communications, Phoenix, USA, 2008. 466-474

    [ 3] Yang Y, Zhu S C, Cao G H, et al. An active global attack model for sensor source location privacy: analysis and countermeasures. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, 2009, 19:373-393

    [ 4] Ortolani S, Conti M, Crispo B, et al. Events privacy in WSNs: A new model and its application. In: Proceedings of the IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, Lucca, Italy, 2011. 1-9

    [ 5] Mahmoud M, Shen X M. A cloud-based scheme for protecting source-location privacy against hotspot-locating attack in wireless sensor Networks. IEEE Transactions on Parallel and Distributed Systems, 2012, 23(10):1805-1818

    [ 6] Kamat P, Zhang Y Y, Trappe W, et al. Enhancing source-location privacy in sensor network routing. In: Proceedings of the 25th IEEE international Conference on Distributed Computing Systems, Columbus, USA, 2005.599-608

    [ 7] Shao M, Hu W H, Zhu S C, et al. Cross-layer enhanced source location privacy in sensor networks. In: Proceedings of the 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, Rome, Italy, 2009. 1-9

    [ 8] Li Z. ZigBee wireless sensor network in industrial applications. In: Proceedings of the 2006 SICE-ICASE International Joint Conference,Busan,Korea,2006.1067-1070

    [ 9] Avinash K, Sonu A. Location detection in wireless sensor network using classical optimization methodology. International Journal of Computer Science and Technology, 2012, 3(1):685-688

    [10] Zhao J. Research on key predistribution scheme of wireless sensor networks. In: Proceedings of the 5th International Conference on Intelligent Computation Technology and Automation, Zhangjiajie, China, 2012. 287-290

    [11] Iwanicki K, Van S M. On hierarchical routing in wireless sensor networks. In: Proceedings of the International Conference on Information Processing in Sensor Networks, San Francisco, USA, 2009. 133-144

    Seble Hailu Dady, born in 1976. She is Ph.D student in University of Electronic Science and Technology of China. She received B.Ed in Mathematics from Haramay University in 2000, B.Sc and M.S degree in Computer Science from Addis Ababa University in 2004 and 2008 respectively. Her research interest mainly focuses on privacy and security in wireless sensor networks and related applications.

    10.3772/j.issn.1006-6748.2015.02.004

    ①Supported by the National Natural Science Foundation of China (No. 60903157), the Fundamental Research funds for the Central Universities of China (No. ZYGX2011J066) and the Sichuan Science and Technology Support Project (No. 2013GZ0022).

    ②To whom correspondence should be addressed. E-mail: wangjh@uestc.edu.cn Received on Feb. 5, 2014, Qin Zhiguang, Yang Fan

    猜你喜歡
    充分考慮南通原材料
    水利工程原材料質(zhì)量檢測(cè)控制探討
    藍(lán)印花布:南通獨(dú)具特色的非遺傳承
    非遺南通
    南通職業(yè)
    觀點(diǎn)
    知識(shí)無(wú)窮盡
    意林(2019年16期)2019-09-04 21:00:12
    南通中船機(jī)械制造有限公司
    應(yīng)充分考慮醫(yī)院管理的復(fù)雜性
    含有字母的不等式(組)
    原版亦或重生
    汽車之友(2015年6期)2015-03-18 05:15:08
    欧美xxⅹ黑人| 亚洲成人免费电影在线观看| 最近最新免费中文字幕在线| 美女中出高潮动态图| 一级毛片女人18水好多| av网站免费在线观看视频| 午夜激情av网站| 色婷婷av一区二区三区视频| 国产成人系列免费观看| 久久久精品94久久精品| 精品免费久久久久久久清纯 | 99国产综合亚洲精品| 欧美在线黄色| 亚洲精品第二区| 免费一级毛片在线播放高清视频 | 国产成+人综合+亚洲专区| 亚洲综合色网址| 久久精品国产亚洲av高清一级| 热99久久久久精品小说推荐| 12—13女人毛片做爰片一| 亚洲色图综合在线观看| 精品一区二区三区四区五区乱码| 日本a在线网址| 中文字幕人妻丝袜一区二区| 国产亚洲一区二区精品| 美国免费a级毛片| 久久热在线av| 欧美中文综合在线视频| 热99re8久久精品国产| 69av精品久久久久久 | 美女视频免费永久观看网站| 国产av国产精品国产| 精品欧美一区二区三区在线| 国产极品粉嫩免费观看在线| 高清黄色对白视频在线免费看| 亚洲成av片中文字幕在线观看| 乱人伦中国视频| 亚洲国产欧美日韩在线播放| 九色亚洲精品在线播放| 超碰成人久久| 午夜日韩欧美国产| 国产日韩一区二区三区精品不卡| 免费av中文字幕在线| 青春草亚洲视频在线观看| 亚洲 欧美一区二区三区| √禁漫天堂资源中文www| av片东京热男人的天堂| 久久香蕉激情| 国产精品偷伦视频观看了| 国产精品久久久久久人妻精品电影 | av在线老鸭窝| 建设人人有责人人尽责人人享有的| 黑人操中国人逼视频| 人人澡人人妻人| 欧美国产精品一级二级三级| 精品一区二区三区四区五区乱码| 亚洲熟女精品中文字幕| 大香蕉久久网| 男女床上黄色一级片免费看| 国产av一区二区精品久久| 午夜影院在线不卡| 人人妻,人人澡人人爽秒播| 国产深夜福利视频在线观看| 日韩中文字幕欧美一区二区| 亚洲专区国产一区二区| 女性被躁到高潮视频| 午夜日韩欧美国产| 亚洲欧美一区二区三区久久| 中文字幕av电影在线播放| 色视频在线一区二区三区| 国产97色在线日韩免费| 久久久国产成人免费| 欧美日韩成人在线一区二区| 这个男人来自地球电影免费观看| 俄罗斯特黄特色一大片| 中文字幕人妻丝袜一区二区| 深夜精品福利| 美女高潮喷水抽搐中文字幕| 美女高潮喷水抽搐中文字幕| 久久av网站| 免费在线观看完整版高清| 国产不卡av网站在线观看| 久久精品aⅴ一区二区三区四区| 老熟女久久久| 亚洲全国av大片| 中文字幕制服av| 丰满饥渴人妻一区二区三| 丝袜脚勾引网站| a级毛片黄视频| 久久影院123| 十分钟在线观看高清视频www| 亚洲精品自拍成人| 国产伦人伦偷精品视频| 一个人免费在线观看的高清视频 | 大型av网站在线播放| 天堂中文最新版在线下载| 在线看a的网站| 交换朋友夫妻互换小说| 亚洲九九香蕉| 日韩欧美免费精品| 国内毛片毛片毛片毛片毛片| 狠狠婷婷综合久久久久久88av| 91av网站免费观看| 亚洲欧美一区二区三区黑人| av网站免费在线观看视频| 狠狠婷婷综合久久久久久88av| 香蕉丝袜av| 亚洲av欧美aⅴ国产| 美女大奶头黄色视频| 国产色视频综合| 亚洲色图 男人天堂 中文字幕| 视频区图区小说| 欧美日韩一级在线毛片| bbb黄色大片| 丝袜人妻中文字幕| 老鸭窝网址在线观看| 最近最新中文字幕大全免费视频| 男女下面插进去视频免费观看| 亚洲精华国产精华精| 黑人巨大精品欧美一区二区mp4| 脱女人内裤的视频| 国精品久久久久久国模美| 美国免费a级毛片| 欧美日韩精品网址| 曰老女人黄片| 日韩一区二区三区影片| 欧美精品亚洲一区二区| 9热在线视频观看99| 国产亚洲一区二区精品| 国产日韩欧美视频二区| 国产精品熟女久久久久浪| 久久精品亚洲熟妇少妇任你| 国产精品熟女久久久久浪| 一区二区三区乱码不卡18| 中文字幕精品免费在线观看视频| 美国免费a级毛片| 下体分泌物呈黄色| 久久精品亚洲熟妇少妇任你| netflix在线观看网站| 在线观看免费高清a一片| 亚洲欧美清纯卡通| 秋霞在线观看毛片| 丰满饥渴人妻一区二区三| 少妇 在线观看| 中文字幕制服av| 巨乳人妻的诱惑在线观看| 欧美变态另类bdsm刘玥| 亚洲国产精品999| 岛国毛片在线播放| 免费观看av网站的网址| 十八禁人妻一区二区| 黄片大片在线免费观看| 一区二区三区精品91| 99精品久久久久人妻精品| 夜夜夜夜夜久久久久| 成人影院久久| 久久热在线av| 精品国产国语对白av| 国产亚洲精品一区二区www | 精品久久久久久久毛片微露脸 | 最新在线观看一区二区三区| 色婷婷av一区二区三区视频| 亚洲成国产人片在线观看| 欧美大码av| 黄色毛片三级朝国网站| 一区二区三区乱码不卡18| 一本久久精品| 一级毛片女人18水好多| 中文字幕av电影在线播放| 国产成人精品久久二区二区免费| 91精品伊人久久大香线蕉| 欧美日韩国产mv在线观看视频| av不卡在线播放| 亚洲欧美精品综合一区二区三区| av免费在线观看网站| 韩国高清视频一区二区三区| 超碰97精品在线观看| 精品亚洲乱码少妇综合久久| 国产免费av片在线观看野外av| 久久亚洲精品不卡| 国产一区二区激情短视频 | 亚洲成国产人片在线观看| 婷婷丁香在线五月| 亚洲精品国产色婷婷电影| 国产成人精品久久二区二区免费| 免费在线观看视频国产中文字幕亚洲 | 无限看片的www在线观看| 王馨瑶露胸无遮挡在线观看| 免费日韩欧美在线观看| 99久久综合免费| 国产亚洲精品一区二区www | 亚洲人成77777在线视频| 天天添夜夜摸| 亚洲精品中文字幕一二三四区 | 国产伦人伦偷精品视频| 伊人亚洲综合成人网| 成人手机av| 最黄视频免费看| 制服诱惑二区| av又黄又爽大尺度在线免费看| 成人影院久久| 在线观看舔阴道视频| 久久久久网色| 久久人人爽人人片av| 999久久久国产精品视频| 日韩精品免费视频一区二区三区| 免费在线观看完整版高清| 国产男女超爽视频在线观看| 亚洲人成电影观看| 两人在一起打扑克的视频| 国产成人啪精品午夜网站| 国产成人免费无遮挡视频| 热re99久久国产66热| 久久精品亚洲熟妇少妇任你| 久久久精品区二区三区| 国产精品久久久av美女十八| www.999成人在线观看| 69av精品久久久久久 | 久久久久国内视频| 99热网站在线观看| 国产高清国产精品国产三级| 黄色毛片三级朝国网站| 久久人人爽人人片av| 国产在线一区二区三区精| 久久精品aⅴ一区二区三区四区| 日韩视频一区二区在线观看| 亚洲国产精品一区二区三区在线| 精品熟女少妇八av免费久了| 国产男人的电影天堂91| 久久久久久久精品精品| 国产精品免费视频内射| 嫩草影视91久久| 日韩电影二区| 91成年电影在线观看| 在线观看免费日韩欧美大片| √禁漫天堂资源中文www| 久久久久久久久免费视频了| av不卡在线播放| 老汉色∧v一级毛片| 在线观看人妻少妇| 久久亚洲国产成人精品v| 90打野战视频偷拍视频| 嫁个100分男人电影在线观看| 久久这里只有精品19| 国产亚洲欧美精品永久| 精品国产乱码久久久久久小说| 欧美黄色淫秽网站| 免费一级毛片在线播放高清视频 | 国产亚洲欧美在线一区二区| 永久免费av网站大全| 狠狠婷婷综合久久久久久88av| 久久久久久久大尺度免费视频| 午夜福利在线免费观看网站| 亚洲激情五月婷婷啪啪| 欧美日韩国产mv在线观看视频| 桃花免费在线播放| 国产精品 欧美亚洲| 日韩 亚洲 欧美在线| 在线观看人妻少妇| 女性生殖器流出的白浆| 亚洲美女黄色视频免费看| av一本久久久久| a级毛片黄视频| 国产在线观看jvid| 黄色视频不卡| 欧美日韩视频精品一区| 两个人看的免费小视频| 丝袜脚勾引网站| h视频一区二区三区| 狠狠婷婷综合久久久久久88av| 国产成人一区二区三区免费视频网站| 国产片内射在线| 美女国产高潮福利片在线看| 自线自在国产av| 国产亚洲欧美在线一区二区| 亚洲精品一区蜜桃| 欧美日韩中文字幕国产精品一区二区三区 | 视频在线观看一区二区三区| 老司机午夜福利在线观看视频 | 精品熟女少妇八av免费久了| 人人妻人人添人人爽欧美一区卜| 国产精品一二三区在线看| 80岁老熟妇乱子伦牲交| 男女免费视频国产| 十分钟在线观看高清视频www| 午夜91福利影院| 人人妻,人人澡人人爽秒播| 五月开心婷婷网| 国产国语露脸激情在线看| 色视频在线一区二区三区| 热re99久久精品国产66热6| 国产免费av片在线观看野外av| 亚洲一码二码三码区别大吗| 欧美黄色淫秽网站| 色播在线永久视频| 精品人妻1区二区| 精品久久久久久久毛片微露脸 | 高清在线国产一区| 免费在线观看日本一区| 国产亚洲精品一区二区www | 高清黄色对白视频在线免费看| 热99re8久久精品国产| 国产成人免费无遮挡视频| 男人舔女人的私密视频| 黄色视频不卡| 久久久国产成人免费| 国产一区二区 视频在线| 丝袜脚勾引网站| 国产精品香港三级国产av潘金莲| 免费女性裸体啪啪无遮挡网站| 精品久久久久久电影网| 免费一级毛片在线播放高清视频 | 超色免费av| 在线av久久热| 免费一级毛片在线播放高清视频 | 欧美精品一区二区大全| av片东京热男人的天堂| 黄片播放在线免费| 一区二区三区激情视频| 国产日韩欧美在线精品| 俄罗斯特黄特色一大片| 日韩制服骚丝袜av| 午夜福利影视在线免费观看| 丰满饥渴人妻一区二区三| 日韩欧美一区二区三区在线观看 | 久久精品成人免费网站| 国产成人啪精品午夜网站| 亚洲国产精品成人久久小说| 少妇精品久久久久久久| 天堂中文最新版在线下载| 久久久久视频综合| 后天国语完整版免费观看| svipshipincom国产片| 成年人午夜在线观看视频| 精品人妻一区二区三区麻豆| 老司机影院毛片| 中文字幕色久视频| 国产精品1区2区在线观看. | 精品久久久久久久毛片微露脸 | 多毛熟女@视频| 成年人午夜在线观看视频| 国产一卡二卡三卡精品| 制服诱惑二区| 精品国产乱子伦一区二区三区 | 免费观看人在逋| 91麻豆av在线| 欧美日韩av久久| 国产精品久久久人人做人人爽| 国产有黄有色有爽视频| 操美女的视频在线观看| 无限看片的www在线观看| 少妇被粗大的猛进出69影院| 亚洲激情五月婷婷啪啪| 天堂8中文在线网| 亚洲av成人不卡在线观看播放网 | e午夜精品久久久久久久| 在线观看舔阴道视频| 免费在线观看影片大全网站| 亚洲人成电影观看| 欧美中文综合在线视频| 欧美日韩av久久| 青春草视频在线免费观看| 汤姆久久久久久久影院中文字幕| 亚洲综合色网址| 狂野欧美激情性bbbbbb| 国产淫语在线视频| 国产成人影院久久av| 日日爽夜夜爽网站| 久久国产精品男人的天堂亚洲| 欧美日韩成人在线一区二区| 中文字幕av电影在线播放| 狠狠精品人妻久久久久久综合| 性高湖久久久久久久久免费观看| 日韩大片免费观看网站| 亚洲一区中文字幕在线| 人妻一区二区av| 亚洲人成电影免费在线| 无限看片的www在线观看| 日韩视频在线欧美| 这个男人来自地球电影免费观看| 最近最新免费中文字幕在线| 久久免费观看电影| 黄片播放在线免费| 女人高潮潮喷娇喘18禁视频| 美女大奶头黄色视频| av一本久久久久| 动漫黄色视频在线观看| 亚洲中文av在线| 欧美一级毛片孕妇| 天堂俺去俺来也www色官网| 在线精品无人区一区二区三| 欧美日韩一级在线毛片| 国产在视频线精品| 国产不卡av网站在线观看| 男人操女人黄网站| 一本久久精品| 80岁老熟妇乱子伦牲交| 在线观看免费午夜福利视频| 久久久久久久久免费视频了| 每晚都被弄得嗷嗷叫到高潮| 丝袜美腿诱惑在线| 国产精品欧美亚洲77777| 国产精品久久久久久精品古装| 欧美日韩中文字幕国产精品一区二区三区 | 中文欧美无线码| 国产免费视频播放在线视频| 九色亚洲精品在线播放| 少妇被粗大的猛进出69影院| 日本黄色日本黄色录像| av片东京热男人的天堂| 91精品国产国语对白视频| 亚洲全国av大片| 高清黄色对白视频在线免费看| 99久久国产精品久久久| 午夜福利视频精品| 12—13女人毛片做爰片一| 成人亚洲精品一区在线观看| 久久久国产成人免费| 国产成人啪精品午夜网站| 色老头精品视频在线观看| 久久天堂一区二区三区四区| 电影成人av| 国产精品一区二区在线不卡| 国产视频一区二区在线看| 国产又爽黄色视频| 成年美女黄网站色视频大全免费| 桃花免费在线播放| 国产av国产精品国产| 亚洲国产毛片av蜜桃av| 欧美日韩亚洲综合一区二区三区_| 免费在线观看黄色视频的| av在线播放精品| 丝袜在线中文字幕| 欧美激情高清一区二区三区| 两人在一起打扑克的视频| netflix在线观看网站| 午夜视频精品福利| 亚洲七黄色美女视频| 精品高清国产在线一区| 精品少妇一区二区三区视频日本电影| 国产亚洲欧美在线一区二区| 国产精品 欧美亚洲| 成人国产一区最新在线观看| 在线天堂中文资源库| 欧美日韩福利视频一区二区| 99久久99久久久精品蜜桃| 国产不卡av网站在线观看| 亚洲五月婷婷丁香| 午夜福利视频精品| 一个人免费看片子| 欧美精品一区二区免费开放| 国产免费视频播放在线视频| 在线观看人妻少妇| 亚洲一区二区三区欧美精品| 在线观看舔阴道视频| 一区福利在线观看| 欧美亚洲 丝袜 人妻 在线| 夜夜夜夜夜久久久久| 婷婷成人精品国产| 久久免费观看电影| 久久精品亚洲熟妇少妇任你| 一本一本久久a久久精品综合妖精| 日本撒尿小便嘘嘘汇集6| 久久久精品区二区三区| 久久久国产精品麻豆| 国产精品欧美亚洲77777| 91字幕亚洲| 亚洲七黄色美女视频| 亚洲精品av麻豆狂野| 国产av一区二区精品久久| 日韩一卡2卡3卡4卡2021年| 久热爱精品视频在线9| 午夜福利在线免费观看网站| 午夜免费鲁丝| 免费日韩欧美在线观看| 亚洲精品美女久久久久99蜜臀| 一本—道久久a久久精品蜜桃钙片| 超碰97精品在线观看| 亚洲欧美一区二区三区黑人| 国产片内射在线| 自线自在国产av| 国内毛片毛片毛片毛片毛片| 一级片'在线观看视频| 男人爽女人下面视频在线观看| 极品少妇高潮喷水抽搐| 国产免费福利视频在线观看| 国产精品秋霞免费鲁丝片| 亚洲av成人一区二区三| 精品人妻1区二区| 国内毛片毛片毛片毛片毛片| 在线av久久热| 国产精品久久久久成人av| 一区二区日韩欧美中文字幕| 男女边摸边吃奶| 在线观看免费高清a一片| 精品人妻一区二区三区麻豆| 精品免费久久久久久久清纯 | 国产不卡av网站在线观看| 精品免费久久久久久久清纯 | 国产成人免费无遮挡视频| 亚洲国产欧美日韩在线播放| 精品久久久久久久毛片微露脸 | 久久这里只有精品19| 欧美精品啪啪一区二区三区 | 国产真人三级小视频在线观看| 中国美女看黄片| 91精品伊人久久大香线蕉| 一级a爱视频在线免费观看| 亚洲,欧美精品.| 成年人黄色毛片网站| 王馨瑶露胸无遮挡在线观看| 国产淫语在线视频| 久久天躁狠狠躁夜夜2o2o| 中国国产av一级| 在线观看www视频免费| 国产一区二区三区在线臀色熟女 | 久久毛片免费看一区二区三区| 如日韩欧美国产精品一区二区三区| 亚洲欧美一区二区三区久久| 亚洲视频免费观看视频| 极品人妻少妇av视频| 午夜91福利影院| 999久久久精品免费观看国产| 午夜福利免费观看在线| 两个人看的免费小视频| 国产xxxxx性猛交| 国产欧美日韩一区二区精品| 高清欧美精品videossex| 欧美黑人欧美精品刺激| 香蕉国产在线看| 两性午夜刺激爽爽歪歪视频在线观看 | av一本久久久久| 人人妻,人人澡人人爽秒播| 麻豆av在线久日| 无限看片的www在线观看| 天天影视国产精品| 两人在一起打扑克的视频| 亚洲五月色婷婷综合| 免费观看av网站的网址| 91老司机精品| h视频一区二区三区| 日韩制服骚丝袜av| 动漫黄色视频在线观看| 成人免费观看视频高清| 午夜成年电影在线免费观看| 久久国产精品男人的天堂亚洲| 国产精品秋霞免费鲁丝片| 激情视频va一区二区三区| 亚洲精品中文字幕一二三四区 | 精品免费久久久久久久清纯 | 久久久久网色| 97精品久久久久久久久久精品| 日本91视频免费播放| 中文字幕人妻熟女乱码| 在线十欧美十亚洲十日本专区| 午夜免费观看性视频| 人人妻人人澡人人看| 又黄又粗又硬又大视频| 国产日韩欧美亚洲二区| 久久中文字幕一级| 国产精品99久久99久久久不卡| 欧美精品高潮呻吟av久久| 亚洲精品中文字幕一二三四区 | 狂野欧美激情性xxxx| 国产精品国产三级国产专区5o| 狠狠狠狠99中文字幕| 亚洲中文日韩欧美视频| 亚洲精品一二三| 老司机午夜十八禁免费视频| 超碰成人久久| 亚洲精品粉嫩美女一区| 中文精品一卡2卡3卡4更新| 久久人人97超碰香蕉20202| 亚洲美女黄色视频免费看| 国产亚洲av高清不卡| 亚洲性夜色夜夜综合| 国产精品一区二区免费欧美 | 又大又爽又粗| 国产成+人综合+亚洲专区| 在线天堂中文资源库| 欧美精品av麻豆av| 国产精品久久久久久精品古装| 久久99一区二区三区| 搡老熟女国产l中国老女人| 欧美精品高潮呻吟av久久| 国产精品秋霞免费鲁丝片| 天堂俺去俺来也www色官网| 欧美性长视频在线观看| 国产精品自产拍在线观看55亚洲 | 啦啦啦中文免费视频观看日本| tube8黄色片| 色婷婷av一区二区三区视频| 少妇粗大呻吟视频| 欧美xxⅹ黑人| 午夜日韩欧美国产| 久久精品人人爽人人爽视色| 天堂8中文在线网| 日韩欧美一区二区三区在线观看 | 少妇精品久久久久久久| 国产成人一区二区三区免费视频网站| 精品亚洲乱码少妇综合久久| 久9热在线精品视频| 一二三四在线观看免费中文在| 国产成人精品久久二区二区91| 国产av国产精品国产| 人妻一区二区av| 丰满人妻熟妇乱又伦精品不卡| 三上悠亚av全集在线观看| 中文欧美无线码| 侵犯人妻中文字幕一二三四区| 亚洲av欧美aⅴ国产| 一区二区三区乱码不卡18| 国产精品九九99| 啦啦啦中文免费视频观看日本| 久久久欧美国产精品|