期刊文献+

基于幻影路由的源位置隐私保护研究

Research on Phantom Routing to Provide Source-Location Privacy in Wireless Sensor Network
下载PDF
导出
摘要 无线传感器网络(WSN)的安全问题不容忽视,其中的源位置隐私问题已经成为制约WSN大规模应用的关键因素。文章针对源位置隐私保护问题,分析了WSN源位置面临的隐私威胁,研究总结了几种典型的基于幻影路由的源位置隐私保护策略。最后,提出了需要进一步研究的问题。 The security problem in wireless sensor networks (WSN) cannot be ignored. One of the looming challenges that threaten the successful deployment of wireless sensor networks is source-location privacy. First, the security threats about the source-location pdvacy in wireless sensor networks are analyzed. Then, several typical phantom routings which provide source-location privacy are researched. Finally, some problems needed to study further are pointed out.
出处 《信息安全与技术》 2012年第10期72-76,79,共6页
关键词 无线传感器网络 源位置隐私 幻影路由 wireless sensor networks source-location privacy phantom routing
  • 相关文献

参考文献16

  • 1孙利民;李建中.无线传感器网络[M]北京:清华大学出版社,2005.
  • 2BABAR S,STANGO A,PRASAD N. Proposed embedded security framework for Internet of Things (IoT)[A].2011.1-5.
  • 3MEHTA K,LIU D,WRIGHT M. Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper[J].IEEE Transactions on Mobile Computing,2011,(99):1-18.
  • 4P.Th.Eugster,R.Guerraoui,S.B.Handurukande,P.Kouznetsov,A.-M.Kermarrec. Lightweight probabilistic broadcast[J].ACM Transactions on Computer Systems,2003,(04):341-374.
  • 5B.Karp,H.T.Kung. GPSR:greedy perimeter stateless routing for wireless networks[A].2000.
  • 6D.Niculescu,B.Nath. Trajectory Based Forwarding and its Applications[A].2003.272.
  • 7OZTURK C,ZHANG Y,TRAPPE W. Source-location privacy in energy-constrained sensor network routing[A].2004.88-93.
  • 8Yong,X,L.Schwiebert. Preserving source location privacy in monitoring-based wireless sensor networks[A].
  • 9M.Shao,Y.Yang,S.Zhn,G.Cao. Towards Statistically Strong Source Anonymity for Sensor Networks[A].IEEE,2008.51-55.
  • 10Yi Ou-yang,Le Zheng-yi,Chen Guan-ling. Entrapping adversaries for source protection in sensor networks[A].IEEE,NW Washington,2006.23-34.

二级参考文献27

  • 1崔莉,鞠海玲,苗勇,李天璞,刘巍,赵泽.无线传感器网络研究进展[J].计算机研究与发展,2005,42(1):163-174. 被引量:730
  • 2Deng Jing, Hanan R, Mishra S.Countermeasures againsttraffic analysis attacks in wireless sensor networks[C]//First International Conference on Security and Privacy for Emerging Areas in Communications Network, IEEE, Athens, Greece, 2005 : 113-126.
  • 3Braginsky D,Estrin D.Rumor routing algorithm for sensor net2 works[C]//Proc of First Workshop on Sensor Networks and Applications, Atlanta,2002: 22-31.
  • 4Xi Yong,Schwiebfrt L,Shi Wei-song.Preserving source location privacy in monitoring-based wireless sensor networks[C]//Proceedings of 20th International Parallel and Distributed Processing Symposium.IEEE, Piscataway, N J, USA, 2006
  • 5Trappe W, Washington L C.Introduction to cryptography with coding theory[M].[S.l.]:Prentice Hall,2002.
  • 6Kamat P,Zhang Yang,Trappe W,et al.Enhancing source-location privacy in sensor network routing[C]//ICDCS'05:Proceedings of the 25th International Conference on Distributed Computing Systems, 2005:599-608.
  • 7Yi Ou-yang,Le Zheng-yi,Chen Guan-ling,et al.Entrapping adversaries for source protection in sensor networks[C]//Proceedings of the 2006 International Symposium on World of Wireless,Mobile and Multimedia Networks,IEEE,NW W.ashington,2006:23-34.
  • 8Shao M,Zhu S,Zhang W,Cao G.pDCS:Security and privacy support for data-centric sensor networks//Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM).Alaska,USA,2007:1298-1306.
  • 9Joseph M,Choudhury R R.Hiding stars with fireworks location privacy through camouflage//Proceedings of the ACM Special Interest Group on Mobility of Systems,Users,Data and Computing (SIGMOBILE).Beijing,China,2009:345-356.
  • 10Hoh B,Gruteser M,Xiong H,Alrabady A.Enhancing security and privacy in traffic-monitoring systems.IEEE Pervasive Computing,2006,5(4):38-46.

共引文献54

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部