期刊文献+

无线传感器网络隐私保护方法 被引量:4

A Privacy Preserving Method in WSN
下载PDF
导出
摘要 如何保护隐私信息在无线传感器网络的应用过程中不被泄露,同时能得到较为准确的结果,是无线传感器网络面临的重大挑战。近年来国内外学者对无线传感器网络的隐私保护技术进行了很多研究,本文从位置隐私保护和数据隐私保护两方面,总结了现有的隐私保护方法,分析了其基本原理和特点。针对现有方法的不足,本文提出了一种能同时保护位置隐私和数据隐私的隐私保护方法,该方法基于多节点幻影路由技术和椭圆曲线同态加密技术。与现有技术相比,该方法具有更好的隐私保护性和更低的能量消耗性。 A great challenge to wireless sensor network (WSN) is how to protect privacy from disclosing during application in WSN as well as obtain accurate results. In recent years, researchers at home and abroad have done much work on privacy preserving in WSN. This paper surveyed the general privacy preserving methods from two aspects of location privacy and data privacy in WSN and analyzed their theories and characteristics. A new method based on multi-notes phantom routing protocols and ECC homomorphic encryption was proposed, which could protect location privacy and data privacy at the same time. Compared to current methods, better privacy will be protected and less energy will be consumed.
作者 钱萍 吴蒙
出处 《电信科学》 北大核心 2013年第1期23-30,共8页 Telecommunications Science
基金 国家重点基础研究发展计划("973"计划)基金资助项目(No.2011CB302903) 江苏省高校自然科学研究重点基金资助项目(No.10KJA510035) 南京市重大科技计划基金资助项目(No.201103003) 江苏省研究生创新工程基金资助项目(No.CXZZ11_0404)
关键词 无线传感器网络 隐私保护 幻影路由 椭圆曲线同态加密 wireless sensor network, privacy preservation, phantom routing, ECC homomorphic encryption
  • 相关文献

参考文献13

  • 1Li N, Zhang N, Das Sajal K, et ol. Privacy preservation in wireless sensor networks: a state-of-the-art survey. Ad Hoc Networks, 2009, 7(8): 1501-1514.
  • 2Celal O, Zhang Y Y, Wade T. Source-location privacy in energy-constrained sensor network routing. Proceedings of the 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks, Washington, DC, USA, 2004:88-93.
  • 3Kamat P, Zhang Y, Trappe W, et ol. Enhancing source-location privacy in sensor network routing. Proceedings of 25th IEEE International Conference on Distributed Computing Systems, Columbus, OH,USA, 2005:599-608.
  • 4Yao J B, Wen G J. Preserving source-location privacy in energy-constrained wireless sensor networks. Proceedings of the 28th International Conference on Distributed Computing Systems Workshops, (ICDCS Workshops), Beijing, China, 2008: 412-416.
  • 5陈娟,方滨兴,殷丽华,苏申.传感器网络中基于源节点有限洪泛的源位置隐私保护协议[J].计算机学报,2010,33(9):1736-1747. 被引量:53
  • 6Ren J, Li Y, Li T T. Routing-based source-location privacy in wireless sensor networks Proceedings of 2009 IEEE International Conference on Communications, Dresden, Germany, 2009.
  • 7Pietro R D, Alexandre V. Location privacy and resilience in wireless sensor networks querying. Computer Communications, 2011,34(3).
  • 8钱萍,吴蒙.同态加密隐私保护数据挖掘方法综述[J].计算机应用研究,2011,28(5):1614-1617. 被引量:31
  • 9Rivest R L, Adleman L, Detrouzos M L. On data banks and privacy homomorphism. Foundations of Secure Computation, 1978:169-179.
  • 10Westhoff D, Girao J, Acharya M. Concealed data aggregation for reverse multicast traffic in sensor networks: encryption, key distribution, and routing adaptations. IEEE Transactions on Mobile Computing, 2006, 5 ( 10 ): 1417- 1431.

二级参考文献48

  • 1杨勇,方勇,周安民.秘密同态技术研究及其算法实现[J].计算机工程,2005,31(2):157-159. 被引量:18
  • 2XIANG Guang-li,CHEN Xin-meng,ZHU Ping,MA Jie.A Method of Homomorphic Encryption[J].Wuhan University Journal of Natural Sciences,2006,11(1):181-184. 被引量:8
  • 3尹春勇,李秦伟,孙汝霞.一种秘密同态的改进模式[J].贵州工业大学学报(自然科学版),2007,36(1):68-70. 被引量:3
  • 4尹春勇,李坚石,孙汝霞.安全科学计算系统SSCS实现[J].计算机工程与设计,2007,28(13):3070-3073. 被引量:1
  • 5Shao M,Zhu S,Zhang W,Cao G.pDCS:Security and privacy support for data-centric sensor networks//Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM).Alaska,USA,2007:1298-1306.
  • 6Joseph M,Choudhury R R.Hiding stars with fireworks location privacy through camouflage//Proceedings of the ACM Special Interest Group on Mobility of Systems,Users,Data and Computing (SIGMOBILE).Beijing,China,2009:345-356.
  • 7Hoh B,Gruteser M,Xiong H,Alrabady A.Enhancing security and privacy in traffic-monitoring systems.IEEE Pervasive Computing,2006,5(4):38-46.
  • 8Chen X Q,Makki K,Yen K.Sensor network security:A survey.IEEE Communications Surveys & Tutorials,2009,11(2):52-73.
  • 9Ozturk C,Zhang Y,Trappe W.Source-location privacy in energy constrained sensor networks routing//Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Net-works (SASN).Washington DC,USA,2004:88-93.
  • 10Kamat P,Zhang Y,Trappe W,Ozturk C.Enhancing source-location privacy in sensor network routing//Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS).Ohio,USA,2005:599-608.

共引文献80

同被引文献52

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 2雷吉成.物联网安全技术[M].北京:电子工业出版社,2012:34-35.
  • 3Tan C C, Sheng B, and Li Q. Secure and severless RFID authen- tication and search protocols[ C ] //Proc of the 5th Annual IEEE International Conference on Pervasive Computing and Communi- cations, New York :IEEE ,2007:24 -29.
  • 4Saravanan Sundaresan, Robin Doss, Selwyn Piramuthu, etal. Se- cure tag search in RFID systems using mobile readers [ J ]. IEEE Transactions on Dependable and Secure Computing ,2014, (99) :.
  • 5Juels A,Pappu R. Squealing Euros:Privacy Protection in RFID- Enabled Banknotes [ C ]. Financial Cryptography. Springer Ber- lin Heidelberg,2003 : 103 -121.
  • 6Go|le P, Jakobsson M, Juels A. Syverson universal re-eneryption for mixnets [ C ]//The Cryptographers' Track at the RSA Confe- rence 2004, San Francisco, CA, USA ,2004 : 163 -178.
  • 7Samad Rostampour, Mojtaba Eslamnezhad Namin, Mehdi Hos- seinzadeh. A novel mutual RFID authentication protocol with low complexity and high security[J]. International Journal of Modem Education and Computer Science ( IJMECS ) , 2014,6 ( 1 ) : 17 - 24.
  • 8Hua Man, Li Yanling. Security authentication protocol analysis and security issue of RFID [ C ]Jj2011 2nd International Confe- rence on Management Science and Engineering, MSE 2011, En- gineering Technology ,2011.
  • 9Blom R. An optimal class of symmetric key generation system- s[ C]//Proc of the Eurocrypt84 Workshop on Advances in Cryp- tology: Theory and Application of Crypto-graphic Techniques, Paris, France, 1984:335 -338.
  • 10Dai H Y, Xu H B. Key predistribution approach in wireless sensor networks using LU matrix [ J]. IEEE Sensors Journal, 2010, 10(8) :1399 -1409.

引证文献4

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部