期刊文献+

普适计算的隐私保护协议

A Privacy Protocol for Pervasive Computing
下载PDF
导出
摘要 改进了一个用于保护用户隐私的安全协议。该协议引入了服务发现者,用户并不直接与服务提供者进行通信,而是通过服务发现者来完成用户的需求。通过对协议的安全分析,可以看出:该协议保护了用户的隐私,也防止了用户被跟踪,并且减少了原有协议的计算量,更适合普适计算。该协议可以很好的保护用户的隐私,并且能够防止重放攻击。 In this paper, a secure protocol to protect user privacy is improved. In this protocol the users does not directly communicate with the service provider, instead, the user connects through the service discoverers to complete their needs. Through analysis of the security system in the protocol, it becomes clear that this protocol protects users' privacy, and prevents users from being tracked at the same time. The protocol reduces the computational complexity of the original protocol, and it is more suitable for ubiquitous computing. The protocol may very well protect users' privacy, and can also prevent replayed attack.
出处 《计算机系统应用》 2010年第10期211-213,共3页 Computer Systems & Applications
基金 河南省重点科技攻关项目(072102210058)
关键词 普适计算 隐私保护 认证 攻击 安全 pervasive computing privacy protect authentication attack secure
  • 相关文献

参考文献7

二级参考文献67

  • 1肖道举,郭杰,陈晓苏.一种对中间人攻击的防范策略的研究[J].计算机工程与科学,2004,26(9):7-8. 被引量:3
  • 2洪帆,郭亚军.资源限制信任协商[J].华中科技大学学报(自然科学版),2006,34(5):23-25. 被引量:7
  • 3郭亚军,洪帆,叶俊民,邱珊珊,宋建华,洪亮.普适计算的信任认证[J].计算机科学,2006,33(8):92-94. 被引量:3
  • 4[1]Jalal Al-Muhtadi.A Flexible,Privacy-Preserving Authentication Framework for Ubiquitous Computing Environments.In:Proceedings of ICDCSW ' 02.2002
  • 5[2]Jalal Al-Muhtadi.Routing through the Misst Privacy Preserving Communication in Ubiquitous Computing Environments.In:Proceedings of ICDCS'02.2002
  • 6[3]Alastair R.Beresford,Frank Stajano.Location Privacy in Pervasive Computing.IEEE CS and IEEE Communications Society,JANUARYMARCH 2003:46-55
  • 7[4]Raquel Hill.A Middleware Architecture for Securing Ubiquitous Computing Cyber Infrastructures.IEEE Computer Society.,September 2004,5(9):1-14
  • 8[2]Reiter M,Rubin,A D.Crowds:anonymity for Web transactions[J].ACM Transactions on Information and System Security,1998,1(1):66-92.
  • 9[3]Ren K,Lou W,Kim K,et al.A novel privacy preserving authentication and access control scheme for pervasive computing environments[J].IEEE Transactions on Vehicular Technology,2006,55 (4):1 373-1 384.
  • 10[4]Wu X.Applying pseudonimity for anonymous data delivery in location-aware mobile ad hoc networks[J].IEEE Transactions on Vehicular Technology,2006,55(3):1 062-1 073.

共引文献269

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部