期刊文献+

WSN源位置隐私技术研究

Research on Source-Location Privacy Technique for WSN
下载PDF
导出
摘要 随着无线传感器网络的应用深入到日常生活领域,隐私已成为无线传感器网络成功应用的一大障碍。当无线传感器网络用于监控敏感对象,被监控对象的位置隐私成为一个重要问题。首先分析无线传感器网络的安全特点、信源位置隐私性能评价标准、面临的隐私威胁,最后,基于对无线传感器网络信源位置隐私问题的分析和评述,指出了今后该领域的研究方向。 As applications of wireless sensor networks go deep into daily life domain, Privacy concerns have emerged as the main obstacle to success applications of wireless sensor networks. When wireless sensor networks are used to monitor sensitive objects, the privacy about monitored object’ locations becomes an important issue. In this paper, the security characteristics, source-location privacy performance criterion, privacy risks in wireless sensor networks are analyzed. As a conclusion, the development directions are pointed out based on the analysis and remark of source-location privacy protecting remaining unsolved in wireless sensor networks .
作者 姚剑波
出处 《微计算机信息》 2011年第2期33-35,共3页 Control & Automation
基金 基金申请人:姚剑波 项目名称:WSN中的隐私技术研究 基金颁发部门:贵州省教育厅(黔教科2008064) 基金申请人:姚剑波 项目名称:密码设备抗侧信道攻击的安全设计流程与评估技术研究 基金颁发部门:贵州省科技厅(黔科合J字[2009]2275号) 基金申请人:姚剑波 项目名称:无线传感器网络隐私技术研究 基金颁发部门:贵州省科技教育领导小组办公室(黔省专合字(2009)27号)
关键词 无线传感器网络 隐私 隐私威胁 位置隐私 源位置隐私 Wireless Sensor Network Privacy Privacy Risk Location Privacy SourceLocation Privacy
  • 相关文献

参考文献17

  • 1郑强,王晓东.无线传感器网络安全研究[J].微计算机信息,2008(1):116-117. 被引量:13
  • 2Ozturk C, Zhang Y, Trappe W, et al. Source-location privacy for networks of energy-constrained sensors [C] In Proceedings of 2rid IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems(WSTFEUS'04), 11-12 May 2004 Page(s): 68 - 72.
  • 3Chan H, Perrig A. Security and privacy in sensor networks[J]. IEEE Computer Magazine, 2003, 36(10): 103-105.
  • 4Perrig A, Stankovic J, Wagner D. Security in wireless sensor networks[J].Commun. ACM, 47(6):53 - 57, 2004.
  • 5Gruteser M, Schell G, Jain A, et al. Privacy-aware location sensor networks[C] In 9th USENIX Workshop on Hot Topics in Operating Systems (HotOS), 2003.
  • 6Deng J, Han R, and Mishra S. Countermeasures against traffic analysis attacks in wireless sensor networks [C] Proc. of CerateNet Conference on Security and Privacy in Communication Networks (SecureComm), 2005.
  • 7Jian Y, Chen S. Protecting Receiver-Location privacy in Wireless Sensor networks [C] IEEE INFOCOM, May 2007.
  • 8Xi Y, Schwiebert L, Shi W. Preserving privacy in monitoring- based wireless sensor networks [C] In Proceedings of the 2nd In- ternational Morkshop on Security in Systems and N etworks (SSN' 06), IEEE Computer Society, 2006.
  • 9Ozturk C, Zhang Y, and Trappe W. Source-location privacy in energy constrained sensor network muting [C] Proc. of the 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN) in conjunction with ACM Conference on Computer and Communications Security, 2004.
  • 10Kamat P, Zhang Y, Trappe W, et al. Enhancing source location privacy in sensor network routing [C] In: proc. of 25th IEEE International Conference on Distributed Computing Systems (ICDCS), 2005.

二级参考文献13

  • 1梁国伟,李长武,李文军.网络化智能传感技术发展浅析[J].微计算机信息,2004,20(7):54-56. 被引量:16
  • 2[2]C.Karlof and D.Wagner,"Secure Routing in Wireless Sensor Networks:Attacks and Countermeasure," 1st IEEE International Workshop on Sensor Network Protocols and Applications,USA,2003.
  • 3[3]L.Eschenauer and V.D.Gligor,"A Key Management Scheme for Distributed Sensor Networks," CC502,Washington DC,USA,2002.
  • 4[4]R.D.Pietro,L.Maucini,and A.Mci,"Efficient and Resilient Key Discovery based on Pseudo-random Key Pre-deployment,"18th Int'l.Parallel and Distributed Processing Symp.,Apr.2004.
  • 5[5]W.Du et al.,"A Witness-based Approach for Data Fusion Assurance in Wireless Sensor Networks," GLOBECOM '03,2003.
  • 6[6]B.Przydatek,D.Song,and A.Perrig,"SLA:Secure Information Aggregation in Sensor Networks," SenSys03,2003.
  • 7[7]S.R.Madden et al.,"Tag:A Tiny Aggregation Service for Adhoc Sensor Networks," OSDI,Dec.2002.
  • 8OZTURK C, ZHANG Y, TRAPPE W, et al. Source-location privacy for networks of energy-constrained sensor [C]// Proceedings of 2nd IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems (WSTFEUS'04). Washington: IEEE Press, 2004:68-72.
  • 9CHAN H, PERRIG A. Security and privacy in sensor networks [ J]. IEEE Computer Magazine, 2003, 36(10) : 103 - 105.
  • 10PERRIG A, STANKOVIC J, WAGNER D. Security in wireless sensor networks [ J]. Communications of the ACM, 2004, 47(6) : 53 - 57.

共引文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部