期刊文献+

MWNs中信息安全问题研究

Research on the problem of information security for MWNs
下载PDF
导出
摘要 MWNs的固有特性严重地阻碍了多跳无线网络在实际中的广泛应用。在总结MWNs固有特性和安全威胁的基础上,分析了MWNs中的信息安全需求;结合无线信道的开放特性,将私密性从机密性中分离出来,分析了身份隐私、数据隐私、位置隐私、行为隐私的概念及关系;给出与MWNs相关的4个研究问题。 The inherent characteristic of MWNs has hampered seriously the wide application of multi-hop wireless network in actual.Based on the concluding inherent charasecurity threat of MWNs,analyzed the requirement of information security in MWNS.Combining the open nature of wireless channel,separated the privacy from the confidentiality,analyzed the concept and relation of identity privacy,data privacy,location privacy,and activity privacy.Lastly,it is shown that the four research problem is in connection with MWNs.
作者 弋改珍
出处 《电子设计工程》 2012年第10期171-174,共4页 Electronic Design Engineering
基金 陕西省教育厅科学研究计划项目(08JK481) 咸阳师范学院基金项目(08XSYK337)
关键词 MWNs 信息安全 私密性 流量分析 内部敌手 流量爆炸 MWNs information security privacy traffic analysis internal adversary traffic explosion
  • 相关文献

参考文献12

  • 1Curtmola R, Nita-Rotaru C. BSMR:byzantine-resilient secure muhicast routing in multihop wireless networks [J]. IEEE Transactions on Mobile Computing, 2009,8 (4) :445-459.
  • 2Kao J C ,Marculescu R. Minimizing eavesdropping risk by transmission power control in muhihop wireless networks[J]. IEEE Transactions on Computers, 2007,56 (8) : 1009-1023.
  • 3Bashar S,Ding Z. Optimum routing protection against cumu- lative eavesdropping in muhihop wireless networks[C].Boston, USA'Proceeding of IEEE Military Communication Conference, 2009:1-7.
  • 4Fussell R S. Protecting information security Availability via Self-adapting Intelligent Agents[C]. Atlantic,NJ,USA: Procee-ding of IEEE Military Communication Conference,2005:2977- 2982.
  • 5Islam S,Hamid A,Hong C S,et al. Preserving identity privacy in wireless mesh networks [C]//In Proc. of the International Conference on Information Networking 2008 (ICOIN'08). 2008:1-5.
  • 6Singh M,Saxena A. Secure computation for data privacy[C]. Nice, France: Proc. SECCOM'07,2007:58-62.
  • 7Decker M. Location Privacy-An Overview[C]. Proc. ICMB'08. Barcelona,Spain:IEEE CS press,2008:221-230.
  • 8Wang J,Zhao Y,Jiang S, et al. Providing privacy preserving in cloud computing[C]. Changsha,China:Proc. ICTM'09,2009: 213-216.
  • 9Wei Y,He Y,Hao L. An Identity Privacy Enhanced Trust Model in Fully Distributed Virtual Computing Environments [C]. Proc.NSWCTC'09.NY:IEEE CS press ,2009:704-708.
  • 10Pfitzmann A, Hansen M. Anonymity, Unlinkability, Undetec- tability,Unobservability,Pseudonymity,and Identity Mana- gement-A Consolidated Proposal for Terminology[M]. German: Press of Technische University Dresden,2008.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部