期刊文献+

传感器网络数据融合隐私保护及安全框架

Framework of Privacy Preservation and Intrusion Detection in WSN Data Fusion
原文传递
导出
摘要 在传感器网络中,隐私保护和入侵检测是一对矛盾关系,调和两者的矛盾非常重要。在传感器网络中传感数据融合是一个基本操作,研究隐私保护和入侵检测在传感数据融合中的关系并提出一个框架,可以探测错误数据融合,但不需要知道实际的传感数据内容,因而得以保证传感数据的隐蔽性。实验结果显示,实际的原始数据和聚合传感数据可以得到很好隐蔽的同时能够检测到大部分错误数据融合。 Privacy protection and intrusion detection in WSN is apparently conflict with each other and the coordination of these two is an important task. This paper discusses this problem in the context of sensor data fusion, and this is a fundamental operation in sensor network. A scheme that could detect the erroneously-performed data fusion without knowing the actual content of sensor data is proposed, thus allowing the sensor data to be concealed. The experiment results show that the actual content of raw data and fused sensor data could be well concealed and most erroneously- performed data fusion be detected.
作者 王翔 王强
出处 《信息安全与通信保密》 2012年第9期91-93,共3页 Information Security and Communications Privacy
关键词 传感器网络 数据融合 隐私保护 入侵检测 WSN data fusion privacy protection intrusion detection
  • 相关文献

参考文献8

  • 1MADDEN S, FRANKLIN M. Tag: a Tiny Aggregation Service for Ad-hoc Sensor Networks[C]. Proceedings of SIGOPS 2002. USA: [s.n.], 2002: 1-8.
  • 2CHAN H, PERRIG A. Secure Hierarchical In-network Aggregation in Sensor Networks[C]. Proceedings of ACM CCS2006. USA: [s.n.], 2006: 22-31.
  • 3FAN K, LIU S, SINHA P C. On the Potential of Structure- free Data Aggregation in Sensor Networks[C]. Proceedings of IEEE INFOCOM 2006. USA: [s.n.], 2006: 165-178.
  • 4YANG Y, WANG X. Sdap: a Secure Hop-by-hop Data Aggregation Protocol for Sensor Networks[C]. Proceedings of ACM MobiHoc 2006. USA: [s.n.], 2006: 95-107.
  • 5CASTELLUCCIA C, MYKLETUN E. Efficient Aggregation of Encrypted Data in Wireless Sensor Networks[C]. Proceedings of MobiQuitous 2005. USA: [s.n.], 2005: 105-110.
  • 6杨勇,王强.云服务数据隔离技术[J].信息安全与通信保密,2012,10(2):57-59. 被引量:18
  • 7李芳馨,刘嘉勇.网络数据流还原重组技术研究[J].通信技术,2011,44(7):113-114. 被引量:14
  • 8王强,陈剑锋,王剑锋.双云安全计算架构[J].信息安全与通信保密,2012,10(4):99-101. 被引量:3

二级参考文献23

  • 1侯新宇,王晟,骆光明.基于接收端的TCP流量控制及优化研究[J].通信技术,2007,40(10):21-22. 被引量:1
  • 2GARY R W,RICHARD STEVENS W.TCP/IP详解卷二:实现[M].北京:机械工业出版社,2010:636.
  • 3DANIEL P B,MARCO Cesati.深入理解Linux内核[M].第2版.北京:中国电力出版社,2005:223.
  • 4The Cloud Security Alliance. Security Guidance for Critical Areas of Focus in Cloud Computing V3.0[EB/OL]. (2011- 9-12) [2011-12-23]. http://www.cloudsecurityalliance.org.
  • 5CRAMPTON J, MARTIN K, WILD P. On Key Assignment for Hierarchical Access Control[C]//GUTTAN J ed. Proc. Of the 19^th IEEE Computer Security Foundations Workshop. [s.1.]: IEEE, 2006: 5-7.
  • 6CHRIS G, SHUO T. Secure Web Browsing with the OP Web Browser[C]//Proceedings of the 2008 IEEE Symposium on Security and Privacy. [s.l.]: IEEE Computer Society, 2008 : 402-416.
  • 7MALEK B, MIRI A. Combining Attribute-based and Access Systems[C]//Muzio J C, Brent R P eds. Proc. IEEE CSE 2009, 12^th IEEE Int'l Conf. on Computational Science and Engineering. [s.l.]: IEEE Computer Society, 2009: 305-312.
  • 8BHARGAVAN K, FOURNET C. An Advisor for Web Services Security Policies[C]//SWS'05 : Proceedings of the 2005 Workshop on Secure Web Services. [s.l.]: 2005: 1-9.
  • 9ZELDOVICH N, WICKIZER B, KOHLER F. Making Information Flow Explicit in HiStar[C]//Proceedings of 7^th USENIX OSDI. [s.l.]: 2006: 26-32.
  • 10GUDE N, KOPONEN T. NOX: Towards an Operating System for Networks[J]. ACM SIGCOMM Computer Communication Review, 2008(7) : 105-110.

共引文献26

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部