期刊文献+

电力物联网下无线传感器网络位置隐私保护方法研究 被引量:3

Research of Location Privacy Preservation Method of WSN in Internet of Things of Power System
下载PDF
导出
摘要 首先对无线传感器网络的概念及其在电力物联网中的应用进行了简单的介绍,指出了无线传感器网络中存在的隐私问题;其次针对位置隐私保护进行了概述,并给出了攻击者模型;接下来,分别介绍了几种源节点位置隐私保护和汇聚节点位置隐私保护技术,并对它们的性能进行了分析和比较;最后,我们对电力物联网中的无线传感器网络位置隐私保护技术所需考虑的问题提出了见解和建议。 This paper conducted a brief introduction to the concept of wireless sensor networks and what they can do in internet of things of power system,and pointed out the privacy issues in WSNs.Secondary,an overview of the location privacy was introduced,and an adversary model was given.Then,several location privacy preservation technologies were introduced for source node and sink node respectively,analyzed and compared their performance.In the last,some suggestions were proposed on the concern in location privacy preservation technologies of WSNs in internet of things of power system.
出处 《计算机与数字工程》 2012年第10期91-94,136,共5页 Computer & Digital Engineering
基金 电力物联网环境下基于可信计算的电力业务数据安全接入与传输关键技术研究
关键词 电力系统 物联网 无线传感器网络 位置隐私 隐私保护 power system internet of things WSN location privacy privacy preservation
  • 相关文献

参考文献6

  • 1刘敏钰,吴泳,伍卫国.无线传感网络WSN研究研究[J].吉林电力,2010,38(2):20-23.
  • 2张强,孙雨耕,杨挺,崔振辉.无线传感器网络在智能电网中的应用[J].中国电力,2010,43(6):31-36. 被引量:65
  • 3Y. Xi, L Schwiebert, W. S. Shi, Preserving source location privacy in monitoring-based wireless sensor networks, in: Pro- ceedings of the20th International Parallel and Distributed Pro- cessing Symposium (IPDPS 2006), April 2006.
  • 4Na Li, Nan Zhang, Sajal K. Das, Bhavani Thuraisingham, Pri- vacy preservation in wireless sensor networks: A state-of-th art survey,Ad Hoc Networks,2009(7) :1501-1514.
  • 5Y. Jian, S. G. Chen, Z. Zhang, L. Zhang, Protecting reeeive location privacy in wireless sensor networks, in: Proceedings of the 26th IEEE International Conference on Computer Com- munications (INFOCOM2007), May 2007 : 1955-1963.
  • 6J. Deng, R. Han, S. Mishra, Decorrelating wireless sensor net- work traffic to inhibit traffic analysis attacks, Pervasive and Mobile Computing Elsevier, 2006,2(2) : 159-186.

二级参考文献10

共引文献64

同被引文献26

  • 1江建军,杨彪,邵晖,明繁华.近高频射频识别读写器虚拟仪器系统设计与实现[J].仪器仪表学报,2007,28(6):1024-1028. 被引量:10
  • 2Deng J, Han R, Mishra S. Countermeasures against traffic a- nalysis attacks in wireless sensor networks [ C ]//Proc of first international conference on security and privacy for emerging areas in communication networks. [ s. 1. ] : IEEE, 2005 : 113 - 126.
  • 3郑文先.无线传感器网络位置隐私路由研究[D].成都:电子科技大学,2012.
  • 4郭娜.一种基于匿名的位置隐私保护方法的研究[D].哈尔滨:哈尔滨工程大学,2012.
  • 5Dutta N, Saxena A, Chellappan S. Defending wireless sensors networks against adversarial location [ C ]//Proc of 11 th inter- national conference on mobile data management. Kansas City, MO, USA : IEEE ,2010:336-341.
  • 6Khoshgozaran A, Shahabi C, Shiran- Mehr H. Location priva- cy:going beyond k-anonymity, cloaking and anonymizers [ J ]. Knowledge and Information Systems, 2011,26 ( 3 ) :435-465.
  • 7Bicakci K, Bagci I E, Tavli B. Life bounds of wireless sensor networks preserving perfect sink unobservability [ J ]. IEEE Communications Letters ,2011,15 ( 2 ) :205-207.
  • 8Luo Xi, Ji Xu, Park Myong- Soon. Location privacy against traffic analysis attacks in wireless sensor networks [ C ]//Proc of international conference on information science and applica- tions. Seoul : IEEE ,2010 : 1-6.
  • 9Perfig A, Szewczyk R, Tygar J D, et al. SPINS : security proto- cols for sensor networks[ J]. Wireless Networks,2009,8 (5) : 521-534.
  • 10Jian Ying, Chen Shigang, Zhang Zhan, et al. A novel scheme for protecting receiver' s location privacy in wireless sensor networks [ J]. IEEE Transactions on Wireless Communica- tions,2008,7(10) :3769-3779.

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部