期刊文献+

一种WSN位置隐私保护方案分析和改进 被引量:3

ANALYSIS AND IMPROVEMENT OF A LOCATION PRIVACY PROTECTION SCHEME IN WIRELESS SENSOR NETWORK
下载PDF
导出
摘要 针对无线传感网络D.Singelée位置隐私保护方案存在安全缺陷的问题,提出一种基于临时位置信息伪造位置隐私的改进方案。对节点编号信息和会话密钥采用双随机变量进行假名计算,采用假名生成函数和临时位置信息更新通信假名,保证通信的安全性。分析表明该方案的抗监听攻击能力增强,并有较低的能量消耗。 Aiming at the security limitation of D.Singelée location privacy protection in wireless sensor network(WSN),an improved scheme is proposed,which forges the location privacy based on temporary location information.Pseudonyms calculation is performed on node ID and session key with dual random variables,and the communication pseudonyms are updated with the pseudonym-created function and temporary location information,the security of the communication process is then protected.Analyses show that the new scheme has stronger performance against eavesdropping and is energy efficiency.
出处 《计算机应用与软件》 CSCD 北大核心 2013年第2期312-314,共3页 Computer Applications and Software
关键词 无线传感网络 位置隐私 监听 安全 密钥更新 功耗分析 Wireless sensor network(WSN) Location privacy Eavesdropping Security Key updating Power analysis
  • 相关文献

参考文献6

  • 1孙利民;李建中;陈渝.无线传感器网络[M]北京:清华大学出版社,2006.
  • 2刘新,吴秋峰.无线个域网技术及相关协议[J].计算机工程,2006,32(22):102-103. 被引量:13
  • 3Dave Singeleé. Study andDesign of a Security Architecture for Wireless Personal Area Networks[D].Leuven University,2008.
  • 4潘晓,肖珍,孟小峰.位置隐私研究综述[J].计算机科学与探索,2007,1(3):268-281. 被引量:65
  • 5Wong F,Stajanlo F. Location Privacy in Bluetooth[A].Budapest,Hungary,2005.176-188.
  • 6Wander A S,Gura N,Eberle H. Energy Analysis of Public-key Cryptography for Wireless Sensor Networks[A].Kauai Island,Hawaii,USA,2005.324-328.

二级参考文献14

  • 1Karaoguz J. High Rate Wireless Personal Area Networks[J]. IEEE Comm. Magazine, 2001, 39(12): 96-102.
  • 2FCC. Docket ET 98-153-2002. Revision of Part 15 of the Commission's Rules Regarding Ultra-wideband Transmission Systems[S].2002.
  • 3IEEE. P802.15-04/0137r 1-2004. DS-UWB Physical Layer Submission to 802,15 Task Group 3a[S]. 2004,
  • 4IEEE. P802.15-04/268r3-2004. Multi-band OFDM Physical Layer Submission to 802.15 Task Group 3a[S]. 2004.
  • 5Atallah M J,Frikken K B.Privacy-preserving location-dependent query processing[].Proceeding of the IEEE/ACS International Conference on Pervasive Services(ICPS’).2004
  • 6Cheng R,Kalashnikov D V,Prabhakar S.Evaluating probabilistic queries over imprecise data[].Proceeding of ACM International Conference on Management of Data(SIGMOD’).2003
  • 7Machanavajjhala A,Gehrke J,et al.L-diversity:priva-cy beyond k-anonymity[].Proceedings ofnd Interna-tional Conference on Data Engineering(ICDE’).2006
  • 8Mokbel M F.Privacy in location-based services:start-of-the-art and research directions[].Proceeding ofth In-ternational Conference on Mobile Data Management(MDM’).2007
  • 9Man accused of stalking ex-girlfriend with GPS. http://www.foxnews.com/story/0,2933,131487,00.html . 2004
  • 10Authorities:GPS system used to stalk woman. http://www.usatoday.com/tech/news/2002-12-30-gps-stalker_x.htm . 2002

共引文献76

同被引文献31

  • 1潘晓,肖珍,孟小峰.位置隐私研究综述[J].计算机科学与探索,2007,1(3):268-281. 被引量:65
  • 2Deng J, Han R, Mishra S. Countermeasures against traffic a- nalysis attacks in wireless sensor networks [ C ]//Proc of first international conference on security and privacy for emerging areas in communication networks. [ s. 1. ] : IEEE, 2005 : 113 - 126.
  • 3郑文先.无线传感器网络位置隐私路由研究[D].成都:电子科技大学,2012.
  • 4郭娜.一种基于匿名的位置隐私保护方法的研究[D].哈尔滨:哈尔滨工程大学,2012.
  • 5Dutta N, Saxena A, Chellappan S. Defending wireless sensors networks against adversarial location [ C ]//Proc of 11 th inter- national conference on mobile data management. Kansas City, MO, USA : IEEE ,2010:336-341.
  • 6Khoshgozaran A, Shahabi C, Shiran- Mehr H. Location priva- cy:going beyond k-anonymity, cloaking and anonymizers [ J ]. Knowledge and Information Systems, 2011,26 ( 3 ) :435-465.
  • 7Bicakci K, Bagci I E, Tavli B. Life bounds of wireless sensor networks preserving perfect sink unobservability [ J ]. IEEE Communications Letters ,2011,15 ( 2 ) :205-207.
  • 8Luo Xi, Ji Xu, Park Myong- Soon. Location privacy against traffic analysis attacks in wireless sensor networks [ C ]//Proc of international conference on information science and applica- tions. Seoul : IEEE ,2010 : 1-6.
  • 9Perfig A, Szewczyk R, Tygar J D, et al. SPINS : security proto- cols for sensor networks[ J]. Wireless Networks,2009,8 (5) : 521-534.
  • 10Jian Ying, Chen Shigang, Zhang Zhan, et al. A novel scheme for protecting receiver' s location privacy in wireless sensor networks [ J]. IEEE Transactions on Wireless Communica- tions,2008,7(10) :3769-3779.

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部