期刊文献+

传感器网络数据处理中基于隐私向量的隐私保护机制 被引量:3

Data processing based on the privacy-preserving vector for wireless sensor networks
下载PDF
导出
摘要 针对传感器网络数据处理中的隐私保护需求,提出了新的分布式机制。构造了隐私向量,并设计了低能耗的隐私向量生成方法及使用方法,从而可有效实现求和、求最值及压缩等各类处理中的数据隐私保护。提出了种子分发算法,保证了隐私向量的安全动态生成。理论分析和仿真实验表明,与已有同类机制相比,新机制不仅能更好地抵御节点俘获攻击,具有更高的隐私保护有效性,且更为能量有效。 To solve the privacy disclosing problem during the data processing phase of wireless sensor networks, a distributed mechanism was proposed. Privacy-preserving vector(vector for short) was constructed. Moreover, lightweight method for vector generation and novel method for using the vector were also presented. Thus, the methods were able to solve the privacy-preserving problem for various data processing funtions such as max/min and data compression efficiently. An algorithm based on data hiding and slice was given and then the vector was able to be generated securely and dynamically. Extensive analyses and experiments show that the mechanism is more robust to node compromise attack and thus can preserve privacy more efficiently. Moreover, the mechanism consumes less power.
出处 《通信学报》 EI CSCD 北大核心 2015年第9期34-46,共13页 Journal on Communications
基金 国家自然科学基金资助项目(61303045 61472125 61472135)~~
关键词 传感器网络 数据处理 隐私保护 同余 隐私向量 sensor networks data processing privacy preserving congruence privacy-preserving vector
  • 相关文献

参考文献20

二级参考文献100

  • 1陈铭松,赵建华,李宣东,郑国梁.时间自动机可达性分析中的状态空间约减技术综述[J].计算机科学,2006,33(6):1-6. 被引量:3
  • 2杨庚,王江涛,程宏兵,容淳铭.基于身份加密的无线传感器网络密钥分配方法[J].电子学报,2007,35(1):180-184. 被引量:60
  • 3宁焕生,张瑜,刘芳丽,刘文明,渠慎丰.中国物联网信息服务系统研究[J].电子学报,2006,34(B12):2514-2517. 被引量:151
  • 4http://www.epcglobalinc.org/.
  • 5HAMAD F,SMALOV L,JAMES A.Energy-aware security in M-commerce and the Internet of Things[J].IETE,Technical review,2009,26(5):357-362.
  • 6WATRO R,KONG D,et al.TinyPK:Securing sensor networks with public key technology[C]∥ Proc of the 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks.New York:ACM press,2004:59-64.
  • 7BENENSON Z,GEDICKE N,RAIVIO O.Realizing robust user authentication in sensor networks[C]∥Proc of the Workshop on Real-World Wireless Sensor Networks(REALWSN 2005).[S.l.]:Stockholm,2005.135-142.
  • 8MALAN D J,WELSH M,SMITH M D.A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography[C]∥ 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks.Piscataway:IEEE,2004:71-80.
  • 9OUADJAOUT A,CHALLAL Y,LASLA N,et al.SEIF:Secure and efficient intrusion-fault tolerant routing protocol for wireless sensor networks[C]∥Proc of the Third International Conference on Availability,Reliability and Security(ARES 2008).Piscataway:IEEE,2008:503-508.
  • 10MA R,XING L D,MICHEL H E.A new mechanism for achieving secure and reliable data transmission in wireless sensor networks[C]∥Proc of the 2007 IEEE Conference on Technologies for Homeland Security:Enhancing Critical Infrastructure Dependability.Piscataway:IEEE,2007:274-279.

共引文献322

同被引文献31

引证文献3

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部