期刊文献+

社交网络中定位欺骗攻击的防御机制

Defense Mechanism for Location Spoofing Attacks in Social Networks
下载PDF
导出
摘要 为了降低用户在现有无线终端定位系统因遭欺骗攻击而造成隐私泄露的可能性,本文提出一种基于AccessPoint标签和Access Point位置的双校验方法的防御机制,通过构造Access Point标签,利用其不可伪造性和可再现性来校验Access Point的合法性,并结合Access Point位置,实现移动设备的鲁棒定位。 In order to reduce the possibility of privacy leakage caused by cheating attacks on the existing wireless terminal location system,the paper proposed a defense mechanism based on the dual verification method of AP label and AP location.By constructing the AP label,it used its unforgeability and reproducibility to verify the legitimacy of the AP.And combined with AP location,to achieve robust positioning of mobile devices.
作者 李晴 LI Qing(College of Computer and Cyber Security,Fujian Normal University,Fuzhou,China,350117)
出处 《福建电脑》 2023年第4期6-12,共7页 Journal of Fujian Computer
基金 国家自然科学基金移动网络中面向位置信息生命周期的隐私保护关键技术(No.61972096)资助。
关键词 社交网络 定位欺骗 AP标签 模糊提取器 Social Network Location Spoofing AP Label Fuzzy Extractor
  • 相关文献

参考文献5

二级参考文献30

  • 1周长利,陈永红,田晖,蔡绍滨.保护位置隐私和查询内容隐私的路网K近邻查询方法[J].软件学报,2020,31(2):471-492. 被引量:12
  • 2Bloom B. Space/time tradeoffs in hash coding with allowable errors. Communications of the ACM, 1970,13(7): 422-426
  • 3Mitzenmacher M. Compressed Bloom Filters. In: Proc. of the 20th ACM Symposium on Principles of Distributed Computing (PODC2001) ,Aug. 2001
  • 4Fan L,Cao P,Almeida J,Broder A. Summary cache: a scalable wide-area web cache sharing protocol. IEEE/ACM transactions on networking,2000,8(3)
  • 5Kubiatowicz J,et al. OceanStore: An architecture for globe-scale persistent storage. In:Proc. of the 9th Intl. conf. on architectural support for programming languages and operating systems (ASPLOS 2000) ,2000
  • 6Ramakrishna M V. Practical performance of Bloom Filters and parallel free-text searching. Communications of the ACM, 1989,32(10):1237-1239
  • 7Mulllin J K. A second look at Bloom Filters. Communiations of the ACM,1983,26(8) :570-571
  • 8Witten I H, Moffat A, Bell T. Managing Gigabytes (2nd Edition). Morgan Kaufmann,San Francisco, 1999
  • 9Zhao B Y, Kubiatowicz J, Joseph A D. Tapstry: An infrastructure for fault-tolerant wide-area location and routing.Computer Science Division University of California, (UCB/CSD-01-1141) ,April 2001
  • 10Balter M H, Leighton T, Lewin D. Resource discovery in distributed networks. In: Proc. of the 18th annual ACM symposium on priciples of distributed computing (PODC'99),1999

共引文献82

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部