浏览全部资源
扫码关注微信
1. 江苏科技大学计算机科学与工程学院 镇江212003
2. 南京邮电大学计算机学院 南京210003
3. 南京邮电大学通信与信息工程学院 南京210003
[ "钱萍,女,江苏科技大学讲师,南京邮电大学博士研究生,主要研究方向为网络安全、隐私保护。" ]
[ "吴蒙,男,南京邮电大学教授、博士生导师,主要研究方向为无线通信、信息安全。" ]
网络出版日期:2013-01-20,
纸质出版日期:2013-01-20
移动端阅览
钱萍, 吴蒙. 无线传感器网络隐私保护方法[J]. 电信科学, 2013,29(1):23-51.
Ping Qian, Meng Wu. A Privacy Preserving Method in WSN[J]. Telecommunications science, 2013, 29(1): 23-51.
钱萍, 吴蒙. 无线传感器网络隐私保护方法[J]. 电信科学, 2013,29(1):23-51. DOI: 10.3969/j.issn.1000-0801.2013.01.004.
Ping Qian, Meng Wu. A Privacy Preserving Method in WSN[J]. Telecommunications science, 2013, 29(1): 23-51. DOI: 10.3969/j.issn.1000-0801.2013.01.004.
如何保护隐私信息在无线传感器网络的应用过程中不被泄露,同时能得到较为准确的结果,是无线传感器网络面临的重大挑战。近年来国内外学者对无线传感器网络的隐私保护技术进行了很多研究,本文从位置隐私保护和数据隐私保护两方面,总结了现有的隐私保护方法,分析了其基本原理和特点。针对现有方法的不足,本文提出了一种能同时保护位置隐私和数据隐私的隐私保护方法,该方法基于多节点幻影路由技术和椭圆曲线同态加密技术。与现有技术相比,该方法具有更好的隐私保护性和更低的能量消耗性。
A great challenge to wireless sensor network(WSN)is how to protect privacy from disclosing during application in WSN as well as obtain accurate results. In recent years
researchers at home and abroad have done much work on privacy preserving in WSN. This paper surveyed the general privacy preserving methods from two aspects of location privacy and data privacy in WSN and analyzed their theories and characteristics. A new method based on multi-notes phantom routing protocols and ECC homomorphic encryption was proposed
which could protect location privacy and data privacy at the same time. Compared to current methods
better privacy will be protected and less energy will be consumed.
Li N , Zhang N , Das Sajal K , et al . Privacy preservation in wireless sensor networks: a state-of-the-art survey . Ad Hoc Networks , 2009 , 7 ( 8 ): 1501 ~ 1514
Celal O , Zhang Y Y , Wade T . Source-location privacy in energy-constrained sensor network routing . Proceedings of the 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks , Washington, DC, USA , 2009 : 88 ~ 93
Kamat P , Zhang Y , Trappe W , et al . Enhancing source-location privacy in sensor network routing . Proceedings of 25th IEEE International Conference on Distributed Computing Systems , Columbus, OH,USA , 2005 : 599 ~ 608 .
Yao J B , Wen G J . Preserving source-location privacy in energy-constrained wireless sensor networks . Proceedings of the 28th International Conference on Distributed Computing Systems Workshops,(ICDCS Workshops) , Beijing, China , 2008 : 412 ~ 416
陈娟 , 方滨兴 , 殷丽华 等 . 传感器网络中基于源节点有限洪泛的源位置隐私保护协议 . 计算机学报 , 2010 , 33 ( 9 ): 1736 ~ 1746
Ren J , Li Y , Li T T . Routing-based source-location privacy in wireless sensor networks . Proceedings of 2009 IEEE International ConferenceonCommunications , Dresden,Germany , 2009
Pietro Pietro , Alexandre V . Location privacy and resilience in wireless sensor networks querying . Computer Communications , 2011 , 34 ( 3 )
钱萍 , 吴蒙 . 同态加密隐私保护数据挖掘方法综述 . 计算机应用研究 , 2011 , 28 ( 5 ): 1614 ~ 1617
Rivest R L , Adleman L , Detrouzos M L . On data banks and privacy homomorphism . Foundations of Secure Computation , 1978 : 169 ~ 179
Westhoff D , Girao J , Acharya M . Concealed data aggregation for reverse multicast traffic in sensor networks: encryption, key distribution, and routing adaptations . IEEE Transactions on Mobile Computing , 2006 , 5 ( 10 ): 1417 ~ 1431
He W , Liu X , Nguyen H , et al . PDA: privacy-preserving data aggregation in wireless sensor networks . Proceedings of 26th IEEE International Conference on Computer Communications (Infocom 2007) , Anchorage, Alaska, USA , 2007 : 2045 ~ 2053
Koblitz N . Elliptic curve cryptosystems.Mathematics of Computationy , 1987 ( 48 ): 203 - 309
Miller V S . Use of elliptic curves in cryptography . Proceedings of CRYPTO 1985 , California, USA , 1985 : 417 - 426
0
浏览量
1228
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构