期刊文献+

无线传感器网络中的隐私威胁与对策

Risk and privacy countermeasure for wireless sensor network
在线阅读 下载PDF
导出
摘要 随着无线传感器网络的应用深入到日常生活领域,如何保护隐私成为一个至关重要的问题。借助无线传感器网络,很容易收集个人信息。有的机构甚至把个人信息当作商品,进行收集、交换和出售,人们对这些行为越来越警觉,希望保护自己的隐私,隐私已成为无线传感器网络成功应用的一大障碍。如果没有提供适当的隐私保护,无线传感器网络就不能应用于这些领域。通过分析无线传感器网络的特点、面临的隐私威胁及相应的对策,基于通信系统一般化的物理模型,提出了一种隐私保护解决方案。 As applications ofwireless sensor networks embed daily life domians, how protecting privacy becomes a most main problem. Collecting personal information becomes easily by wireless sensor networks. Some organizations are collecting, swapping, and selling personal information as a commodity, and people are becoming aware of these practices and looking to protect their privacy. Privacy concerns have emerged as the main obstacle to success applications of wireless sensor networks. Without offering proper privacy protection, wireless sensor networks could not apply to those domains. On the basis of general physical model of communications system, an integrated approach of privacy protection is proposed by analyzing the characteristics, potential privacy risks and countermeasure of wireless sensor network.
出处 《计算机工程与设计》 CSCD 北大核心 2009年第7期1618-1621,共4页 Computer Engineering and Design
关键词 无线传感器网络 隐私 隐私威胁 隐私保护 对策 wireless sensor network (WSN) privacy privacy risk privacy protection countermeasure
  • 相关文献

参考文献14

  • 1曾志峰,邱慧敏,朱龙海.无线传感器网络中的安全威胁分析及对策[J].计算机应用研究,2007,24(1):140-143. 被引量:11
  • 2Ozturk C,Zhang Y,Trappe W,et al.Source-location privacy for networks of energy-constrained sensors[C].Proceedings of 2nd IEEE Workshop on Sofhvare Technologies for Future Embedded and Ubiquitous Systems,2004.
  • 3骆盈盈,李春芳.传感器网络中的安全性和保密性[J].计算机工程与设计,2006,27(7):1277-1278. 被引量:3
  • 4Chan H,Perrig A.Security and privacy in sensor networks[J].IEEE Computer Magazine,2003,36(10):103-105.
  • 5Perrig A,Stankovic J,Wagner D.Security in wireless sensor networks[J].Commun ACM,2004,47(6):53-57.
  • 6Gruteser M,Schell G,Jain A,et al.Privacy-aware location sensor networks[C].9th USENIX Workshop on Hot Topics in Operating Systems,2003.
  • 7Grutcser M,Grunwald D.A methodological assessment of location privacy risks in wireless hotspot networks[C].First intemational Conference on Security in Pervasive Computing,2003.
  • 8戴宁江,邱慧敏.无线传感器网络的安全问题及对策[J].中国无线电,2006(10):47-50. 被引量:10
  • 9Molner D,Wagner D.Privacy and security in library rfid:Issues,practices,and architectures[C].ACM CCS,2004.
  • 10Xi Y,Schwiebert L,Shi W Preserving privacy in monitoringbased wireless sensor networks[C].Proceedings of the 2nd International Morkshop on Security in Systems and Networks.IEEE Computer Society,2006.

二级参考文献12

  • 1马思佳,薛质,单蓉胜,李建华.结合主动探测技术的入侵检测系统[J].计算机工程与应用,2004,40(16):143-145. 被引量:3
  • 2邓未央,王宝树.多传感器数据融合系统中的目标跟踪技术[J].计算机工程与设计,2004,25(10):1661-1663. 被引量:9
  • 3卓越,王红,吴秋峰,等.A newframeworkforintranet-based group decision supportsystem[M].北京:清华大学出版社,2003.55-57.
  • 4王峰,高瞻.城域网接入新技术[OL].http://www.c114.net/technic/technicread.asp.
  • 5马思佳 李建华.SNMPv3新增安全机制的研究与实验[J].计算机应用,2003,31(10):21-23.
  • 6易水.计算机专业时文选读[OL].http://www2.ccw.com.cn/03/0339/d/0339d05_1.asp.
  • 7D W Carman,P S Kruus,B J Matt.Constraints and Approaches for Distributed Sensor Network Security[EB/OL].http://download.nai.com/products/media/nai/zip/nailabs-report-00-010-final.zip,2000-09-01.
  • 8Perring A,Szewczyk R,Tygar J D,et al.SPINS:Security Protocols for Sensor Networks[C].Rome:the 7th Annual ACM International Conference on Mobile Computing and Networks,2001.521-534.
  • 9Blom R.An Optimal Class of Symmetric Key Generation System[C].Advances in Cryptology-Eurocrypt,Springer LNCS 209,1984.335-338.
  • 10Priit Caru.Practical Comparison of Fast Public-Key Cryptosystems[EB/OL].http://www.tml.hut.fi/Opinnot/Tik-110.501/2000/papers/loikkanen-kahc.pdf,2000-07.

共引文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部