期刊文献+

蓝牙位置隐私保护方案的研究与设计 被引量:3

Research and design of the protection scheme on bluetooth location privacy
在线阅读 下载PDF
导出
摘要 通过对蓝牙位置隐私攻击机制和现有保护方案不足的分析,建立了蓝牙地址分级模型,依据此模型设计了蓝牙位置隐私保护方案,与现有方案相比,该协议不仅可以抵抗针对蓝牙位置隐私的窃听攻击、重放攻击、跳频序列攻击、会话地址跟踪攻击、字典攻击和中间人攻击,同时具有较小的计算量和存储需求。 The attack mechanism of bluetooth location privacy and the disadvantages of the current protection scheme were analyzed and a model of hierarchical address was established.On the basis of the model,a protection scheme on bluetooth location privacy was designed.Compared with others,this scheme can not only resist eavesdroping,replay attack,frequency hop sequence attack,conversation address tracking attack,dictionary attack and man in the middle attack,but also need little computing and storage.
作者 郁滨 张顺
出处 《通信学报》 EI CSCD 北大核心 2011年第9期116-122,共7页 Journal on Communications
关键词 蓝牙 位置隐私 地址分级 寻呼连接协议 bluetooth location privacy hierarchical address paging connection protocol
  • 相关文献

参考文献12

  • 1BERESFORD A R, STAJANO F. Location privacy in pervasive computing[J]. IEEE Pervasive Computing, 2003,2(1):46-55.
  • 2LIU L. From data privacy to location privacy: models and algorithms[A]. Proceedings of The 33rd International Conference on Very Large Data Bases(VLDB'07)[C]. Vienna, Austria, 2007. 1429- 1430.
  • 3JAKOBSSON M, WETZEL S. Security weaknesses in bluetooth[A]. Cryptographer's Track at RSA Conf. 2001[C]. San Francisco, California, USA, 2001.176-191.
  • 4WHITEHOUSE O. RedFang[EB/OL]. http://www.atstake.com/.2003.
  • 5WONG F, STAJANO F. Location privacy in bluetooth[A]. 2nd European Workshop on Security and Privacy in Ad hoc and Sensor Networks[C]. Visegrad (HU), 2005.176-188.
  • 6HAASE M, HANDY M. Bluetrack-imperceptible tracking of bluetooth devices[A]. UbiComp 2004[C]. Nottingham, England, 2004.
  • 7SOLON A, CALLAGHAN M, HARKIN J. Case Study on the bluetooth vulnerabilities in mobile devices[J]. International Journal of Computer Science and Network Security, 2006, 6(4): 125-129.
  • 8GEHRMANN C, NYBERG K. Enhancements to Bluetooth baseband security[A]. Proceedings of Nordsec 2001[C]. Copenhagen, Denmark, 2001.
  • 9Bluetooth SIG Specification of the Bluctooth System: Core Package version 2.1+EDR[S]. http://www.bluetooth.org. 2007.
  • 10刘伟,罗嵘,杨华中.一种轻量级的无线传感器网络密钥建立协议[J].电子与信息学报,2010,32(4):869-874. 被引量:10

二级参考文献22

  • 1Perrig A, Stankovic J, and Wagner D. Security in wireless sensor networks[J]. Communications of the A CM, 2004, 47(6): 53-57.
  • 2Karlof C, Sastry N, and Wagner D, et al.. Tinysec: a link layer security architecture for wireless sensor networks[C]. The 2nd ACM Conf. Embedded Networked Sensor Systems, Baltimore: Maryland, USA, Nov. 3-5, 2004: 162-175.
  • 3Basagni S, Herrin K, and Rosti E, et al.. Secure pebblenets[C] The 2nd ACM InC1 Symp. Mobile Ad hoc Networking and Computing, Long Beach, CA, USA, Oct. 04-05, 2001: 156-163.
  • 4Perrig A, Szewczyk R, and Wen V, et al.. SPINS: Security protocols for sensor networks[C]. The 7th Int'l Conf. Mobile Computing and Networking, Rome, Italy, Jul. 16-21, 2001: 189-199.
  • 5Eschenauer L and Gligor V. A key-management scheme for distributed sensor networks[C]. The 9th ACM Conf. Computer and Communications Security, Washington, DC, USA, Nov. 17-21, 2002: 41-47.
  • 6Chan H, Perrig A, and Song D. Random key predistribution schemes for sensor networks[C]. The IEEE Syrup. Security and Privacy, Oakland, California, USA, May. 11-14, 2003: 197-213.
  • 7Zhu S, Xu S, and Setia S, et al.. Establishing pair-wise keys for secure communication in Ad Hoc networks: a probabilistic approach[C]. The 11th IEEE Int'l Conf. Network Protocols, Atlanta, Georgia, USA, Nov. 4-7, 2003: 326-335.
  • 8Du W, Deng J, and Han Y, et al.. A pairwise key predistribution scheme for wireless sensor networks[J]. ACM Transactions on Information and System Security, 2005, 8(2): 228-258.
  • 9Liu D, Ning P, and Li R. Establishing pairwise keys in distributed sensor networks[J]. ACM Transactions on Information and System Security, 2005, 8(1): 41-77.
  • 10Huang D, Mehta M, and Liefvoort A V D, et al.. Modeling pairwise key establishment for random key predistribution in large-scale sensor networks[J]. IEEE/ACM Transactions on Networking, 2007, 15(5): 1204-1215.

共引文献9

同被引文献16

  • 1左建春,蒋凡.一种改进的蓝牙设备发现过程及其仿真[J].计算机仿真,2007,24(5):94-97. 被引量:2
  • 2Bluetooth Special Interest Group. Bluetooth SIG Specification of the Bluetooth system: core package version 4.0 [EB/OL]. (2009-12-17) [2014-3-4]. http://www.bluetooth.org.
  • 3Nateq Be-Nazir Ibn Minar, Mohammed Tarique. Bluetooth Security Threats and Solutions: A Survey [J]. International Journal of Distributed and Parallel Systems (S0976-9757), 2012, 3(1): 127-148.
  • 4Manish Shrivastava. Analysis of Security Risks in Bluetooth [J]. International Journal of Computing Academic Research ($2305-9184), 2012, 1(2): 88-95.
  • 5Veenanand Kakarla, N S Govind. FPGA Implementation of Hybrid Encryption Algorithm Based on Triple DES and RSA in Bluetooth Communication [J]. International Journal of Applied Research and Studies ($2278-9480), 2012, 1(1): 113-117.
  • 6Jakobsson M, Wetzel S. Security weaknesses in Bluetooth [C]// Cryptographer's Track at RSA Conf 2001, San Francisco, California, USA. Berlin, Germany: Springer Berlin Heidelberg, 2001: 176-191.
  • 7Haase M, Handy M. BlueTrack - Imperceptible Tracking of Bluetooth Devices [EB/OL]. (2004-9-10) [2014-3-4]. http://ubicomp.org/ubicomp2004/adjunct/posters/haase.pdf.
  • 8Solon A, Callaghan M, Harkin J. Case Study on the Bluetooth Vulnerabilities in Mobile Devices [J]. International Journal of Computer Science and Network Security (S 1738-7906), 2006, 6(4): 125-129.
  • 9Gehrmann C, Nyberg K. Enhancements to Bluetooth baseband security [C]// Proceedings of Nordsec 2001, Copenhagen, Denmark. Copenhagen, Denmark: Informatics and Mathematical Modelling, Technical University of Denmark, DTU, 2001:191-205.
  • 10Wong F, Stajano F. Location Privacy in Bluetooth [C]// Security and Privacy in AdHoe and Sensor Networks, Visegrad (HU). Berlin, Germany: Springer Berlin Heidelberg, 2005:176-188.

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部