首页 | 本学科首页   官方微博 | 高级检索  
     

无线传感器网络位置隐私保护技术
引用本文:彭辉,陈红,张晓莹,范永健,李翠平,李德英.无线传感器网络位置隐私保护技术[J].软件学报,2015,26(3):617-639.
作者姓名:彭辉  陈红  张晓莹  范永健  李翠平  李德英
作者单位:数据工程与知识工程国家教育部重点实验室中国人民大学, 北京 100872;中国人民大学 信息学院, 北京 100872,数据工程与知识工程国家教育部重点实验室中国人民大学, 北京 100872;中国人民大学 信息学院, 北京 100872,数据工程与知识工程国家教育部重点实验室中国人民大学, 北京 100872;中国人民大学 信息学院, 北京 100872,河北工程大学 信息与电气工程学院, 河北 邯郸 056038,数据工程与知识工程国家教育部重点实验室中国人民大学, 北京 100872;中国人民大学 信息学院, 北京 100872,数据工程与知识工程国家教育部重点实验室中国人民大学, 北京 100872;中国人民大学 信息学院, 北京 100872
基金项目:国家自然科学基金(61070056, 61033010, 61272137, 61202114); 国家重点基础研究发展计划(973)(2012CB316205); 国家高技术研究发展计划(863)(2014AA015204); 高等学校学科创新引智计划(B12028); 河北省自然科学基金(F2013402031)
摘    要:对传感器网络位置隐私保护技术的研究现状与进展进行了综述,首先介绍网络模型、攻击模型和性能评价模型.接着,按照路径伪装、陷阱诱导、网络匿名和通信控制这4种策略对现有的研究成果进行了分类,阐述了代表性协议的核心技术.对各协议性能和优缺点的分析比较表明:4种策略都会在一定程度上影响网络的通信和能耗性能:路径伪装策略主要针对逐跳回溯攻击,网络匿名策略主要针对ID分析攻击,陷阱诱导和通信控制策略可以抵御多种类型的攻击.最后,对未来研究方向进行了展望.

关 键 词:无线传感器网络  位置隐私保护  路径伪装  陷阱诱导  网络匿名  通信控制
收稿时间:4/2/2014 12:00:00 AM
修稿时间:2014/8/28 0:00:00

Location Privacy Preservation in Wireless Sensor Networks
PENG Hui,CHEN Hong,ZHANG Xiao-Ying,FAN Yong-Jian,LI Cui-Ping and LI De-Ying.Location Privacy Preservation in Wireless Sensor Networks[J].Journal of Software,2015,26(3):617-639.
Authors:PENG Hui  CHEN Hong  ZHANG Xiao-Ying  FAN Yong-Jian  LI Cui-Ping and LI De-Ying
Affiliation:Key Laboratory of Data Engineering and Knowledge Engineering of the Ministry of Education Renmin University of China, Beijing 100872, China;School of Information, Renmin University of China, Beijing 100872, China,Key Laboratory of Data Engineering and Knowledge Engineering of the Ministry of Education Renmin University of China, Beijing 100872, China;School of Information, Renmin University of China, Beijing 100872, China,Key Laboratory of Data Engineering and Knowledge Engineering of the Ministry of Education Renmin University of China, Beijing 100872, China;School of Information, Renmin University of China, Beijing 100872, China,School of Information and Electrical Engineering, Hebei University of Engineering, Handan 056038, China,Key Laboratory of Data Engineering and Knowledge Engineering of the Ministry of Education Renmin University of China, Beijing 100872, China;School of Information, Renmin University of China, Beijing 100872, China and Key Laboratory of Data Engineering and Knowledge Engineering of the Ministry of Education Renmin University of China, Beijing 100872, China;School of Information, Renmin University of China, Beijing 100872, China
Abstract:This paper provides a state-of-the-art survey of location privacy-preserving techniques in WSNs. First, the network model, the attack model and the performance evaluation model are reviewed. Then, existing work is classified into four types, including path camouflage, entrapment attracting, network anonymity and communication control. Further, the key mechanisms of typical location privacy-preserving protocols are elaborated. Performance analysis and comparison show that all these four strategies affect communication and energy efficiency in some degree. In addition, the path camouflage strategy mainly aims at hop-by-hop trace attack, the network anonymity strategy aims at ID analysis attack, while the entrapment attraction and communication control strategies are capable of resisting multiple types of attacks. Finally, suggestions for future research are provided.
Keywords:wireless sensor networks  location privacy preservation  path camouflage  entrapment attraction  network anonymity  communication control
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《软件学报》浏览原始摘要信息
点击此处可从《软件学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号