用户名: 密码: 验证码:
WSN中的安全隐私技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着无线传感器网络的应用深入到日常生活领域,如何保护隐私成为一个至关重要的问题。借助无线传感器网络,很容易收集个人信息。有的机构甚至把个人信息当作商品,进行收集、交换和出售,人们对这些行为越来越警觉,希望保护自己的隐私。隐私已成为无线传感器网络成功应用的一大障碍。如果没有提供适当的隐私保护,无线传感器网络就不能应用于这些领域。
     当无线传感器网络用于日常生活领域,监控对象的敏感数据隐私成为一个重要问题,因此需要提供有效的数据融合隐私保护。然而,现有的技术没有提供隐私分级且能耗较大。为了保护数据融合隐私,在隐私分级的基础上,提出数据融合隐私分级保护,基于参与预处理数据的节点数而提供不同的隐私级。根据所需隐私级,同一簇内的所有节点被分为多个组,同一组内的所有节点具有相同的隐私级,数据仅在同一组内进行处理。与存在的技术比较,数据融合隐私分级保护在确保期望的隐私级时,具有较低的能耗。
As applications of wireless sensor networks embed daily life domians, how protecting privacy becomes a most main problem. Collecting personal information becomes easily by wireless sensor networks. Some organizations are collecting, swapping, and selling personal information as a commodity, and people are becoming aware of these practices and looking to protect their privacy. Privacy concerns have emerged as the main obstacle to success applications of wireless sensor networks. Without offering proper privacy protection, wireless sensor networks could not apply to those domains.
     When wireless sensor networks are used in everyday life, the privacy about monitored object’sensitive data becomes an important issue. Consequently, providing efficient data aggregation privacy protection is desirable. However, the existing technique is always energy exhausting, and does not consider different privacy levels of data aggregation. In this paper, Data Aggregation Different Privacy-Levels Protection is proposed to deal with data aggregation privacy protection. Data Aggregation Different Privacy-Levels Protection offers different levels of data aggregation privacy based on different node-numbers for pre-treating data. According to desired privacy level, all nodes within the same cluster are partitioned into many groups, any group including node-numbers belong to the same privacy level. Data are pretreated only in the same group. Compared with the existing technique, Data Aggregation Different Privacy-Levels Protection has lower energy costs while ensuring expected privacy level.
引文
[1]周贤伟主编;覃伯平,徐福华编着.无线传感器网络与安全.北京:国防工业出版社,2007.6.
    [2]曾志峰,邱慧敏,朱龙海.无线传感器网络中的安全威胁分析及对策.计算机应用研究, 2007,24(1):140-143.
    [3]戴宁江,邱慧敏.无线传感器网络的安全问题及对策.中国无线电, 2006年10期:47-50.
    [4]于海斌,曾鹏,梁韦华编著.智能无线传感器网络系统.北京:科学出版社,2006
    [5]王殊,阎敏杰,胡富平,屈晓旭编著.无线传感器网络的理论及应用.北京:北京航空航天大学出版社,2007.7
    [6]李建中,高宏.无线传感器网络的研究进展.计算机研究与发展,2008,45(1):1-15.
    [7]Eschenauer L, Gligor V D. A key-management scheme for distributed sensor networks, in Proceedings of the 9th ACM conference on Computer and communications security, November 2002.
    [8]Chan H, Perrig A, Song D. Random Key Pre-distribution Schemes for Sensor Networks, in Proc.of the IEEE Security and Privacy Symposim 2003,2003.
    [9]Perrig A, Szewczyk R, Wen V, Culler D, Tygar J D. SPINS: Security Protocols for Sensor Networks. In Proceedings of the Seventh Annual International Conference on Mobile Computing and Networking, pages 189–199. ACM Press, 2001. [ 10 ] Ozturk C, Zhang Y, Trappe W, Ott M. Source-location privacy for networks of energy-constrained sensor. In Proceedings of 2nd IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems(WSTFEUS’04), May 2004.
    [11] Chan H, Perrig A. Security and privacy in sensor networks. IEEE Computer Magazine, pages 103-105, 2003 2003.
    [12] Perrig A, Stankovic J, Wagner D. Security in wireless sensor networks. Commun. ACM, 47(6):53–57, 2004.
    [13] Gruteser M, Schell G, Jain A, et. al. Privacy-aware location sensor networks. In 9th USENIX Workshop on Hot Topics in Operating Systems (HotOS), 2003.
    [14]Lai B, Kim S, Verbauwhede I. Scalable session key construction protocol for wireless sensor networks, In IEEE Workshop on Large Scale RealTime and Embedded Systems (LARTES), Austin, Texas, December 2002.
    [15]Sanchez D. Baldus H. or V D. Deterministic Pairwise Key Pre-distribution Scheme for Mobile Sensor Networks. Proc. Of the First International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005:277-288.
    [16]Liu D, Ning P. Location-based pairwise key establishment for static sensor networks, in 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, 2003.
    [17]Du W, Deng J, Han Y, Chen S, Varshney P. A key management scheme for wireless sensor networks using deployment knowledge, in IEEE Infocom04, 2004.
    [18]Camtepe S A, Yener B. Combinatorial design of key distribution mechanisms for wireless sensor networks, in 9th European Symposium on Research Computer Security, 2004.
    [19]Du W, Deng J, Han Y, Chen S, Varshney P. A pairwise key pre-distribution scheme for wireless sensor networks, in Proceedings of the 10th ACM conference on Computer and Communications Security CCS03, 2003.
    [20]Liu D, Ning P. Establishing pairwise keys in distributed sensor networks, in 10th ACM conference on Computer and communications security CCS03, 2003.
    [21]Blundo C, Santis A, Herzberg A, Kutten S, Vaccaro U, Yung M. Perfectly-secure key distribution for dynamic conferences, in Crypto 92, 1992.
    [22]Mahimkar A, Rappaport T S. SecureDAV: A Secure Data Aggregation and Verification Protocol for Sensor Networks, Proceedings of IEEE Global Telecommunications Conference (Globecom) 2004, Nov, 2004, Dallas, TX, USA.
    [23] Gruteser M, Grunwald D. A methodological assessment of location privacy risks in wireless hotspot networks. In First International Conference on Security in Pervasive Computing, 2003.
    [24]Deng J, Han R, Mishra S.“Countermeasures against traffic analysis attacks in wireless sensor networks,”in SECURECOMM’05: Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM’05).Washington, DC, USA: IEEE Computer Society, 2005, pp. 113–126.
    [25]Misra S, Xue G.“Efficient anonymity schemes for clustered wireless sensor networks,”International Journal of Sensor Networks, vol. 1, no. 1/2, pp. 50–63, 2006.
    [26]Ouyang. Y, Le. Z, Xu. Y, Triandopoulos. N, Zhang. S, Ford. J, Makedon. F.“providing anonymity in wireless sensor networks.”in 10th International. Conference on Parallel and Distributed Systems (ICPADS 2004), 7-9.
    [27]Wadaa A, Olariu S, Wilson L, Eltoweissy M, Jones K.“On providing anonymity in wireless sensor networks.”in 10th International Conference on Parallel and Distributed Systems (ICPADS 2004), 7-9 July 2004, Newport Beach, CA, USA, 2004, pp. 411–418.
    [28]Molnar D, Wagner D. Privacy and security in library rfid:Issues, practices, and architectures. In ACM CCS,2004.
    [29]Shao M, Zhu S, Zhang W, Cao G. pDCS: Security and Privacy Support for Data-Centric Sensor Networks, IEEE INFOCOM 2007.
    [30]Girao J, Westhoff D, Schneider M.“CDA: Concealed Data Aggregation for Reverse Multicast Traffic in Wireless Sensor Networks,”in 40th International Conference on Communications, IEEE ICC, May 2005.
    [31]Castelluccia C, Mykletun E, Tsudik G.“Efficient Aggregation of Encrypted Data in Wireless Sensor Networks,”Mobiquitous, 2005.
    [32]He W, Liu X, Nguyen H, Nahrstedt K, Abdelzaher T. "PDA: Privacy-preserving Data Aggregation in Wireless Sensor Networks, ", 26th Annual IEEE Conference on ComputerCommunications IEEE INFOCOM 2007, Anchorage, Alaska, May 2007.
    [33]Wood A D, Stankovic J A.Denial of Service in Sensor Networks[J].IEEE Computer,2002,35 (10):54-62.
    [34]Carbunar B, Yu Y, Shi L, Pearce M, Vasudevan V.“Query privacy in wireless sensor networks”. Sensor, Mesh and Ad Hoc Communications and Networks, 2007. SECON '07. 4th Annual IEEE Communications Society Conference on 18-21 June 2007 Page(s):203 - 212
    [35]Deng J, Han R, Mishra S. INSENS:Intrusion- tolerant Routing in Wireless Sensor Network Security[R]. Tech. Rep. CU-CS-939-02. Department of Computer Science,University of Colorado,November 2002.
    [36]Xi Y, Schwiebert L, Shi W. Preserving privacy in monitoring-based wireless sensor networks, in Proceedings of the 2nd International Morkshop on Security in Systems and Networks (SSN’06), IEEE Computer Society, 2006.
    [37]Ouyang Y, Le X, Chen G, Ford J, Makedon F.“Entrapping adversaries for source protection in sensor networks”. World of Wireless, Mobile and Multimedia Networks, 2006. WoWMoM 2006. International Symposium on a 26-29 June 2006 Page(s):10 pp.
    [38]Kiran Mehta, Donggang Liu, Mathew Wright, Location Privacy in Sensor Networks Against a Global Eavesdropper, in Proceedings of the IEEE International Conference on Network Protocols (ICNP 2007) (acceptance rate 14.5%), October 2007.
    [39]M. Bohge andW. Trappe, "An authentication framework for hierarchical ad hoc sensor networks," in Proc. of the 2003 ACM Workshop on Wireless Security, 2003, pp. 79–87.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700