计算机科学 ›› 2018, Vol. 45 ›› Issue (5): 102-107.doi: 10.11896/j.issn.1002-137X.2018.05.018
汪卫星
WANG Wei-xing
摘要: 无线体域网作为一种新型网络,被广泛应用到健康医疗、紧急救护等领域。然而,无线体域网收集到的数据大部分都是与用户个人有关的信息,在实际的应用部署过程中必然会面临严重的敏感隐私数据泄露或者被恶意篡改的风险。为了保证体域网环境下用户数据的隐私安全性,提出了一种数据安全混合传输机制,即基于多环模式的K匿名混合传输算法(AMT-ML),其主要思想是对通信节点进行网络划分,将其分成若干个通信环网络,并将K匿名方案应用到层次模型的感知层与传输层,通过进行多次K匿名处理来保证每一层的用户数据在概率上是相对安全的。实验结果显示,AMT-ML算法的隐私保护性优于基于单环模式的K匿名混合传输算法(AMT-SL),二层网络中多环模式的通信距离也小于单环模式的通信距离。
[1] MAINANWAL V,GUPTA M,UPADHAYAY S K.A survey on wireless body area network:Security technology and its design methodology issue[C]∥International Conference on Innovations in Information,Embedded and Communication Systems.Coimbatore:IEEE Press,2015:1-5. [2] GONG J B,WANG R,CUI L.Research Ddvances and Challenges of body Sensor network[J].Journal of Computer Research and Development,2010,7(5):737-753.(in Chinese) 宫继兵,王睿,崔莉.体域网BSN的研究进展及面临的挑战[J].计算机研究与发展,2010,7(5):737-753. [3] LIU L,XUE X Q,LUO X L.Architecture and Challenges ofWireless Body Area Network[J].Computer Knowledge and Technology,2012,8(29):6918-6920.(in Chinese) 刘璐,薛秀芹,罗先露.无线体域网的体系结构及面临的挑战[J].电脑知识与技术,2012,8(29):6918-6920. [4] ZHOU J,CAO Z,DONG X,et al.4S:A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks[J].Information Sciences,2015,314(2):255-276. [5] VENKATASUBRAMANIAN K K,BANERJEE A,GUPTA S K S.PSKA:usable and secure key agreement scheme for body area networks[J].Information Technology in Biomedicine,2010,14(1):60-68. [6] LI X,IBRAHIM M H,KUMARI S,et al.Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks[J].Computer Networks,2017,115(1):1-15. [7] GALUBA W,PAPADIMITRATOS P,P OTURALSKI M,et al.Castor:scalable secure routing for ad hoc networks[C]∥Proceedings of IEEE INFOCOM.San Diego:IEEE Press,2010:1-9. [8] DEFRAWY K E,TSUDIK G.Privacy-preserving location-based on-demand routing in MANETs[J].Selected Areas in Communications,2011,29(10):1926-1934. [9] JARADAT T,BENHADDOU D,BALAKRISHNAN M,et al.Energy efficient cross-layer routing protocol in Wireless Sensor Networks based on fuzzy logic[C]∥Wireless Communications and Mobile Computing Conference.Sardinia:IEEE Press,2013:177-182. [10] WANG H,YANG G,XU J,et al.A reliable data transmission protocol based on multipath routing for wireless sensor networks[J].Sensor Letters,2016,14(9):923-927. [11] QUANG P T A,KIM D S.Clustering algorithm of hierarchical structures in large-scale wireless sensor and actuator networks[J].Journal of Communications & Networks,2015,17(5):473-481. [12] REN J,ZHANG Y,ZHANG K,et al.Adaptive and channel-aware detection of selective forwarding attacks in wireless sensor networks[J].IEEE Transactions on Wireless Communications,2016,15(5):3718-3731. [13] SHARMILEE K M,MUKESH R,DAMODARAM A,et al.Secure WBAN using rule-based IDS with biometrics and MAC authentication[C]∥International Conference on E-Health Networking.Singapore:IEEE Press,2008:102-107. [14] SHAO M,YANG Y,ZHU S C,et al.Towards statisticallystrong source anonymity for sensor networks[C]∥The 27th Conference on Computer Communications(INFOCOM 2008).Phoenix:IEEE Press,2008:51-55. [15] CHEN S L.A Power-Efficient Adaptive Fuzzy Resolution Control System for Wireless Body Sensor Networks[J].Access IEEE,2015,3:743-751. |
No related articles found! |
|