通信学报 ›› 2018, Vol. 39 ›› Issue (10): 130-142.doi: 10.11959/j.issn.1000-436x.2018101

• 综述 • 上一篇    下一篇

无线传感器网络隐私保护数据聚集技术

张晓莹1,2,彭辉3,陈红1,2()   

  1. 1 中国人民大学信息学院,北京 100872
    2 中国人民大学数据工程与知识工程教育部重点实验室,北京 100872
    3 工业和信息化部电子第五研究所,广东 广州 510000
  • 修回日期:2018-04-08 出版日期:2018-10-01 发布日期:2018-11-23
  • 作者简介:张晓莹(1987-),女,山东临沂人,博士,中国人民大学工程师,主要研究方向为物联网数据管理、隐私保护等。|彭辉(1986-),男,山东曲阜人,博士,工业和信息化部电子第五研究所工程师,主要研究方向为物联网数据管理、隐私保护等。|陈红(1965-),女,江西鄱阳人,博士,中国人民大学教授、博士生导师,主要研究方向为数据库、数据仓库、物联网等。
  • 基金资助:
    国家自然科学基金资助项目(61532021);国家自然科学基金资助项目(61772537);国家自然科学基金资助项目(61772536);国家自然科学基金资助项目(61702522);国家重点研究发展计划基金资助项目(2016YFB1000702)

State-of-the-art survey of privacy-preserving data aggregation in wireless sensor networks

Xiaoying ZHANG1,2,Hui PENG3,Hong CHEN1,2()   

  1. 1 School of Information,Renmin University of China,Beijing 100872,China
    2 Key Laboratory Data Engineering and Knowledge Engineering of Ministry of Education,Renmin University of China,Beijing 100872,China
    3 The Fifth Electronic Research Institute of MIIT,Guangzhou 510000,China
  • Revised:2018-04-08 Online:2018-10-01 Published:2018-11-23
  • Supported by:
    The National Natural Science Foundation of China(61532021);The National Natural Science Foundation of China(61772537);The National Natural Science Foundation of China(61772536);The National Natural Science Foundation of China(61702522);The National Key R & D Program of China(2016YFB1000702)

摘要:

对无线传感器网络隐私保护数据聚集技术的研究现状与进展进行了综述。首先介绍研究相关的基础知识,包括网络模型、攻击模型和性能评估指标;然后按照同态加密、数据扰动、切分重组、泛化、安全多方计算等隐私保护技术对现有研究成果进行分类,详细阐述了具有代表性的协议的核心技术,对比分析了的各协议的性能;最后,对未来研究方向进行了展望。

关键词: 隐私保护, 数据聚集, 无线传感器网络, 物联网

Abstract:

A state-of-the-art survey of privacy-preserving data aggregation techniques in wireless sensor networks was reviewed.Firstly,preliminaries were introduced,including network models,adversary models,and performance evaluation metrics.Secondly,existing related work was classified into several types according to privacy preservation techniques,such as homomorphic encryption,data perturbation,slicing-mixing technique,generalization,secure multiparty computation,and the key mechanisms of typical protocols were elaborated and analyzed.Finally,the promising future research directions were discussed.

Key words: privacy preservation, data aggregation, wireless sensor networks, internet of things

中图分类号: 

No Suggested Reading articles found!