PENG Hui
Key Laboratory of Data Engineering and Knowledge Engineering of the Ministry of Education Renmin University of China, Beijing 100872, China;School of Information, Renmin University of China, Beijing 100872, ChinaCHEN Hong
Key Laboratory of Data Engineering and Knowledge Engineering of the Ministry of Education Renmin University of China, Beijing 100872, China;School of Information, Renmin University of China, Beijing 100872, ChinaZHANG Xiao-Ying
Key Laboratory of Data Engineering and Knowledge Engineering of the Ministry of Education Renmin University of China, Beijing 100872, China;School of Information, Renmin University of China, Beijing 100872, ChinaFAN Yong-Jian
School of Information and Electrical Engineering, Hebei University of Engineering, Handan 056038, ChinaLI Cui-Ping
Key Laboratory of Data Engineering and Knowledge Engineering of the Ministry of Education Renmin University of China, Beijing 100872, China;School of Information, Renmin University of China, Beijing 100872, ChinaLI De-Ying
Key Laboratory of Data Engineering and Knowledge Engineering of the Ministry of Education Renmin University of China, Beijing 100872, China;School of Information, Renmin University of China, Beijing 100872, ChinaThis paper provides a state-of-the-art survey of location privacy-preserving techniques in WSNs. First, the network model, the attack model and the performance evaluation model are reviewed. Then, existing work is classified into four types, including path camouflage, entrapment attracting, network anonymity and communication control. Further, the key mechanisms of typical location privacy-preserving protocols are elaborated. Performance analysis and comparison show that all these four strategies affect communication and energy efficiency in some degree. In addition, the path camouflage strategy mainly aims at hop-by-hop trace attack, the network anonymity strategy aims at ID analysis attack, while the entrapment attraction and communication control strategies are capable of resisting multiple types of attacks. Finally, suggestions for future research are provided.
彭辉,陈红,张晓莹,范永健,李翠平,李德英.无线传感器网络位置隐私保护技术.软件学报,2015,26(3):617-639
Copy