Research of location privacy protection in wireless sensor network

For deeply studying and solving the problems of location privacy protection in WSN,characteristics and models of location privacy protection were analyzed,schemes of location privacy protection were categorized by source,base station and the classification of their technologies.The merits and demeri...

Full description

Saved in:
Bibliographic Details
Main Authors: Ren-ji HUANG, Qing YE, Qian WU
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2017-11-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00212
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841530149765382144
author Ren-ji HUANG
Qing YE
Qian WU
author_facet Ren-ji HUANG
Qing YE
Qian WU
author_sort Ren-ji HUANG
collection DOAJ
description For deeply studying and solving the problems of location privacy protection in WSN,characteristics and models of location privacy protection were analyzed,schemes of location privacy protection were categorized by source,base station and the classification of their technologies.The merits and demerits in different attack types,security,efficiency and energy consumption were compared and the future research orientation was previewed.
format Article
id doaj-art-91bf6e81608c455ebeb2c47555024742
institution Kabale University
issn 2096-109X
language English
publishDate 2017-11-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-91bf6e81608c455ebeb2c475550247422025-01-15T03:12:27ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2017-11-013596759552162Research of location privacy protection in wireless sensor networkRen-ji HUANGQing YEQian WUFor deeply studying and solving the problems of location privacy protection in WSN,characteristics and models of location privacy protection were analyzed,schemes of location privacy protection were categorized by source,base station and the classification of their technologies.The merits and demerits in different attack types,security,efficiency and energy consumption were compared and the future research orientation was previewed.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00212wireless sensor networklocation privacy protectionphantom routingfake data packet injection
spellingShingle Ren-ji HUANG
Qing YE
Qian WU
Research of location privacy protection in wireless sensor network
网络与信息安全学报
wireless sensor network
location privacy protection
phantom routing
fake data packet injection
title Research of location privacy protection in wireless sensor network
title_full Research of location privacy protection in wireless sensor network
title_fullStr Research of location privacy protection in wireless sensor network
title_full_unstemmed Research of location privacy protection in wireless sensor network
title_short Research of location privacy protection in wireless sensor network
title_sort research of location privacy protection in wireless sensor network
topic wireless sensor network
location privacy protection
phantom routing
fake data packet injection
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00212
work_keys_str_mv AT renjihuang researchoflocationprivacyprotectioninwirelesssensornetwork
AT qingye researchoflocationprivacyprotectioninwirelesssensornetwork
AT qianwu researchoflocationprivacyprotectioninwirelesssensornetwork