XIAO Mingjun, HUANG Liusheng, XU Hongli, WANG Yang, PEI Zegen. Privacy Preserving Hop-distance Computation inWireless Sensor Networks[J]. Chinese Journal of Electronics, 2010, 19(1): 191-194.
Citation: XIAO Mingjun, HUANG Liusheng, XU Hongli, WANG Yang, PEI Zegen. Privacy Preserving Hop-distance Computation inWireless Sensor Networks[J]. Chinese Journal of Electronics, 2010, 19(1): 191-194.

Privacy Preserving Hop-distance Computation inWireless Sensor Networks

More Information
  • Received Date: December 31, 1899
  • Revised Date: December 31, 1899
  • Published Date: January 04, 2010
  • How to protect the location privacy is an
    important security issue in wireless sensor network. Pre-
    vious works mainly focus on the routing-level location pri-
    vacy problems. This paper however introduces a data-level
    location privacy problem, i:e., the Privacy preserving hop-
    distance computation (PPHC) problem, and proposes a
    PPHC protocol to solve this problem. In this protocol, the
    data disguise techniques in the secure multi-party compu-
    tation ¯eld is successfully applied to protect the location
    privacy of each participant. The most advantage of this
    protocol is that it does not require any trusted third-party
    or encryption operations, and thus has a much better per-
    formance than the traditional solution generally based on
    a trusted third-party and encryption operations. The per-
    formance analysis shows that the computational overhead
    of this protocol is only O(1), and the communication over-
    head is dominated by two rounds of message delivery.
  • Related Articles

    [1]LI Shundong, ZHANG Mengyu and XU Wenting. Secure Scalar Product Protocols[J]. Chinese Journal of Electronics, 2021, 30(6): 1059-1068. DOI: 10.1049/cje.2021.08.002
    [2]SHAN Ruiting, CHEN Xiubo, XU Gang, DOU Zhao, LI Zongpeng, MIAO Lihua, YANG Yixian. Verifiable Multi-Party Universal Blind Quantum Computing in Distributed Networks[J]. Chinese Journal of Electronics, 2021, 30(4): 712-718. DOI: 10.1049/cje.2021.05.013
    [3]YANG Changsong, TAO Xiaoling, ZHAO Feng, WANG Yong. Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud Computing[J]. Chinese Journal of Electronics, 2020, 29(2): 273-280. DOI: 10.1049/cje.2020.02.015
    [4]SU Mang, LI Fenghua, SHI Guozhen, GENG Kui, XIONG Jinbo. A User-Centric Data Secure Creation Scheme in Cloud Computing[J]. Chinese Journal of Electronics, 2016, 25(4): 753-760. DOI: 10.1049/cje.2016.07.017
    [5]HUANG Qinlong, MA Zhaofeng, YANG Yixian, FU Jingyi, NIU Xinxin. EABDS: Attribute-Based Secure Data Sharing with Efficient Revocation in Cloud Computing[J]. Chinese Journal of Electronics, 2015, 24(4): 862-868. DOI: 10.1049/cje.2015.10.033
    [6]WANG Kai, LIU Yulin, WAN Qun, JING Xiaojun. Compressed Sensing of IR-UWB Wireless Sensor Network Data Based on Two-Dimensional Measurements[J]. Chinese Journal of Electronics, 2015, 24(3): 627-632. DOI: 10.1049/cje.2015.07.032
    [7]WANG Kai, LIU Yulin, WAN Qun, JING Xiaojun. Compressed Sensing of Wireless Sensor Networks Data with Missed Measurements[J]. Chinese Journal of Electronics, 2015, 24(2): 388-392. DOI: 10.1049/cje.2015.04.027
    [8]XIAO Mingjun, HUANG Liusheng, XING Kai, LIU An. Opportunistic Data Aggregation in Low-Duty-Cycle Wireless Sensor Networks with Unreliable Links[J]. Chinese Journal of Electronics, 2013, 22(3): 599-603.
    [9]CHENG Hongbing, RONG Chunming, TAN Zhenghua, ZENG Qingkai. Identity Based Encryption and Biometric Authentication Scheme for Secure Data Access in Cloud Computing[J]. Chinese Journal of Electronics, 2012, 21(2): 254-259.
    [10]LUO Yonglong, HUANG Liusheng, YANG Wei, XU Weijiang. An Effcient Protocol for Private Comparison Problem[J]. Chinese Journal of Electronics, 2009, 18(2): 205-209.

Catalog

    Article Metrics

    Article views (1095) PDF downloads (1118) Cited by()
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return