用户名: 密码: 验证码:
物联网感知环境安全机制的关键技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
近年来,随着RFID技术的成熟和移动智能终端的迅猛发展,物联网越来越受到重视,将成为继互联网之后的又一次革命。然而,与传统互联网应用相比,采用RFID设备和智能终端为支撑技术的物联网应用,存在更复杂更严重的安全问题。例如信任机制、隐私保护、可信路由和恶意行为检测,已经成为构建安全可信物联网需解决的关键问题,对其深入分析和研究对于提高物联网基础设施的安全性乃至整个物联网安全体系具有重要意义。本文在总结现有工作的基础上,针对物联网安全的若干关键技术问题进行了深入研究。
     首先,物联网环境下存在大规模、非集中且异构的服务,应用中各主体间(人与物,物与物,物与设施)的信任是条件的且环境依赖的。针对不同应用中多种主体之间的复杂信任关系,本文提出了一个通用的层次化物联网信任架构,为建立可信的物联网应用提供了基础理论和技术支持。在感知层和接入层,针对其动态性的特点,设计基于证据理论的事件推导规则,并改善了Dempster冲突,通过推导异常路由事件有效评估中继设施的路由信任;对于终端节点交互时的信任,使用缓存前次交互摘要的机制来检测终端设施恶意行为,解决了事件监听受RFID短距通信距离限制的缺点;并针对应用层机构稳定的特征,采用集中式的信誉机制维护机构信任。分层设计有效地隔离了异构环境下的信任差异,同时通过层间的信任流交互实现系统的信任快速收敛:对阅读器的动态授权需参考其所在机构的信誉,而底层阅读器的授权信任和路由信任向上层汇聚,反馈到机构信誉。
     接着,针对物联网中的物体定位应用,本文设计了一种通用的查询框架,可支持任意类型物体的精确和模糊位置查询;又针对现有位置服务难以抵御攻击者使用多身份持续查询的弱点,提出了一种基于匿名树和框结构的位置隐私保护机制,为面向智能终端的服务提供了位置隐私保护。在物理层使用多点协作定位计算物体的相对位置,从而确定最小匿名区域;在网络层上生成和维护匿名树拓扑结构,为多匿名组提供存储管理支持;在应用层中物体根据查询者的身份确定对应匿名度,使用框结构构造并返回与现有匿名组一致的新匿名组,可防止持续多精度查询攻击。与现有方法相比,基于匿名树的方法中匿名组的公共子集合更大,建组的时间开销更小。
     物联网的感知环境较为复杂,感知节点的所属机构、服务需求和可信度存在差异,本文提出一种基于团的路由方法,在保证数据路由的可信安全同时,维持路由协议的高效可靠。通过构造团结构,缩短路由的逻辑路径,减少因中继节点策略不兼容造成的路由失效,同时降低路由时间开销。
     最后,我们分析了一种恶意机构在动态感知环境中获得局部优势的攻击场景,并提出了一种节点协作的动态博弈方法,防止局部占优的恶意行为。首先将多个报告节点合并成一个博弈方,与检测节点建立两方动态博弈;然后在恶意节点占优的环境中,检测节点进行协作,通过报告节点的机构信誉值推测未知节点状态;使用高信任度的参考报告进行修正,降低了恶意节点在整体报告和节点合并中的权重,最后达到贝叶斯均衡。机构协作博弈可明显提高检测节点的事件监测成功率,大幅降低伪造报告数量。
With maturation of the RFID technology and fast growth of smart terminals,Internet of Things is gaining more and more attention and is probably becominganother industrial revolution after the Internet. However, applications using RFIDdevices or smart terminals face more and severer security issues compared to thetraditional Internet applications: entity trust, privacy protection, securing routingand intrusion detection, for instance, which are the key problems when building asecure and trustworthy IoT environment. Analyses and researches of these keyissues is of important significance for reinforcing the infrastructures and the wholeIoT system. Based on the existing works and ideas, this dissertation conducts furtherresearches aiming to find effective and efficient solutions to the critical issues.
     First of all, there are distributed and decentralized services in the IoTenvironments, trust of entities(human-human, object-object and object-infrastructure)is conditional and environment-dependent. We build a general hierarchical IoT trustmodel for theoretical and practical support. Event deduction is employed in theaccess and sensing layers, the improved D-S deduction detects abnormal routingevents efficiently while a VICD schema is designed to detect terminal node trust andovercomes the RFID short range limitation. In the organization layer, a centralizedschema is employed to maintain organization reputation. The organizationreputation is calculated by node trust feedback, the layered design seperates trustheterogeneity of different entities, meanwhile the trust flow interacts between layers:node authorization refers to the organization reputation, and the authorization trustand routing trust converges upwards to the organization reputation.
     Secondly, in the object locating applications, we design a location update andquery architecture supporting precise and fuzzy queries for all kinds of objects, thenwe propose a tree and frame based location privacy protection schema, whichprevents possible multi-precision continuous attacks. An improved trilaterationmethod is used to identify objects’ relative locations on the physical layer, ananonymity-tree is maintained for topology stability and query efciency on thenetwork layer and a frame based group building approach is proposed to maximizeconsistency of existing anonymity groups. The proposed approach generates largercommon subset of built anonymity groups and protects location privacy efficiently.
     Thirdly, the belonging organizations, service required and trust of sensingnodes are heterogeneous since the IoT environment is complicated. We propose aclique-based routing approach, which guarantees the routing control security,meanwhile improves routing efficiency and reliability. Routing failure caused by incompatible strategy is reduced by constructing clique structure and shortening thelogical path.
     Finally, we introduce an possible attack scenario in which maliciousorganizations deploy numerous RFID readers in a partial region. We frst combinethe report nodes together and form a two-player dynamic game with a detectingnode in a regular network, then we propose an improved cooperative game in theattacker dominated network where detecting nodes cooperate to evaluate trust of anunknown node by its organization reputation, the node’s prior trust and nodecombination are updated according to a trustworthy reference report, thereforemalicious node weights are reduced meanwhile a new Bayes equilibrium is achieved.The cooperative game improves successful deduction rate and decreases forgedreports signifcantly.
引文
[1] ITU, The Internet of Things[M/OL], http://www.itu.int/osg/spu/publications/internetofthings/
    [2] Bassi D, Horn G, Internet of Things in2020, Roadmap for the Future[M/OL], http://www.iot-visitthefuture.eu/fileadmin/documents/researchforeurope/270808_IoT_in_2020_Workshop_Report_V1-1.pdf
    [3] Commission of the European, Internet of Things-An action plan for Europe[M/OL], http://ec.europa.eu/information_society/policy/rfid/documents/commiot2009.pdf
    [4]朱顺兵,魏秋萍,杜春泉,物联网感知安全应用的研究与展望[J],中国安全科学学报,2010,11(11):164-170
    [5] Atzori L, Iera A, Morabito G, The Internet of Things: A survey[J], Computer Networks,2010,54(15):2787-2805
    [6] Dunkels A, IP for Smart Objects v1.1-IPSO Alliance[M/OL],http://ipso-alliance.org/downloads/Why+IP
    [7] Allen S, Calcaterra G, Gray M, Nair R, Pahwa S, Robertson E, RFID Tagging: Final Report[M/OL]:http://www.rahulnair.net/files/RFID_Final_Report.pdf
    [8] Duc K, Lee D N, Kim H, Enhancing security of EPCglobal GEN-2RFIDtag against traceability and cloning, Auto-ID Labs Information and Communication University, White Paper[M/OL],http://www.autoidlabs.org/uploads/media/AUTOIDLABS-WP-SWNET-016.pdf
    [9] Nilssen A, Security and Privacy Standardisation in Internet of Things[C],The Future Internet-Internet of Things International Workshop,Oslo, Norway,2009:1-23.
    [10]Mulligan M, The6LoWPAN architecture[C], Proceedings of the4th workshop on embedded networked sensors,2007:78-82
    [11]Paul C, Praxis C, Gertjan A, RFID Standardisation State of the art report[M/OL],http://www.grifs-project.eu/index.php/downloads/en/
    [12]Elloumi O and Forlivesi C, ETSI M2M Services Architecture[J], M2M Communications,2012:95-140
    [13]INOUE T, Multi-Applications for Applications for RFID in Japan[M/OL],www.oecd.org/sti/interneteconomy/35465977.pdf
    [14]Xi Y, Sha K, Shi W, Scnwiebert L, Zhang T, Enforcing Privacy Using Symmetric Random Key-Set in Vehicular Networks[C], Eighth InternationalSymposium on Autonomous Decentralized Systems (ISADS’07),2007:344-351
    [15]Crescenzo G, Zhang T, Pietrowicz S, Anonymity Notions for Public-KeyInfrastructures in Mobile Vehicular Networks[C],2007IEEE InternatonalConference on Mobile Adhoc and Sensor Systems,2007:1-6
    [16]Medaglia C M, Serbanati A, An Overview of Privacy and Security Issuesin the Internet of Things[J], the Internet of Things,2010:389-395
    [17]Urien P, Elrharbi S, Icart T, Pépin C, Cunha D, etc, HIP tags privacy architecture[C], Systems and Networks Communications, ICSNC’08,2008:179-184
    [18]Urien P, Chabanne H, Toumi K, Krzanik P, HIP-tags architecture implementation for the Internet of things[C],2009First Asian Himalayas International Conference on Internet,2009:1-5
    [19]Han H, Sheng B, Tan C, Li Q, Mao W, Lu S, Counting RFID Tags Efficiently and Anonymously[C],2010Proceedings IEEE INFOCOM,2010:1-9
    [20]孙昱,管海兵, P2P网络信任模型研究综述[J],信息安全与通信保密,2009,(4):37-38
    [21]龚洁中,陈恭亮,李林森,李建华,物联网发展中的信任模型缺失[J],信息安全与技术,2011,(10):5-8
    [22]张元,沈苏彬, Ad Hoc网络中信任管理模型的研究与设计[J],西安邮电学院学报,2008,(1):86-90
    [23]McKnight D H, Chervany N L, What trust means in e-commerce customer relationships: an interdisciplinary conceptual typology[J], International Journal of Electronic Commerce,2001,6(2):35-59
    [24]Mcknight D H, Chervany N L, C, What is Trust? A Conceptual Analysisand an Interdisciplinary Model[C], Proceedings of the Americas Conference on Information Systems,2000:827-833
    [25]Carbone M, Nielsen M, Sassone V, A formal model for trust in dynamicnetworks[C], Software Engineering and Formal Methods,2003:54-61
    [26]Blaze M, Feigenbaum J, Decentralized trust management[J], Security andPrivacy,1996:164-173
    [27]Huang L, Li L, Tan Q, Behavior-Based Trust in Wireless Sensor Network[C], Advanced Web and Network Technologies, and Applications,2006:214-223
    [28]Yu B, An evidential model of distributed reputation management[C], Proceedings of the first international joint conference on Autonomous agents and multiagent systems,2002,(1):294-301
    [29]Song S, Hwang K, Macwan M, Fuzzy Trust Integration for Security Enforcement in Grid Computing[J], Network and Parallel Computing,2004:9-21
    [30]He R, Niu J, Zhang G, CBTM: A Trust Model with Uncertainty Quantification and Reasoning for Pervasive Computing[C], Parallel and DistributedProcessing and Applications,2005:541-552
    [31]Liu K, Trust modeling and evaluation in ad hoc networks[C], GLOBECOM’05. IEEE Global Telecommunications Conference,2005:1862-1867
    [32]Bruce S, Shaping Things[M]. Cambridge, Massachusetts: MIT Press,2005:1-150
    [33]Raya M, Papadimitratos P, Hubaux J, Securing vehicular ad hoc networks[J], Journal of Computer Security,2007,15(1):39-68
    [34]Perrig A, Canetti R, Tygar J D, Song D, The TESLA broadcast authentication protocol[C], Proceedings of RSA CryptoBytes’02,2002
    [35]Lu R, Lin X, Zhu H, Ho P, Shen X, ECPP: Efficient conditional privacypreservation protocol for secure vehicular communications[C], INFOCOM2008,2008:1229-1237
    [36]Kamat P, Baliga A, and Trappe W, An Identity-Based Security Framework for VANETs[C], in International Conference on Mobile Computing andNetworking Proceedings of the3rd international workshop on Vehicularad hoc networks,2006:94-95
    [37]Tschofenig H, Schulzrinne H, Newton A, Peterson J, and Mankin A, TheIETF Geopriv and presence architecture focusing on location privacy[M],in Position paper at W3C Workshop on Languages for Privacy Policy Negotiation and Semantics-Driven Enforcement, Ispra, Italy,2006.
    [38]Sarma A, Girao J, Identities in the Future Internet of Things[J], Wirelesspersonal communications,2009,49(3):353-363
    [39]Butty L, Buttyán L, Holczer T, Vajda I, On the effectiveness of changingpseudonyms to provide location privacy in VANETs[J], Security and Privacy in Ad-hoc and Sensor,2007:129-141
    [40]Fonseca E, Festag A, Baldessari R, Aguiar R L, Support of Anonymity in VANETs-Putting Pseudonymity into Practice[C],2007IEEE WirelessCommunications and Networking Conference,2007:3400-3405
    [41]Schoch E, Kargl F, Leinmuller T, Schlott S, Papadimitratos P, Impact ofPseudonym Changes on Geographic Routing in VANETs[C], in proceedings of the European Workshop on Security and Privacy in Ad hoc and Sensor Networks (ESAS),2006:43-57
    [42]Sampigethaya K, Li M, Huang L, Poovendran R, AMOEBA: Robust Location Privacy Scheme for VANET[J], IEEE Journal on Selected Areas inCommunications,2007,25(8):1569-1589
    [43]Savry O, Pebay F, Dehmas F, Robert G, Reverdy J, RFID Noisy ReaderHow to Prevent from Eavesdropping on the Communication[C], Cryptographic Hardware and Embedded Systems-CHES2007,2007:334-345
    [44]Juels A, Rivest R, The blocker tag: Selective blocking of RFID tags forconsumer privacy[C], Proceedings of the10th ACM conference on Computer and communications security,2003:103-111
    [45]Duckham M, Kulik L, A Formal Model of Obfuscation and Negotiation for Location Privacy[J], Pervasive Computing,2005:152-170
    [46]Price B, Adam K, Nuseibeh B, Keeping ubiquitous computing to yourself:A practical model for user control of privacy[J], International Journal ofHuman-Computer Studies,2005,(63):228-253
    [47]Chow C, Mokbel M F, Enabling private continuous queries for revealed user locations[J], Advances in Spatial and Temporal Databases,2007:258-275
    [48]Yiu M L, Jensen C S, Huang X, Lu H, SpaceTwist: Managing the Trade-Offs Among Location Privacy, Query Performance, and Query Accuracyin Mobile Services[C],2008IEEE24th International Conference on DataEngineering,2008:366-375
    [49]Bamba B, Liu L, Pesti P, Wang T, Supporting anonymous location queries in mobile environments with privacygrid[C], Proceeding of the17th international conference on World Wide Web-WWW’08,2008:237
    [50]Cranor L F, Web privacy with P3P[M]. O’Reilly Media,2002.
    [51]Wolf W, Cyber-physical systems[J], Embedded Computing,2009,42(3):88-89
    [52]Ganeriwal S, Balzano L K, Srivastava M B, Reputation-based frameworkfor high integrity sensor networks[J], ACM Transactions on Sensor Networks,2008,4(3):1-37
    [53]Li X, Lyu M R, Liu J, A Trust Model Based Routing Protocol for Secure Ad Hoc Networks, Aerospace Conference,2004,(2):1286-1295
    [54]Srinivasan A, Teitelbaum J, Liang H, Wu J, Cardei M, Reputation and trust-based systems for ad hoc and sensor networks[C], Algorithms and Protocols for Wireless Ad Hoc and Sensor Networks,2006
    [55]Alpcan T, Bas T, An Intrusion Detection Game with Limited Observations[C], in Proceedings of the12th Int. Symp. on Dynamic Games and Applications,2006,1(2):1-3
    [56]Xiao B, Yu B, Gao C, Detection and localization of sybil nodes in VANETs[C], International Conference on Mobile Computing and Networking,2006:1
    [57]Yan G, Choudhary G, Weigle M, Olariu S, Providing VANET security through active position detection[J], Computer Communications,2008,(31):2883-2897
    [58]Zhou T, Choudhury R, Ning P, Chakrabarty K, Privacy-Preserving Detection of Sybil Attacks in Vehicular Ad Hoc Networks[C],2007Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking&Services (MobiQuitous),2007:1-8
    [59]Golle P, Greene D, Staddon J, Detecting and correcting malicious data inVANETs[C], in Proceedings of International workshop on Vehicular ad hoc networks (VANET),2004:29-37.
    [60]Raya M, Papadimitratos P, Aad I, Eviction of misbehaving and faulty nodes in vehicular networks[J], Selected Areas in Communications, IEEE Journal,2007,25(8):1-12
    [61]Graffi K, Mogre P S, Hollick M, and Steinmetz R, Detection of Colluding Misbehaving Nodes in Mobile Ad Hoc and Wireless Mesh Networks[C],IEEE GLOBECOM2007-2007IEEE Global Telecommunications Conference,2007:5097-5101
    [62]Ghosh T, Pissinou N, Makki K, Collaborative Trust-based Secure RoutingAgainst Colluding Malicious Nodes in Multi-hop Ad Hoc Networks[C],29th Annual IEEE International Conference on Local Computer Networks,2004:224-231
    [63]Zhong S, WuF, On designing collusion-resistant routing schemes for non-cooperative wireless ad hoc networks[C], Proceedings of the13th annualACM international conference on Mobile computing and networking-MobiCom’07,2007:278
    [64]丁超,杨立君,吴蒙, IoT/CPS的安全体系结构及关键技术[J],中兴通讯技术,2011,17(1):11-16
    [65]马鑫,黄全义,疏学明,马伟,赵全来,物联网在公共安全领域中的应用研究[J],中国安全科学学报,2010,20(007):170-176
    [66]Leusse P, Periorellis P, Dimitrakos T, Nair S K, Self Managed SecurityCell, a security model for the Internet of Things and Services[C], in Advances in Future Internet,2009First International Conference on,2009:47-52
    [67]吴振强,周彦伟,马建峰,物联网安全传输模型[J],计算机学报,2011,34(8):1351-1364
    [68]刘宴兵,胡文平,杜江,基于物联网的网络信息安全体系[J],中兴通讯技术,2011,17(1):17-20
    [69]郭莉,严波,沈延,物联网安全系统架构研究[J],信息安全与通信保密,2010,73-75
    [70]荆琦,唐礼勇,陈钟,无线传感器网络中的信任管理[J],软件学报,2008,19(7):1716-1730
    [71]Resnick P, Trust among strangers in Internet transactions: Empirical analysis of eBay’s reputation system[C], The Economics of the Internet and E-Commerce, Advances in Applied Microeconomics,2002,(11):127-157
    [72]Abdul R, Hailes S, Supporting Trust in Virtual Communities[C], in In Proceedings of the Hawaii International Conference on System Sciences,2000:4-7
    [73]Josang A, The Beta Reputation System[C], in Proceedings of the15th Bled Electronic Commerce Conference,2002,(160):1-14.
    [74]Jameel H, Kalim U, Sajjad A, A Trust Model for Ubiquitous Systems based on Vectors of Trust Values[C], Seventh IEEE International Symposium on Multimedia (ISM’05),2005:674-679
    [75]Ziegler C N and Lausen G, Spreading activation models for trust propagation[C], in e-Technology, e-Commerce and e-Service,2004. EEE’04.2004IEEE International Conference on,2004:83-97.
    [76]Page L, Brin S, Motwani R, and Winograd T, The PageRank citation ranking: Bringing order to the web[M],Stanford InfoLab,1999.
    [77]Josang A, A logic for uncertain probabilities[J], International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems,2001,9(3):279-311
    [78]Resnick P, Zeckhauser R, Swanson J, and Lockwood K, The value of reputation on eBay: A controlled experiment[J], Experimental Economics,2006,9(2):79-101
    [79]Yan Z, Zhang P, Virtanen T, Trust evaluation based security solution inad hoc networks[C], in Proc. of the Nordic Workshop on Secure IT Systems (NORDSEC2003),2003,(14):15-17.
    [80]李勇军,代亚非,对等网络信任机制研究[J],计算机学报,2010,33(3):390-405
    [81]Raya M, Papadimitratos P, Gligor V D, Hubaux J P, On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks[C],2008IEEE INFOCOM-The27th Conference on Computer Communications,2008:1238-1246
    [82]Theodorakopoulos G, Baras J S, On trust models and trust evaluation metrics for ad hoc networks[J], IEEE Journal on Selected Areas in Communications,2006,24(2):318-328
    [83]孙梦梦,刘元安,刘凯明,物联网中的安全问题分析及其安全机制研究[J],保密科学技术,2011:61-66
    [84]孙晶,孙秀娟,赵会群,王卡,物联网中可信机制研究[C],第十四届全国容错计算学术会议,2011:1-10.
    [85]Zhang C, Lin X, Lu R, Ho P, RAISE: An Efficient RSU-aided MessageAuthentication Scheme in Vehicular Communication Networks[C], Communications Society,2008:1451-1457
    [86]Aijaz A, Bochow B, Dotzer F, Festag A, Gerlach M, Kroh R, LeinmullerT, Attacks on Inter Vehicle Communication Systems-an Analysis[C], in3rd International Workshop on Intelligent Transportation,2006.
    [87]Guette G, Ducourthial B, On the Sybil attack detection in VANET[C],2007IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems. Ieee,2007:1-6
    [88]Gerlach M, Trust for vehicular applications, Autonomous Decentralized Systems[C],2007. ISADS’07. Eighth International Symposium,2007:295-304
    [89]Cencioni P and Pietro R D, VIPER: A vehicle-to-infrastructure communication privacy enforcement protocol[C], Mobile Adhoc and Sensor Systems,2008:1-6
    [90]Choi J Y, Jakobsson M, Wetzel S, Balancing auditability and privacy invehicular networks[C], Proceedings of the1st ACM international workshop on Quality of service&security in wireless and mobile networks-Q2SWinet’05,2005:79
    [91]Li C, Hwang M, Chu Y, A secure and efficient communication schemewith authenticated key establishment and privacy preserving for vehicularad hoc networks[J], Computer Communications,2008,31(12):2803-2814
    [92]Guo J, J Baugh, Wang S, A group signature based secure and privacy-preserving vehicular communication framework[C],2007Mobile Networkingfor Vehicular Environments,2007
    [93]Boneh D, Shacham H, Group signatures with verifier-local revocation[C],in Proceedings of the11th ACM conference on Computer and communications security,2004:168-177
    [94]Zhang C, Lu R, Lin X, Ho P, Shen X, An Efficient Identity-Based BatchVerification Scheme for Vehicular Sensor Networks[C],2008IEEE INFOCOM-The27th Conference on Computer Communications,2008:246-250
    [95]Heninger N, Durumeric Z, Wustrow E, Halderman J A, Mining Your Psand Qs: Detection of WidespreadWeak Keys in Network Devices[C], in the21st USENIX Security Symposium,2012:216-231.
    [96]Lee S, Pan G, Park J, Gerla M, Lu S, Secure incentives for commercialad dissemination in vehicular networks[C], Proceedings of the8th ACM international symposium on Mobile ad hoc networking and computing,2007
    [97]Stoica I, Morris R, Karger D, Kaashoek M F, Balakrishnan H, Chord: Ascalable peer-to-peer lookup service for internet applications[J], ACM SIGCOMM Computer Communication Review,2001,31(4):149-160
    [98]Ratnasamy S, Francis P, Handley M, Karp R, Shenker S, A scalable content-addressable network[J], ACM SIGCOMM Computer Communication Review,2001,31(4):161-172
    [99]Oppen D C, Dalal Y K, The clearinghouse: A decentralized agent for locating named objects in a distributed environment[J], ACM Transactions onInformation Systems (TOIS),1983,1(3):230-253
    [100] Kubiatowicz J, Bindel D, Chen Y, Czerwinski S, Eaton P, Geels D, Gummadi R, Rhea S, Weatherspoon H, Weimer W, and others, Oceanstore:An architecture for global-scale persistent storage[J], ACM Sigplan Notices,2000,35(11):190-201
    [101] Zhao B Y, Kubiatowicz J, Joseph A D, and others, Tapestry: An infrastructure for fault-tolerant wide-area location and routing[M], Citeseer,2001.
    [102] Pitoura E, Fudos I, Distributed Location Databases for Tracking Highly Mobile Objects, The Computer Journal,2001,44(2):75-91
    [103] Van Steen M, Hauck F J, v P, Tanenbaum A, and Steen M V, Locating Objects in Wide-Area Systems[J], Communications Magazine, IEEE,1998,31(1):104-109
    [104] Rhee I, Minsu N, Ncsu S, Hong S, Kyunghan N, Kaist L, Chong S, Human Mobility Patterns and Their Impact on Routing in Human-Driven Mobile Networks[M/OL],http://netsrv.csc.ncsu.edu/export/hotnet2007_mobility_final.pdf
    [105] Stefano Di, Santoro C, Stefano A D, Locating mobile agents in a wide distributed environment[J], IEEE Transactions on Parallel and Distributed Systems,2002,13(8):844-864
    [106] Pitoura E, Samaras G, Locating objects in mobile computing[J], IEEETransactions on Knowledge and Data Engineering,2001,13(4):571-592,.
    [107] Ranasinghe D, Engels D, Cole P, Low-cost RFID systems: Confrontingsecurity and privacy[C], in Auto-ID labs research workshop,2004:54-77
    [108] Tan C C, Sheng B, Li Q, Severless search and authentication protocolsfor RFID[C], in Pervasive Computing and Communications,2007. PerCom’07. Fifth Annual IEEE International Conference on,2007:3-12.
    [109] Chow C Y, Mokbel M F, Liu X, A peer-to-peer spatial cloaking algorithm for anonymous location-based service[C], Proceedings of the14th annual ACM international symposium on Advances in geographic informationsystems-GIS’06,2006:171
    [110] Priyantha N B, The Cricket Indoor Location System[M],Massachusetts Institute of Technology,2005.
    [111] Chow C, Mokbel M F, and Leong H V, On Efficient and Scalable Support of Continuous Queries in Mobile Peer-to-Peer Environments[J], Mobile Computing, IEEE Transactions,2011,10(10):1473-1487
    [112] Ghinita G, Kalnis P, Skiadopoulos S, PRIVE: anonymous location-basedqueries in distributed mobile systems[C], in Proceedings of the16th international conference on World Wide Web,2007:380
    [113] Trajcevski G, Wolfson O, Hinrichs K, Chamberlain S, Managing uncertainty in moving objects databases[J], ACM Transactions on Database Systems (TODS),2004,29(3):463-507
    [114] Madhavapeddy A, Tse A, A Study of Bluetooth Propagation Using Accurate Indoor Location Mapping[C], UbiComp2005: Ubiquitous Computing,2005:105-122
    [115] Hubaux J P, Capkun S. Luo J, The Security and Privacy of Smart Vehicles[J], Security&Privacy, IEEE,2004,2(3):49-55
    [116] Ni L, Liu Y, Lau Y C, Patil A P, LANDMARC: indoor location sensing using active RFID[J], Wireless Networks,2004,10(6):701-710
    [117] Langley R B, Dilution of precision[J], GPS World,1999,10(5):52-59
    [118] Broch J, Maltz D A, Johnson D B, Supporting hierarchy and heterogeneous interfaces in multi-hop wireless ad hoc networks[J], Parallel Architectures, Algorithms, and Networks,1999:370
    [119] Bhargava B, Wu X, Lu Y, Wang W, Integrating Heterogeneous Wireless Technologies: A Cellular Aided Mobile Ad Hoc Network (CAMA)[J],Mobile Networks and Applications,2004,9(4):393-408
    [120] Ge Y, Lamont L, Villasenor L, Hierarchical OLSR-A Scalable Proactive Routing Protocol for Heterogeneous Ad Hoc Networks[C], in WirelessAnd Mobile Computing, Networking And Communications,2005.(WiMob’2005), IEEE International Conference on,2005:17-23.
    [121] Shah R C and Rabaey J M, Energy aware routing for low energy ad hoc sensor networks[C],2002IEEE Wireless Communications and Networking Conference Record. WCNC2002(Cat. No.02TH8609),2002:350-355
    [122] Shivle S, Castain R, Siegel H J, Maciejewski A A, Banka T, ChindamK, Dussinger S, Pichumani P, Satyasekaran P, Saylor W, D. Sendek, Sousa J, Sridharan J, Sugavanam P, Velazco J, Collins F, Static Mapping of Subtasks in a Heterogeneous Ad Hoc Grid Environment Abbott Laboratories[C], Parallel and Distributed Processing Symposium,2004. Proceedings.18th International,2004:110
    [123] Chu M, Haussecker H, Scalable Information-Driven Sensor Querying and Routing for Ad Hoc Heterogeneous Sensor Networks[J], International Journal of High Performance Computing Applications,2002,16(3):293-313
    [124]董平,秦雅娟,张宏科,支持普适服务的一体化网络研究[J],电子学报,35(4):599-606,2007.
    [125]杨冬,李世勇,王博,张宏科,支持普适服务的新一代网络传输层构架[J],计算机学报,2009,32(3):359-370
    [126]刘方斌,张琨,张宏,一种低运算量Ad-hoc网络匿名路由协议[J],计算机科学,2012,38(11):48-53
    [127] Helmy A, Small worlds in wireless networks[J], IEEE CommunicationsLetters,2003,7(10):490-492
    [128] Latvakoski J, Towards Hierarchical Routing in Small World Wireless Networks[C], in2009Fifth International Conference on Wireless and Mobile Communications,2009:322-327
    [129] Cavalcanti D, Agrawal D, Kelner J, Sadok D, Exploiting the small-world effect to increase connectivity in wireless ad hoc networks[C], Telecommunications and Networking-ICT2004,2004:1-6
    [130] Helmy A, Garg S, Nahata N, Pamu P, CARD: A Contact-based Architecture for Resource Discovery in Wireless Ad Hoc Networks[J], Mobile Networks and Applications,2005,10(1):99-113
    [131] B. D. Easley, The Small-World Phenomenon, in Networks, Crowds, andMarkets: Reasoning about a Highly Connected World,2010,:611-644.
    [132] T JIANG, J L LI, Cluster based routing protocol(CBRP)[M/OL], http://www.math.nus.edu.sg/~mattyc/cbrp.txt.
    [133] Otrok H, Mohammed N, Wang L, Debbabi M, Bhattacharya P, A game-theoretic intrusion detection model for mobile ad hoc networks[J], Computer Communications,2008,31(4):708-721
    [134] Weis S, Sarma S, Rivest R, Engels D, Security and privacy aspects oflow-cost radio frequency identification systems[J], Security in pervasive computing,2004:50-59
    [135] Papadimitratos P, Buttyan L, Holczer T, Schoch E, Freudiger J, RayaM, Ma Z, Kargl F, Kung A, Hubaux J P, Secure vehicular communication systems: design and architecture[J], IEEE Communications Magazine,2008,46(11):100-109
    [136] Raya M, Aziz A, Hubaux J P, Efficient secure aggregation in VANETs
    [C], Proceedings of the3rd international workshop on Vehicular ad hoc networks-VANET’06,2006:67
    [137] Piro C, Shields C, Levine B, Detecting the sybil attack in mobile ad hoc networks[C], in Securecomm and Workshops,2006,2006:1-11
    [138] Resnick P, Kuwabara K, Zeckhauser R, Friedman E, Reputation systems[J], Communications of the ACM,2000,43(12):45-48
    [139] Josang A, Ismail R, Boyd C, A survey of trust and reputation systemsfor online service provision[J], Decision Support Systems,2007,43(2):618-644
    [140] Galuba W, Papadimitratos Poturalski P M, Aberer K, Despotovic Z, Kellerer W, Castor: Scalable Secure Routing for Ad Hoc Networks[C],2010Proceedings IEEE INFOCOM,2010:1-9
    [141] Zhu H, Lin X, Lu R, Ho P H, Shen X, AEMA: An Aggregated Emergency Message Authentication Scheme for Enhancing the Security of Vehicular Ad Hoc Networks[C],2008IEEE International Conference on Communications,2008:1436-1440
    [142] Agah A, Das S K, Basu K, Intrusion Detection in Sensor Networks: ANon-cooperative Game Approach[C], in Proceedings of the Third IEEE International Symposium on Network Computing and Applications (NCA’04),2004:2902-2906
    [143] Liu Y, Comaniciu C, Man H, A Bayesian Game Approach for Intrusion Detection in Wireless Ad Hoc Networks[C], in Proceeding from the2006workshop on Game theory for communications and networks,2006:4.
    [144] Patcha A, Park J, A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks[J], International Journal of Network Security,2006,2(2):131-137

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700