期刊文献+

物联网位置数据安全策略研究 被引量:7

Survey of Location-Data Security Strategy
下载PDF
导出
摘要 在物联网技术中,基于位置的服务在定位技术的推动下得到长足发展,在给用户带来便利的同时,也给用户位置信息的暴露提供了极大可能。文章研究了位置数据保护的主要技术和研究进展,分析了各类隐私保护方法,为位置隐私数据保护研究研究提供了一定的借鉴。 Technology of Internet of Things is going deep into various field of our society. Location-based service is making great progress driven by technology of location. Such service brings great convenience to people, but in the meanwhile, it make location-data leak be possible. This paper introduced main technology of location-data protection, analyzed types of privacy-protection method, provided a reference for location-data protection.
出处 《信息网络安全》 2014年第6期6-10,共5页 Netinfo Security
关键词 物联网 位置数据安全 位置匿名 Internet of Things location-data security location anonymous
  • 相关文献

参考文献21

二级参考文献163

共引文献896

同被引文献127

  • 1崔振山,马春光,李迎涛.物联网感知层的安全威胁与安全技术[J].保密科学技术,2012(11):61-65. 被引量:9
  • 2Corporation S. Internet Security Threat Report (ISTR.) [R.]. California:Symantec Corporation, 2014. 被引量:1
  • 3Apvrille A. Symbian worm Yxes: Towards mobile botnets?[J]. Journalin Computer Virology, 2012, 8(4): 117-131. 被引量:1
  • 4Hua J, Sakurai K. A sms-based mobile botnet using flooding algorithm,Information Security Theory and Practice[J].Security and Privacy ofMobile Devices in Wireless Communication: Springer, 2011: 264-279. 被引量:1
  • 5Hamandi K, Elhajj I H, Chehab A, et al. Android SMS botnet: a newperspective[C]// Proceedings of the 10th ACM international symposiumon Mobility management and wireless access, 2012: 125-130. 被引量:1
  • 6Geng G, Xu G, Zhang M, et al. The design of sms based heterogeneousmobile botnet[J].Journal of Computers, 2012, 7(1): 235-243. 被引量:1
  • 7Zeng Y, Shin K G, Hu X. Design of SMS commanded-and-controlled and P2P-structured mobile botnets[C]// Proceedings of thefifth ACM conference on Security and Privacy in Wireless and MobileNetworks, 2012: 137-148. 被引量:1
  • 8Mtibaa A, Harras K A, AJnuweiri H. Malicious attacks in MobileDevice Clouds: A data driven risk assessment[C]/ /ComputerCommunication and Networks (ICCCN), 2014 23rd InternationalConference on, 2014: 1-8. 被引量:1
  • 9Singh K, Sangal S, Jain N, et al. Evaluating bluetooth as a medium forbotnet command and control|J]. Detection of Intrusions and Malware, andVulnerability Assessment: Springer, 2010: 61-80. 被引量:1
  • 10Hua J, Sakurai K. Botnet command and control based on ShoreMessage Service and human mobility [J]. Computer Networks, 2013, 57(2):579-597. 被引量:1

引证文献7

二级引证文献139

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部