Skip to main content

2019 | OriginalPaper | Buchkapitel

2. Networking Cyber-Physical Systems: Algorithm Fundamentals of Security and Privacy for Next-Generation Wireless Networks

verfasst von : Sheng Zhong, Hong Zhong, Xinyi Huang, Panlong Yang, Jin Shi, Lei Xie, Kun Wang

Erschienen in: Security and Privacy for Next-Generation Wireless Networks

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This chapter first briefly discusses the challenges and opportunities in wireless networks to address security and privacy issues. Secondly, some security and privacy problems existing in wireless networks in recent years are discussed and analyzed, and the corresponding algorithms used to solve these problems are summarized. Finally, the direction of further research on security and privacy in wireless networks is given, so that researchers can find a suitable research direction after reading the contents of this chapter, or continue to carry out more in-depth research work.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Aha, D. W., Kibler, D., & Albert, M. K. (1991). Instance-based learning algorithms. Machine learning, 6(1), 37–66. Aha, D. W., Kibler, D., & Albert, M. K. (1991). Instance-based learning algorithms. Machine learning, 6(1), 37–66.
2.
Zurück zum Zitat Aho, A. V., & Corasick, M. J. (1975). Efficient string matching: an aid to bibliographic search. Communications of the ACM, 18(6), 333–340.MathSciNetCrossRef Aho, A. V., & Corasick, M. J. (1975). Efficient string matching: an aid to bibliographic search. Communications of the ACM, 18(6), 333–340.MathSciNetCrossRef
3.
Zurück zum Zitat Backstrom, L., Dwork, C., & Kleinberg, J. (2007, May). Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In Proceedings of the 16th international conference on World Wide Web (pp. 181–190). ACM. Backstrom, L., Dwork, C., & Kleinberg, J. (2007, May). Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In Proceedings of the 16th international conference on World Wide Web (pp. 181–190). ACM.
4.
Zurück zum Zitat Brakerski, Z., & Vaikuntanathan, V. (2011, August). Fully homomorphic encryption from ring-LWE and security for key dependent messages. In Annual cryptology conference (pp. 505–524). Springer, Berlin, Heidelberg.CrossRef Brakerski, Z., & Vaikuntanathan, V. (2011, August). Fully homomorphic encryption from ring-LWE and security for key dependent messages. In Annual cryptology conference (pp. 505–524). Springer, Berlin, Heidelberg.CrossRef
5.
Zurück zum Zitat Canard, S., & Gouget, A. (2007, May). Divisible e-cash systems can be truly anonymous. In Annual International Conference on the Theory and Applications of Cryptographic Techniques (pp. 482–497). Springer, Berlin, Heidelberg.CrossRef Canard, S., & Gouget, A. (2007, May). Divisible e-cash systems can be truly anonymous. In Annual International Conference on the Theory and Applications of Cryptographic Techniques (pp. 482–497). Springer, Berlin, Heidelberg.CrossRef
6.
Zurück zum Zitat Chen, J., Yuan, Q., Xue, G., & Du, R. (2015, April). Game-theory-based batch identification of invalid signatures in wireless mobile networks. In Computer Communications (INFOCOM), 2015 IEEE Conference on (pp. 262–270). IEEE. Chen, J., Yuan, Q., Xue, G., & Du, R. (2015, April). Game-theory-based batch identification of invalid signatures in wireless mobile networks. In Computer Communications (INFOCOM), 2015 IEEE Conference on (pp. 262–270). IEEE.
7.
Zurück zum Zitat Clark, M., & Psounis, K. (2015, April). Efficient resource scheduling for a secondary network in shared spectrum. In Computer Communications (INFOCOM), 2015 IEEE Conference on (pp. 1257–1265). IEEE. Clark, M., & Psounis, K. (2015, April). Efficient resource scheduling for a secondary network in shared spectrum. In Computer Communications (INFOCOM), 2015 IEEE Conference on (pp. 1257–1265). IEEE.
8.
Zurück zum Zitat Clark, M., & Psounis, K. (2016, April). Can the privacy of primary networks in shared spectrum be protected?. In INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications, IEEE. Clark, M., & Psounis, K. (2016, April). Can the privacy of primary networks in shared spectrum be protected?. In INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications, IEEE.
9.
Zurück zum Zitat Dou, Y., Zeng, K. C., Li, H., Yang, Y., Gao, B., Guan, C., …& Li, S. (2016, July). P 2-SAS: preserving users’ privacy in centralized dynamic spectrum access systems. In Proceedings of the 17th ACM International Symposium on Mobile Ad Hoc Networking and Computing (pp. 321–330). ACM. Dou, Y., Zeng, K. C., Li, H., Yang, Y., Gao, B., Guan, C., …& Li, S. (2016, July). P 2-SAS: preserving users’ privacy in centralized dynamic spectrum access systems. In Proceedings of the 17th ACM International Symposium on Mobile Ad Hoc Networking and Computing (pp. 321–330). ACM.
10.
Zurück zum Zitat Gong, X., Chen, X., Xing, K., Shin, D. H., Zhang, M., & Zhang, J. (2015, April). Personalized location privacy in mobile networks: A social group utility approach. In Computer Communications (INFOCOM), 2015 IEEE Conference on (pp. 1008–1016). IEEE. Gong, X., Chen, X., Xing, K., Shin, D. H., Zhang, M., & Zhang, J. (2015, April). Personalized location privacy in mobile networks: A social group utility approach. In Computer Communications (INFOCOM), 2015 IEEE Conference on (pp. 1008–1016). IEEE.
11.
Zurück zum Zitat Hay, M., Miklau, G., Jensen, D., Towsley, D., & Weis, P. (2008). Resisting structural re-identification in anonymized social networks. Proceedings of the VLDB Endowment, 1(1), 102–114.CrossRef Hay, M., Miklau, G., Jensen, D., Towsley, D., & Weis, P. (2008). Resisting structural re-identification in anonymized social networks. Proceedings of the VLDB Endowment, 1(1), 102–114.CrossRef
12.
Zurück zum Zitat Jin, H., Su, L., Xiao, H., & Nahrstedt, K. (2016, July). Inception: Incentivizing privacy-preserving data aggregation for mobile crowd sensing systems. In Proceedings of the 17th ACM International Symposium on Mobile Ad Hoc Networking and Computing (pp. 341–350). ACM. Jin, H., Su, L., Xiao, H., & Nahrstedt, K. (2016, July). Inception: Incentivizing privacy-preserving data aggregation for mobile crowd sensing systems. In Proceedings of the 17th ACM International Symposium on Mobile Ad Hoc Networking and Computing (pp. 341–350). ACM.
13.
Zurück zum Zitat Jin, X., & Zhang, Y. (2016, April). Privacy-preserving crowdsourced spectrum sensing. In Computer Communications, IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on, IEEE. Jin, X., & Zhang, Y. (2016, April). Privacy-preserving crowdsourced spectrum sensing. In Computer Communications, IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on, IEEE.
14.
Zurück zum Zitat Kalman, R. E. (1960). A new approach to linear filtering and prediction problems. Journal of basic Engineering, 82(1), 35–45.CrossRef Kalman, R. E. (1960). A new approach to linear filtering and prediction problems. Journal of basic Engineering, 82(1), 35–45.CrossRef
15.
Zurück zum Zitat Li, H., Sun, L., Zhu, H., Lu, X., & Cheng, X. (2014, April). Achieving privacy preservation in WiFi fingerprint-based localization. In INFOCOM, 2014 Proceedings IEEE (pp. 2337–2345). IEEE. Li, H., Sun, L., Zhu, H., Lu, X., & Cheng, X. (2014, April). Achieving privacy preservation in WiFi fingerprint-based localization. In INFOCOM, 2014 Proceedings IEEE (pp. 2337–2345). IEEE.
16.
Zurück zum Zitat Li, M., Li, P., Guo, L., & Huang, X. (2015, April). PPER: Privacy-preserving economic-robust spectrum auction in wireless networks. In Computer Communications (INFOCOM), 2015 IEEE Conference on (pp. 909–917). IEEE. Li, M., Li, P., Guo, L., & Huang, X. (2015, April). PPER: Privacy-preserving economic-robust spectrum auction in wireless networks. In Computer Communications (INFOCOM), 2015 IEEE Conference on (pp. 909–917). IEEE.
17.
Zurück zum Zitat Li, N., Zhang, N., Das, S.K., & Thuraisingham, B. (2009). Privacy preservation in wireless sensor networks: A state-of-the-art survey. Ad Hoc Networks, 7(8), 1501–1514.CrossRef Li, N., Zhang, N., Das, S.K., & Thuraisingham, B. (2009). Privacy preservation in wireless sensor networks: A state-of-the-art survey. Ad Hoc Networks, 7(8), 1501–1514.CrossRef
18.
Zurück zum Zitat Li, Q., & Cao, G. (2013, March). Providing privacy-aware incentives for mobile sensing. In Pervasive Computing and Communications (PerCom), 2013 IEEE International Conference on (pp. 76–84). IEEE. Li, Q., & Cao, G. (2013, March). Providing privacy-aware incentives for mobile sensing. In Pervasive Computing and Communications (PerCom), 2013 IEEE International Conference on (pp. 76–84). IEEE.
19.
Zurück zum Zitat Li, Q., Cao, G., & La Porta, T. F. (2014). Efficient and privacy-aware data aggregation in mobile sensing. IEEE Transactions on Dependable and Secure Computing, 11(2), 115–129.CrossRef Li, Q., Cao, G., & La Porta, T. F. (2014). Efficient and privacy-aware data aggregation in mobile sensing. IEEE Transactions on Dependable and Secure Computing, 11(2), 115–129.CrossRef
20.
Zurück zum Zitat Lin, J., Li, M., Yang, D., Xue, G., & Tang, J. (2017, May). Sybil-proof incentive mechanisms for crowdsensing. In INFOCOM 2017-IEEE Conference on Computer Communications, IEEE. Lin, J., Li, M., Yang, D., Xue, G., & Tang, J. (2017, May). Sybil-proof incentive mechanisms for crowdsensing. In INFOCOM 2017-IEEE Conference on Computer Communications, IEEE.
21.
Zurück zum Zitat Ling, Z., Luo, J., Chen, Q., Yue, Q., Yang, M., Yu, W., & Fu, X. (2016, April). Secure fingertip mouse for mobile devices. In Computer Communications, IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on, IEEE. Ling, Z., Luo, J., Chen, Q., Yue, Q., Yang, M., Yu, W., & Fu, X. (2016, April). Secure fingertip mouse for mobile devices. In Computer Communications, IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on, IEEE.
22.
Zurück zum Zitat Lu, Z., Sagduyu, Y. E., & Li, J. H. (2015, April). Queuing the trust: Secure backpressure algorithm against insider threats in wireless networks. In Computer Communications (INFOCOM), 2015 IEEE Conference on (pp. 253–261). IEEE. Lu, Z., Sagduyu, Y. E., & Li, J. H. (2015, April). Queuing the trust: Secure backpressure algorithm against insider threats in wireless networks. In Computer Communications (INFOCOM), 2015 IEEE Conference on (pp. 253–261). IEEE.
23.
Zurück zum Zitat Ma, J., Le, F., Russo, A., & Lobo, J. (2015, April). Detecting distributed signature-based intrusion: The case of multi-path routing attacks. In Computer Communications (INFOCOM), 2015 IEEE Conference on (pp. 558–566). IEEE. Ma, J., Le, F., Russo, A., & Lobo, J. (2015, April). Detecting distributed signature-based intrusion: The case of multi-path routing attacks. In Computer Communications (INFOCOM), 2015 IEEE Conference on (pp. 558–566). IEEE.
24.
Zurück zum Zitat Mao, Y., Chen, T., Zhang, Y., Wang, T., & Zhong, S. (2017). Towards Privacy-Preserving Aggregation for Collaborative Spectrum Sensing. IEEE Transactions on Information Forensics and Security, 12(6), 1483–1493.CrossRef Mao, Y., Chen, T., Zhang, Y., Wang, T., & Zhong, S. (2017). Towards Privacy-Preserving Aggregation for Collaborative Spectrum Sensing. IEEE Transactions on Information Forensics and Security, 12(6), 1483–1493.CrossRef
25.
Zurück zum Zitat Miao, C., Su, L., Jiang, W., Li, Y., & Tian, M. (2017, May). A lightweight privacy-preserving truth discovery framework for mobile crowd sensing systems. In INFOCOM 2017-IEEE Conference on Computer Communications, IEEE. Miao, C., Su, L., Jiang, W., Li, Y., & Tian, M. (2017, May). A lightweight privacy-preserving truth discovery framework for mobile crowd sensing systems. In INFOCOM 2017-IEEE Conference on Computer Communications, IEEE.
26.
Zurück zum Zitat Narayanan, A., & Shmatikov, V. (2009, May). De-anonymizing social networks. In Security and Privacy, 2009 30th IEEE Symposium on (pp. 173–187). IEEE. Narayanan, A., & Shmatikov, V. (2009, May). De-anonymizing social networks. In Security and Privacy, 2009 30th IEEE Symposium on (pp. 173–187). IEEE.
27.
Zurück zum Zitat Nickel, C., Wirtl, T., & Busch, C. (2012, July). Authentication of smartphone users based on the way they walk using k-nn algorithm. In Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2012 Eighth International Conference on (pp. 16–20). IEEE. Nickel, C., Wirtl, T., & Busch, C. (2012, July). Authentication of smartphone users based on the way they walk using k-nn algorithm. In Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2012 Eighth International Conference on (pp. 16–20). IEEE.
28.
Zurück zum Zitat Niu, B., Li, Q., Zhu, X., Cao, G., & Li, H. (2015, April). Enhancing privacy through caching in location-based services. In Computer Communications (INFOCOM), 2015 IEEE Conference on (pp. 1017–1025). IEEE. Niu, B., Li, Q., Zhu, X., Cao, G., & Li, H. (2015, April). Enhancing privacy through caching in location-based services. In Computer Communications (INFOCOM), 2015 IEEE Conference on (pp. 1017–1025). IEEE.
29.
Zurück zum Zitat Paillier, P. (1999, May). Public-key cryptosystems based on composite degree residuosity classes. In International Conference on the Theory and Applications of Cryptographic Techniques (pp. 223–238). Springer, Berlin, Heidelberg. Paillier, P. (1999, May). Public-key cryptosystems based on composite degree residuosity classes. In International Conference on the Theory and Applications of Cryptographic Techniques (pp. 223–238). Springer, Berlin, Heidelberg.
30.
Zurück zum Zitat Sun, W., Liu, X., Lou, W., Hou, Y. T., & Li, H. (2015, April). Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data. In Computer Communications (INFOCOM), 2015 IEEE Conference on (pp. 2110–2118). IEEE. Sun, W., Liu, X., Lou, W., Hou, Y. T., & Li, H. (2015, April). Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data. In Computer Communications (INFOCOM), 2015 IEEE Conference on (pp. 2110–2118). IEEE.
31.
Zurück zum Zitat Sun, W., Zhang, N., Lou, W., & Hou, Y. T. (2017, May). When gene meets cloud: Enabling scalable and efficient range query on encrypted genomic data. In INFOCOM 2017-IEEE Conference on Computer Communications, IEEE. Sun, W., Zhang, N., Lou, W., & Hou, Y. T. (2017, May). When gene meets cloud: Enabling scalable and efficient range query on encrypted genomic data. In INFOCOM 2017-IEEE Conference on Computer Communications, IEEE.
32.
Zurück zum Zitat Vazirani, V. V. (2013). Approximation algorithms. Springer Science & Business Media. Vazirani, V. V. (2013). Approximation algorithms. Springer Science & Business Media.
33.
Zurück zum Zitat Wang, Q., Zhang, Y., Lu, X., Wang, Z., Qin, Z., & Ren, K. (2016, April). RescueDP: Real-time spatio-temporal crowd-sourced data publishing with differential privacy. In INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications, IEEE. Wang, Q., Zhang, Y., Lu, X., Wang, Z., Qin, Z., & Ren, K. (2016, April). RescueDP: Real-time spatio-temporal crowd-sourced data publishing with differential privacy. In INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications, IEEE.
34.
Zurück zum Zitat Yang, L., Zheng, Q., & Fan, X. (2017, May). RSPP: A reliable, searchable and privacy-preserving e-healthcare system for cloud-assisted body area networks. In INFOCOM 2017-IEEE Conference on Computer Communications, IEEE. Yang, L., Zheng, Q., & Fan, X. (2017, May). RSPP: A reliable, searchable and privacy-preserving e-healthcare system for cloud-assisted body area networks. In INFOCOM 2017-IEEE Conference on Computer Communications, IEEE.
35.
Zurück zum Zitat Yang, Y., & Sun, J. (2017, May). Energy-efficient W-layer for behavior-based implicit authentication on mobile devices. In INFOCOM 2017-IEEE Conference on Computer Communications, IEEE. Yang, Y., & Sun, J. (2017, May). Energy-efficient W-layer for behavior-based implicit authentication on mobile devices. In INFOCOM 2017-IEEE Conference on Computer Communications, IEEE.
36.
Zurück zum Zitat Yang, Z.,& J\(\ddot {a}\)rvinen, K. (2018, July) The Death and Rebirth of Privacy-Preserving WiFi Fingerprint Localization with Paillier Encryption. In INFOCOM, 2018 Proceedings IEEE. IEEE. Yang, Z.,& J\(\ddot {a}\)rvinen, K. (2018, July) The Death and Rebirth of Privacy-Preserving WiFi Fingerprint Localization with Paillier Encryption. In INFOCOM, 2018 Proceedings IEEE. IEEE.
37.
Zurück zum Zitat Yuan, J., Yu, S., & Guo, L. (2015, April). SEISA: Secure and efficient encrypted image search with access control. In Computer Communications (INFOCOM), 2015 IEEE Conference on (pp. 2083–2091). IEEE. Yuan, J., Yu, S., & Guo, L. (2015, April). SEISA: Secure and efficient encrypted image search with access control. In Computer Communications (INFOCOM), 2015 IEEE Conference on (pp. 2083–2091). IEEE.
38.
Zurück zum Zitat Zeng, J., Telang, G., Johnson, M. P., Sarkar, R., Gao, J., Arkin, E. M., & Mitchell, J. S. (2017, July). Mobile r-gather: Distributed and Geographic Clustering for Location Anonymity. In Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing. ACM. Zeng, J., Telang, G., Johnson, M. P., Sarkar, R., Gao, J., Arkin, E. M., & Mitchell, J. S. (2017, July). Mobile r-gather: Distributed and Geographic Clustering for Location Anonymity. In Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing. ACM.
39.
Zurück zum Zitat Zhang, C., Ho, P. H., & Tapolcai, J. (2011). On batch verification with group testing for vehicular communications. Wireless Networks, 17(8), 1851–1865.CrossRef Zhang, C., Ho, P. H., & Tapolcai, J. (2011). On batch verification with group testing for vehicular communications. Wireless Networks, 17(8), 1851–1865.CrossRef
40.
Zurück zum Zitat Zhang, K., Liang, X., Lu, R., Yang, K., & Shen, X. S. (2015, April). Exploiting mobile social behaviors for sybil detection. In Computer Communications (INFOCOM), 2015 IEEE Conference on (pp. 271–279). IEEE. Zhang, K., Liang, X., Lu, R., Yang, K., & Shen, X. S. (2015, April). Exploiting mobile social behaviors for sybil detection. In Computer Communications (INFOCOM), 2015 IEEE Conference on (pp. 271–279). IEEE.
41.
Zurück zum Zitat Zhang, Y., Chen, Q., & Zhong, S. (2016). Privacy-preserving data aggregation in mobile phone sensing. IEEE Transactions on Information Forensics and Security, 11(5), 980–992.CrossRef Zhang, Y., Chen, Q., & Zhong, S. (2016). Privacy-preserving data aggregation in mobile phone sensing. IEEE Transactions on Information Forensics and Security, 11(5), 980–992.CrossRef
42.
Zurück zum Zitat Zhang, Y., Chen, Q., & Zhong, S. (2017). Efficient and Privacy-Preserving Min and k-th Min Computations in Mobile Sensing Systems. IEEE Transactions on Dependable and Secure Computing, 14(1), 9–21. Zhang, Y., Chen, Q., & Zhong, S. (2017). Efficient and Privacy-Preserving Min and k-th Min Computations in Mobile Sensing Systems. IEEE Transactions on Dependable and Secure Computing, 14(1), 9–21.
43.
Zurück zum Zitat Zhang, Y., Mao, Y., Zhang, H., & Zhong, S. (2015, September). Privacy preserving market schemes for mobile sensing. In Parallel Processing (ICPP), 2015 44th International Conference on (pp. 909–918). IEEE. Zhang, Y., Mao, Y., Zhang, H., & Zhong, S. (2015, September). Privacy preserving market schemes for mobile sensing. In Parallel Processing (ICPP), 2015 44th International Conference on (pp. 909–918). IEEE.
44.
Zurück zum Zitat Zhong, S. (2004). Privacy, integrity, and incentive-compatibility in computations with untrusted parties. Ph.D. dissertation, Dept. Comput. Sci., Yale Univ. New Haven, CT, USA, 2004. Zhong, S. (2004). Privacy, integrity, and incentive-compatibility in computations with untrusted parties. Ph.D. dissertation, Dept. Comput. Sci., Yale Univ. New Haven, CT, USA, 2004.
45.
Zurück zum Zitat Zhou, J., Cao, Z., Dong, X., & Lin, X. (2015, April). TR-MABE: White-box traceable and revocable multi-authority attribute-based encryption and its applications to multi-level privacy-preserving e-healthcare cloud computing systems. In Computer Communications (INFOCOM), 2015 IEEE Conference on (pp. 2398–2406). IEEE. Zhou, J., Cao, Z., Dong, X., & Lin, X. (2015, April). TR-MABE: White-box traceable and revocable multi-authority attribute-based encryption and its applications to multi-level privacy-preserving e-healthcare cloud computing systems. In Computer Communications (INFOCOM), 2015 IEEE Conference on (pp. 2398–2406). IEEE.
46.
Zurück zum Zitat Zhuo, G., Jia, Q., Guo, L., Li, M., & Li, P. (2016, April). Privacy-preserving verifiable data aggregation and analysis for cloud-assisted mobile crowdsourcing. In INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications, IEEE. Zhuo, G., Jia, Q., Guo, L., Li, M., & Li, P. (2016, April). Privacy-preserving verifiable data aggregation and analysis for cloud-assisted mobile crowdsourcing. In INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications, IEEE.
Metadaten
Titel
Networking Cyber-Physical Systems: Algorithm Fundamentals of Security and Privacy for Next-Generation Wireless Networks
verfasst von
Sheng Zhong
Hong Zhong
Xinyi Huang
Panlong Yang
Jin Shi
Lei Xie
Kun Wang
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-01150-5_2

Premium Partner