期刊文献+

源安全的传感器网络数据融合协议 被引量:6

Data fusion protocol with source security for sensor networks
下载PDF
导出
摘要 针对源安全需求,构造了同时支持聚合签名、数据融合与批验证的特殊数字签名方案。该数字签名方案与同态加密技术相结合,设计了一个源安全的数据融合协议。安全性分析表明,该数字签名方案的安全性基于CDH问题的难解性,该协议能够同时保障采集数据end-to-end机密性与可认证性。 For the source security need,a digital signature scheme with aggregate signatures,data fusion and batch verification was proposed.Based on the proposed signature scheme and the homomorphic encryption technology,a data fusion protocol with secure sources was advanced.Security analyses show that the proposed signature scheme is secure based on the CDH assumption,and the proposed protocol can provide the collected data end-to-end confidentiality and authentication.
出处 《通信学报》 EI CSCD 北大核心 2010年第11期87-91,共5页 Journal on Communications
基金 国家自然科学基金资助项目(61001058) 深圳市科技计划资助项目(CXB200903090020A)~~
关键词 传感器网络 源安全 数据融合 end-to-end机密性 end-to-end可认证性 sensor networks source security data fusion end-to-end confidentiality end-to-end authentication
  • 相关文献

参考文献10

  • 1AMRITA G,JYOTI P S.Secure data aggregation using some degree of persistent authentication in sensor networks[].Mobile and Perva-sive Computing CoMPC.2008
  • 2CASTELLUCCIA C,CHAN ALDAR C-F,MYKLETUN E,et al.Efficient and provably secure aggregation of encrypted data in wire-less sensor networks[].ACM Transactions on Sensor Networks.2009
  • 3GAO F,ZHU W T.A dual-head cluster based secure aggregation scheme for sensor networks[].Proc of the Conference on Network and Parallel Computing.2008
  • 4LI Z,GONG G.Data aggregation integrity based on homomorphic primitives in sensor networks[].Proceedings of th International Conference on Ad Hoc Networks and Wireless (ADHOC-NOW ).2010
  • 5ALI B,STANISLAW J.Identity-based aggregate and multi-signature schemes based on RSA[].PKC.2010
  • 6ANNA L F,MATTHEW G,SUSAN H,et al.On the practicality of short signature batch verification[].RSA.2009
  • 7Suat O,Yang X.Secure data aggregation in wireless sensor networks: A comprehensiveoverview[].The International Journal of Computer and Telecommunications Networking archive.2009
  • 8M. Bagaa,N. Lasla,A. Ouadjaout, et al.SEDAN: Secure and Efficient protocol for Data Aggregation in wireless sensor Networks[].Proc of the conference onLocal Computer Networks.2007
  • 9Y. J. Luo,X. Yang,X. Zhang.An Effective Resilient Data Aggregation Algorithm in Wireless Sensor Networks[].Proc of International Conference on Wireless Communications Networking and Mobile Computing.2007
  • 10Przydatek B,Song D,Perrig A.SIA:Secure information aggregation in sensor networks[].Proc Of the st Int’l Confon Embedded Networked Sensor Systems.2003

同被引文献110

  • 1张兢,路彦和,雷刚.数据融合技术在火灾自动探测中的应用研究[J].计算机测量与控制,2006,14(5):610-612. 被引量:10
  • 2周四望,林亚平,聂雅琳,王继良,张锦.无线传感器网络中基于数据融合的移动代理曲线动态路由算法研究[J].计算机学报,2007,30(6):894-904. 被引量:40
  • 3SHI E, PERRIG A. Designing secure sensor networks [ J ]. IEEE Wireless Communications ,2004,11 (6) :38 -43.
  • 4AKKAYA K,DEMIRBAS M, AYGUN R S. The impact of data ag- gregation on the performance of wireless sensor networks [ J ]. Wire- less Communications and Mobile Computing, 2008, 8 ( 2 ) : 171 - 193.
  • 5GIRAO J, WESTHOFF D, SCHNEIDER M. CDA: Concealed data aggregation for reverse multicast traffic in wireless sensor networks [ C ]//Proc of the IEEE International Conference on Communica- tions. Seoul, Korea,2005:3044 - 3049.
  • 6CASTELLUCCIA C, MYKLETUN E, TSUDIK G. Efficient aggrega- tion of encrypted data in wireless sensor networks[ C]//Proc of the Second Annual International Conference on MobiQuitous. San Die- go,USA,2005:109 - 117.
  • 7WESTHOFF D, GIRAO J, ACI-IARYA M. Concealed data aggrega- tion for reverse multicast traffic in sensor networks:Encryption, key distribution, and routing adaptation [ J ]. IEEE Transactions on Mo- bile Computing,2006,5 (10) : 1417 - 1431.
  • 8OZDEMIR S. Concealed data aggregation in heterogeneous sensor networks using privacy homomorphism [ C ]//Proc of the IEEE In- ternational Conference on Pervasive Services. Istanbul, Turkey, 2007 :165 - 168.
  • 9CASTELLUCCIA C. Securing very dynamic groups and data aggre- gation in wireless sensor networks [ C ]//Proc of the IEEE Interna- tonal Conference on Mobile Adhoc and Sensor Systems. Pisa, Italy, 2007 : 1 - 9.
  • 10FENG T, WANG C, ZHANG W, et al. Confidentiality protection for distributed sensor data aggregation [ C ]//Proc of the 27th Confer- ence on Computer Communications ( INFOCOM ' 08 ). Phoenix, USA,2008:56 -60.

引证文献6

二级引证文献26

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部