期刊文献+

一种基于复数域的数据融合完整性保护算法 被引量:5

A Complex Field-based Integrity-protecting Data Aggregation Algorithm
下载PDF
导出
摘要 随着无线传感器网络技术的快速发展,传感器网络开始承载越来越多的应用服务,很多应用都需要保证信息或数据的隐私性和完整性,这对网络数据融合提出了更高的要求。因此,设计一种能够实现隐私保护兼完整性保护的数据融合方案显得尤为重要。文中提出了一种基于复数域的新无线传感器网络数据融合完整性保护算法,通过对实部真实数据增添私有种子进行隐私保护,并利用复数的虚实部关联特性进行数据的完整性保护。此外,算法依靠数据融合树型结构本身的特性,减少了数据通信开销,计算复杂度低。理论分析表明,在恶意节点的各种攻击情况下,算法具有良好的完整性保护性能。仿真结果显示,算法可以在有效保护数据隐私性和完整性的前提下,花费与TAG相同的时间,得到精确的数据融合结果。 With the rapid development of network communication technology ,the interact begins to carry more and more application serv- ices,it brings forward very high demands for network data aggregation. So, designing a data aggregation scheme which can protect both data privacy and integrity seems very important. It presents a complex field-based new WSN data aggregation algorithm for integrity pro- tecting. It adds privacy seed to the real sampling data in order to preserve privacy and protect data integrity by using the associated char- acteristics between the real part and imaginary part of complex numbers. Moreover,depending on its own characteristics of data aggrega- tion tree structure, the algorithm decreases data communication overhead and computation overhead. Theoretical analysis shows that,in all attacking cases, the algorithm achieves good integrity protection performance. The simulation results show that under the premise of pri- vacy preserving and integrity protecting, the algorithm can get accurate data aggregation result ,just spending the same time of TAG.
作者 赵丹 杨庚
出处 《计算机技术与发展》 2012年第8期150-154,158,共6页 Computer Technology and Development
基金 国家自然科学基金资助项目(60873231 60977069) 江苏省自然科学基金(BK2009426) 江苏省高校自然科学研究重大项目(11KJA520002)
关键词 物联网 无线传感器网络 数据融合 完整性保护 隐私保护 intemet of things wireless sensor network data aggregation integdty protecting pdvacy preserving
  • 相关文献

参考文献14

  • 1He W, Nguyen H, Liu X, et al. iPDA : an integrity-protecting private data aggregation scheme for wireless sensor networks[ C]//Military Communications Conference. San Diego,CA: [s. n. ] ,2008:1-7.
  • 2He W,Liu X,Ngoyen H,et al. A cluster-based protocol to en- force integrity and preserve privacy in data aggregation[ C]// 29th IEEE International Conference on Distributed Computing Systems Workshops. Montreal,QC: [s, n. ],2009:14-19.
  • 3Bista R, Yoo H K, Chang J W. A new sensitive data aggrega- tion scheme for protecting integrity in wireless sensor networks [ C ]//lOth IEEE International Conference on Computer and Information Technology. Bradford, UK: [s. n. ] ,2010:2463- 2470.
  • 4Bista R,Jo K J,Chang J W. A new approach to secure aggrc- gotion of private data in wireless sensor networks[ C]//Eighth IEEE International Conference on Dependable Autonomic and Secure Computing. Chengdu,China: [s. n. ] ,2009:394-399.
  • 5Bista R, Kim H D, Chang J W. A new private data aggregation scheme for wireless sensor networks[ C]//10th IEEE Interna- tional Conference on Computer and Information Technology. Bradford, UK: [ s. n. ] ,2010:273-280.
  • 6刘鑫芝.无线传感器网络安全数据融合的研究[J].计算机与现代化,2010(5):151-155. 被引量:8
  • 7唐慧,胡向东.无线传感器网络安全数据融合算法研究[J].通信技术,2007,40(12):290-293. 被引量:6
  • 8罗蔚,胡向东.无线传感器网络中一种高效的安全数据融合协议[J].重庆邮电大学学报(自然科学版),2009,21(1):110-114. 被引量:14
  • 9覃志松,黄延磊.Zigbee无线传感器网络安全研究及改进[J].微计算信息,2010(3):54-55.
  • 10邓黎黎,刘才兴.基于信任的无线传感器网络安全路由研究[J].计算机技术与发展,2010,20(6):159-162. 被引量:4

二级参考文献79

共引文献26

同被引文献27

引证文献5

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部