期刊文献+

安全透明的无线传感器网络数据汇聚方案 被引量:5

Secure and transparent data aggregation for wireless sensor networks
下载PDF
导出
摘要 提出了一种安全透明的传感器网络数据汇聚方案,汇聚节点在不对加密数据进行解密的情况下通过散列函数与异或操作完成数据完整性检查、数据源身份认证、数据汇聚等功能,保证了数据在汇聚及传输过程中的隐私性。与相关数据汇聚方案相比,除了提供密钥安全性,所提方案可有效抵抗主动攻击、节点妥协攻击及DoS攻击等恶意行为,具有高的安全性;同时,方案的汇聚结果提供了数据的全局分布信息。 A secure and transparent data aggregation scheme for wireless sensor networks was proposed. Using hash func- tion and XOR operation, the aggregation node completed the data integrity checking, source identity authentication and data aggregation without decrypting the encrypted data, ensured the data privacy in the process of transmitting and ag- gregation. Compared with related data aggregation schemes, except providing high security of encrypt key, the proposed scheme had better performances in resilient against active attack, node compromise attack and DoS attack. Also, the pro- posed scheme provides the information of the global data distribution.
出处 《通信学报》 EI CSCD 北大核心 2012年第10期51-59,70,共10页 Journal on Communications
基金 国家高技术研究发展计划("863"计划)基金资助项目(2007AA01Z429 2007AA01Z405) 国家自然科学基金重点资助项目(60633020) 国家自然科学基金资助项目(60573036 60702059 60503012)~~
关键词 传感器网络 数据汇聚 数据隐私 网络安全 sensor network data aggregation data privacy network security
  • 相关文献

参考文献10

  • 1INTANAGONWlWAT C, GOVINDAN R, ESTRIN D, et al. Directed diffusion for wireless sensor networking[J]. IEEE/ACM Transactions on Networking, 2003, 11 ( 1):2-16.
  • 2BARTOSZ P, DAWN S, ADRIAN E SIA:secure information aggrega- tion in sensor networks[A]. Proceedings of ACM SenSys Confer- ence[C]. Los Angeles, USA, 2003.255-265.
  • 3WAGNER D. Resilient aggregation in sensor networks[A]. Proceed- ings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks[C]. Washington, DC, USA, 2004.78-87.
  • 4CAM H, OZDEMIR S. Energy-efficient security protocol for wireless sensor networks[A]. Proceedings of IEEE VTC Fall 2003 Confer- ence[C]. New York, USA, 2003.2981-2984.
  • 5ACHARYA M, GIRAO J. Secure comparison of encrypted data in wireless sensor networks[A]. 3rd International Symposium on Model- ing and Optimization in Mobile, Ad Hoc, and Wireless Networks[C]. Trentino, Italy, 2005.47-53.
  • 6HUANG S I, SHIUHPYNG S, TYGAR J D. Secure encrypted-data aggregation for wireless sensor network[J]. Springer Wireless Net- works, 2010, 5(16):915-927.
  • 7CHAN H, PERRIG A. ACE: an emergent algorithm for highly uni- form cluster formation[J]. LNCS, 2004,2(2920): 154-171.
  • 8SCHNEIER B. Fast software encryption[A]. Cambridge Security Workshop Proceedings[C]. Springer-Verlag, 1994.191-204.
  • 9WANDER A, GURA N, EBERLE H, et al. Energy analysis of pub- lic-key cryptography on small wireless devices[A]. Proc of Per- Com'05[C]. Kauai Island, Hawaii, USA, 2005.324-328.
  • 10MICA. datasheet[EB/OL], http://www.xbow.com/Pro-ducts/Product pd f_fi les/Wireless_pd f/MICA2_Datasheet.pd f/, 2006.

同被引文献50

  • 1彭木根,王英杰,王文博.无线传感器网络体系结构和关键技术研究[J].中兴通讯技术,2005,11(6):34-39. 被引量:5
  • 2郑勇,杨志义,李志刚,李凌.基于无线传感器网络的网内数据融合[J].计算机应用研究,2006,23(4):243-245. 被引量:11
  • 3杨浩淼,孙世新,李洪伟.双线性Diffie-Hellman问题研究[J].四川大学学报(工程科学版),2006,38(2):137-140. 被引量:12
  • 4Akyildiz I F,Su W,Sankarasubramaniam Y.A Survey on Sensor Networks[J].IEEE Communications Magazine,2002,40 (8):102-114.
  • 5Tang Xueyan,Xu Jianliang.Extending Network Lifetime for Precision Constrained Data Aggregation in Wireless sensor Networks[C]//Proceedings of the 25th IEEE International Conference on Computer Communications.Piscataway,USA:IEEE Press,2006:131-146.
  • 6Hu Lingxuan,Evans D.Secure Aggregation for Wireless Networks[C]//Proceedings of Workshop on Security and Assurance in Ad hoc Networks.Orlando,USA:IEEE Press,2003:384-390.
  • 7Przydatek B,Song D,Perrig A.SIA:Secure Information Aggregation in Sensor Networks[C]//Proceedings of SenSys' 03.[S.l.]:IEEE Press,2003:255-265.
  • 8Yang Yi,Wang Xinran,Zhu Sencun,et al.SDAP:A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks[C]//Proceedings of MOBIHOC' 06.[S.l.]:ACM Press,2006:1-30.
  • 9Westhoff D,Girao J,Acharya M.Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks:Encryption,Key Distribution and Routing Adaptation[J].IEEE Transactions on Mobile Computing,2006,5 (10):1417-1431.
  • 10Wu K,Dreef D,Sun B,et al.Secure Data Aggregation Without Persistent Cryptographic Operations in Wireless Sensor Networks[J].Ad Hoc Networks,2007,5 (1):100-111.

引证文献5

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部