期刊文献+

无人值守WSN中基于中国剩余定理的可靠数据生存方案 被引量:3

Dependable data survival scheme based on Chinese remainder theorem weighted threshold secret sharing in unattended WSN
下载PDF
导出
摘要 无人值守无线传感器网络(UWSN)通常部署在环境恶劣或敌对环境中,在静态汇聚节点(或基站)部署困难的情况下,感知节点无法完成感知信息的实时汇聚传输,需暂时维持感知数据的生存状态。为了增强数据生存的概率,提高感知数据的抗损坏、擦除和篡改能力,重点研究无人值守无线传感器网络中的数据加密生存问题,提出了一种基于中国剩余定理(CRT)多等级秘密共享的可靠数据生存方案。基于网络中节点的信誉模型,设计了节点权重密钥存储机制,增强了数据加密密钥分割存储的有效性,并结合基于中国剩余定理的秘密共享机制,提升了原有数据加密分发和恢复过程的效率。此外,还讨论了基于中国剩余定理的秘密共享方案具有的良好同态性质,并依此设计了子密钥组合运算方案,提高了数据加密生存方案中子密钥运算的安全性,进一步确保了数据生存方案的安全、可靠。 Unattended Wireless Sensor Network (UWSN) is usually deployed in a bad or hostile environment. The deployment of static aggregation node (or base station) is difficult, making real-time information aggregation impossible. Hence the node should undertake the mission of self-sustaining the data temporarily. In order to enhance the probability of data survival, this paper proposed a dependable data survival scheme based on Chinese Remainder Theorem (CRT) weighted threshold secret sharing in UWSN. The scheme built a node reputation model in the network, improving the efficiency and effectiveness of key division, distribution and reconstruction. In addition, this paper also discussed the good homomorphism properties of CRT based multi-secret sharing, and the key combination operation scheme, which further ensures the reliable survival of data.
出处 《计算机应用》 CSCD 北大核心 2013年第5期1343-1346,共4页 journal of Computer Applications
基金 国家自然科学基金资助项目(61232018 61170233 61272472) 安徽省教育厅自然科学基金资助项目(KJ2013A040)
关键词 无人值守无线传感器网络 数据生存 中国剩余定理 权重门限秘密共享 同态性质 信誉模型 Unattended Wireless Sensor Network (UWSN) data survival Chinese remainder theorem weighted threshold secret sharing homomorphism property reputation model
  • 相关文献

参考文献12

  • 1DI PIETRO R, MANCINI L V, SORIENTE C, et al. Catch me (if you can): data survival in unattended sensor networks [ C]// The Sixth Annual IEEE International Conference on Pervasive Computing and Communications. Washington, DC: IEEE Computer Society, 2008:185 - 194.
  • 2MA D, SORIENTE C, TSUDIK G. New adversary and new threats: security in unattended sensor networks [ J]. IEEE Network, 2009, 23(2) :43 -48.
  • 3VITALI D, SPOGNARDI A, MANCINI L V. Replication schemes in unattended wireless sensor networks [ C]///The 4th IFIP Interna- tional Conference on New Technologies, Mobility and Security. Washington, DC: IEEE Computer Society, 2011 : 1 - 5, 7 - 10.
  • 4VITALI D, SPOGNARDI A, VILLANI A, et al. MhRep: Multi-hop replication scheme for data survival in unattended wireless sensor networks [ C]// SRDSW: the 30th IEEE Symposium on Reliable Distributed Systems Workshops. Washington, DC: IEEE Computer Society, 2011 : 42 - 51.
  • 5VO T M Y, TALIM J. Random distribution for data survival in unat- tended wireless sensor networks [ C]//SENSORCOMM: the Fourth International Conference on Sensor Technologies and Applications. Washington, DC: IEEE Computer Society, 2010:468-471.
  • 6REN W, ZHAO J G, REN Y. MSS: A multi-level data placement scheme for data survival in wireless sensor networks[ C]// The 5th International Conference on Wireless Communications, Networking and Mobile Computing. Washington, DC: IEEE Computer Society, 2009:1 -4.
  • 7WANG Q, REN Q, LOU W J, et al. Dependable and secure sensor data storage with dynamic integrity assurance [ C]// INFOCOM: The 28th Conference on Computer Communications. Washington, DC: IEEE Computer Society, 2009:954 - 962.
  • 8SHAMIR A. How to share a secret [ J]. Communications of the ACM, 1979, 22(11): 612- 613.
  • 9LIU T, CHEN D J, ZHOU M Z. Pair-wise key update in wireless sensor networks based on reputation model [ C]//2011 International Conference on Electronics, Communications and Control. Washing- ton, DC: IEEE Computer Society, 2011: 1558-1561.
  • 10ZHOU L D, ZYGMUNT J H. Securing Ad Hoc networks [ J]. IEEE Networks Special Issue on Network Security, 1999, 13(6) :24 -30.

同被引文献32

  • 1马礼,唐长茂.一种基于分簇的无线传感器网络数据存储管理系统[J].计算机研究与发展,2011,48(S1):89-93. 被引量:8
  • 2王继成.一元多项式环中的孙子定理[J].杭州师范学院学报(自然科学版),2006,5(4):313-314. 被引量:2
  • 3Iftene S.General secret sharing based on the Chinese remainder theorem with application in E-voting[J].Electronic Notes in Theoretical Computer Science,2007,186(14):67-84.
  • 4贾春福.信息安全数学基础[M].天津:南开大学出版社,2005.
  • 5Pietro D R, Mancini L V, Soriente C, et al. Catch Me ( If You Can ) : Data Survival in Unattended Sensor Networks [ C]//Proceedings of the 6th Annual IEEE International Conference on PerCom. Washington D. C., USA : IEEE Press ,2001 : 185-194.
  • 6Ma D, Soriente C, Tsudik G. New Adversary and New Threats: Security in Unattended Sensor Networks [ J ]. IEEE Network,2009,23 (2) :43-48.
  • 7Vitali D, Spognardi A,Mancini LV. Replication Schemes in Unattended Wireless Sensor Networks [ C ]//Proceedings of the 4th IFIP International Conference on New Technologies, Mobility and Security. Washington D. C., USA : IEEE Press ,2011 : 1-5.
  • 8Vitali D, Spognardi A, Villani A, et al. MhRep : Multi- hop Replication Scheme for Data Survival in Unattended Wireless Sensor Networks [ C ]//Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems Workshops. Washington D. C., USA : IEEE Press, 201 1 : 42-51.
  • 9Thi M Y V, Talim J. Random Distribution for Data Survival in Unattended Wireless Sensor Networks [ C ]// Proceedings of the 4th International Conference on Sensor Technologies and Applications. Washington D. C., USA: IEEE Press ,2010:468-471.
  • 10Ren Wei,Zhao Junge, Ren Yi. MSS: A Multi-level Data Placement Scheme for Data Survival in Wireless Sensor Networks[ C ]//Proceedings of the 5th International Conference on Wireless Communications, Networking and Mobile Computing. Washington D. C., USA:IEEE Press, 2009 : 1-4.

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部