期刊文献+

高效安全的无线传感器网络数据聚合方案 被引量:2

Efficient and secure data aggregation scheme for wireless sensor networks
下载PDF
导出
摘要 提出了一种高效安全的无线传感器网络数据聚合方案。节点数据用对称密钥进行加密,远端服务器解密数据,聚合头在不需明文的情况下完成完整性检查、发送方身份认证及数据聚合等操作,保证了安全的端到端数据传输。分析与仿真表明,与相关方案相比,该方案可有效抵抗多种恶意攻击,提供了较高的安全性及较小的能耗开销。 Secure end-to-end data transmission is an important method to protect the data privacy in Wireless Sensor Networks (WSN). Authors proposed an efficient and secure data aggregation scheme for WSN. Sensor readings were encrypted with symmetric key and the decryption of cipher-text was performed by remote server, the aggregators completed the operations such as data integrity verification, sender identity authentication and data aggregation without the plaintext of sensor readings. Analysis and simulation show that the proposed scheme can resist various malicious attacks effectively, provides higher security and lower energy consumption than related schemes.
出处 《计算机应用》 CSCD 北大核心 2013年第A01期137-140,共4页 journal of Computer Applications
基金 广东省自然科学基金资助项目(S2012010008505)
关键词 传感器网络 数据聚合 隐私保护 Wireless Sensor Network(WSN) data aggregation privacy protection
  • 相关文献

参考文献13

  • 1INTANAGONWIWAT C, GOVINDAN R,ESTR1N D. Heidemann,directed diffusion for wireless sensor networicing [ J]. IEEE/ACMTransactions on Networking, 2003, 11(1): 2 - 16.
  • 2AL-KARAKII N, UI-MUSTAFA I N, KAMAL A E. Data aggrega-tion in wireless sensor networks - exact and approximate algorithms[C]// 2004 Workshop on High Performance Switching and Routing.Piscataway: IEEE, 2004: 241 -245.
  • 3AONISHI T, MATSUDA T, MIKAMI S, et al. Impact of aggrega-tion efficiency on GIT-routing for wireless sensor networks [ C] //Proceedings of the 2006 International Conference Workshops on Par-allel Processing. Washington, DC: IEEE Computer Society, 2006:151 -158.
  • 4VILLAS L A, GUIDONI D L, ARAUJO R B, et al A scalable anddynamic data aggregation aware routing protocol for wireless sensornetworks[ C]// MSWIM ’ 10: Proceedings of the 13th ACM Interna-tional Conference on Modeling, Analysis, and Simulation of Wirelessand Mobile Systems. New York: ACM, 2010: 110-117.
  • 5PRZYDATEK B, SONG D, PERRIG A. SIA: secure informationaggregation in sensor networics[ C] // SenSyst)3: Proceedings of the1st International Conference on Embedded Networked Sensor Sys-tems. New York: ACM, 2003: 255 -265.
  • 6WAGNER D. Resilient aggregation in sensor networks [ C] // Pro-ceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sen-sor Networks. New Yoric: ACM, 2004:78 -87.
  • 7CAM H, OZDEMIR S. Energy-efficient security protocol for wirelesssensor networics[ C]// Proceeding of IEEE VTC Fall 2003 Confer-ence. Washington, DC: IEEE Computer Society, 2003: 2981 -2984.
  • 8ACHARYA M,GIRAO J. Secure comparison of encrypted data inwireless sensor networks[ C]// Proceedings of the 3rd InternationalSymposium on Modeling and Optimization in Mobile,Ad Hoc, andWireless Networks. Washington, DC: IEEE Computer Society,2005: 47 -53.
  • 9HUANG S-I, SHIEH S, TYGAR J D. Secure encrypted-data aggre-gation for wireless sensor network[ J] . Wireless Networks, 2010, 16(4): 915 -927.
  • 10PERRIG A, SZEWCZYK K, TYGAR J D, al SPINS: Securityprotocols for sensor networka[ J]. ACM Wireless Network, 2002,8(5):521?534.

同被引文献10

引证文献2

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部