期刊文献+

基于二叉树的簇内分层密钥管理方案

A Key Management Scheme based on Intra-cluster Hierarchical Binary-tree Structure
原文传递
导出
摘要 通过对基于分簇的数据融合隐私保护算法CPDA的分析,提出了一种基于簇内分层随机密钥管理方案.它使用二叉树的逻辑结构,对簇内节点进行重新组织后,传输各自的切片数据,再通过建立密钥树的逻辑层次结构.对整个组密钥进行管理最终实现了在数据融合的同时,保护数据安全通过实验分析,相比于分簇隐私数据融合协议CPDA在具有更好的隐私保护性的同时,更低的数据通信量以及良好的可扩展性. Through the analysis of the privacy-preserving data aggregation algorithm (CPDA), this paper proposes a Key Management Scheme based on hierarchical duster, which uses the logic structure of Binary-tree to organize the nodes and transmit slice data. In addition, we design a scheme to build the logical key binary tree by certain rules and can achieve privacy protection when data aggregate. Compared to CPDA, the analysis results show that our scheme cap. obtain higher privacy protection, lower communication overhead and better scalability.
作者 万润泽
出处 《数学的实践与认识》 CSCD 北大核心 2014年第6期121-127,共7页 Mathematics in Practice and Theory
基金 基础教育信息技术服务湖北省协同创新中心项目 湖北省自然科学基金资助项目(2012FFB00402)
关键词 无线传感器网络 隐私保护 数据融合 分簇 wireless sensor networks privacy-preserving data aggregation clustering
  • 相关文献

参考文献11

  • 1Tian B, Han S, Parvin S, et al. Self-healing key distribution schemes for wireless networks: a.survey[J]. The Computer Journal, 2011, 54(4): 449-569.
  • 2胡运松,单洪,马涛.异构无线传感器网络组密钥管理方案设计[J].计算机工程,2011,37(1):149-150. 被引量:2
  • 3覃荣华,解永生,袁晓兵.异构分组无线传感器网络密钥管理机制[J].华中科技大学学报(自然科学版),2012,40(4):19-22. 被引量:1
  • 4He Weibo, Nguyen H. PDA: Privacy-preserving data aggregation in wireless sensor networks[C]//Proc of the 26th IEEE International Conference on Computer Communications. Washington D C. USA: 2007: 2045-2053.
  • 5Girao J, Westhoff D, Schneider M. CDA: Concealed data aggregation for reverse multicast traffic in Wireless Sensor Networks[C]//Proc of the 40th International Conference on Communications Seoul, Korea, 2005: 3044-3049.
  • 6Zhang W S, Wang C, Feng T M. GPS: Generic Privacy-Preservation Solutions for Approximate Aggregation of Sensor Data[C]//Proc of sixth Annual IEEE International Conference on Pervasive Computing and Communications. Washington: IEEE Computer Society Press, 2007: 179-184.
  • 7Heinzelman W B, Chandrakasan A, Balakrishnan H. Energy-efficient communication protocol for wireless micro-sensor networks[C]//Proc 33rd Hawaii Int Conf System Sciences (HICSS), Maul, HI, Jan, 2000: 4-7.
  • 8杨庚,王安琪,陈正宇,许建,王海勇.一种低耗能的数据融合隐私保护算法[J].计算机学报,2011,34(5):792-800. 被引量:58
  • 9Morain F. Implementing the asymptotically fast version of the elliptic curve primality proving algorithm[J]. Mathematics of Computation, 200"/, 76: 493-505.
  • 10Laurent Eschenauer, Gligor Virgil D. A Key-Management Scheme for Distributed Sensor Net- works[C]//Proceedings of the 9th ACM Conference on Computer and Communication Security, 2002: 41-47.

二级参考文献22

  • 1苏忠,林闯,封富君,任丰原.无线传感器网络密钥管理的方案和协议[J].软件学报,2007,18(5):1218-1231. 被引量:111
  • 2Chandha A, Liu Yonghe, Das S K. Group Key Distribution via Local Collaboration in Wireless Sensor Networks[C]//Proc. of the 2nd Annual IEEE Communications Society Conference on Sensor and Ad Hoe Communications and Networks. [S. l.]: IEEE Press, 2006: 46-54.
  • 3Jiang Yixin, Lin Chuang, Shi Minghui, et al. Self-healing Group Key Distribution with Time Limited Node Revocation for Wireless Sensor Networks[J]. Ad Hoc Networks, 2007, 5(1): 14-23.
  • 4Wong C, Gouda M, Lam S. Secure Group Communications Using Key Graphs[J]. IEEE/ACM Transactions on Networking, 2000, 8(1): 16-30.
  • 5Son Ju-Hyung, Lee Jun-Sik, Seo Seung-Woo. Topological Key Hierarchy for Energy-efficient Group Key Management in Wireless Sensor Networks[J]. Wireless Personal Communications, 2010, 52(2): 359-382.
  • 6Bista R,Yoo H K,Chang J W.A new sensitive data aggregation scheme for protecting integrity in wireless sensor networks//Proceedings of the 10th IEEE International Conference on Computer and Information Technology.Bradford,UK,2010.2463-2470.
  • 7Eschenauer L,Gligor V D.A key-management scheme for distributed sensor networks//Proceedings of the 9th ACM Conference on Computer and Communications Security.Washington,USA,2002:41-47.
  • 8Levis P,Lee N,Welsh M,Culler D.TOSSIM:Accurate and scalable simulation of entire TinyOS applications//Proeeedings of the 1st International Conference on Embedded Networked Sensor Systems.Los Angeles,USA,2003:126-137.
  • 9Szewcayk R,Ferencz A.Energy implications of network sensor designs.Berkeley:Berkeley Wireless Research Center Report,2000.
  • 10Intanagonwiwat C,Govindan R,Estrin D.Directed diffusion:A scalable and robust communication paradigm for sensor networks//Proceedings of the 6th Annual International Conference on Mobile Computing and Networking.Boston,USA,2000:56-67.

共引文献58

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部