期刊文献+

无线传感器网络中安全数据融合方法研究 被引量:1

Research on Security of Data Aggregation in Wireless Sensor Networks
下载PDF
导出
摘要 随着无线传感器网络应用的不断增加,很多应用都需要保证信息或数据的隐私性和完整性,这就对数据融合提出了更高的要求和新的挑战,因此设计一种兼顾数据机密性和完整性的数据融合算法就显得尤为重要。文中提出了一种基于同态加密对数据的安全性进行保护和基于同态验证码对数据的完整性进行保护的算法。同态加密可以对加密数据直接进行操作,同态验证码抗攻击性强,具有良好的完整性保护特性。同时算法依据数据融合的树结构本身的特征,减少了数据通信开销,计算复杂度低。理论分析和仿真结果显示了该方法的有效性。 With the increasing application of wireless sensor networks,many applications need to guarantee the privacy and integrity of the information or data,the data fusion has been put forward higher requirements and new challenges,therefore,to design an data fusion algo-rithm with both data confidentiality and integrity is particularly important. It presents an algorithm for data security protection based on homomorphic encryption and to promise the data integrity based on homomorphic verification code. Homomorphic verficiation code of strong attack resisting,has good properties of integrity protection. At the same time,the algorithm based on tree structure data fusion it-self,reduces the data communication overhead with low computing complexity. Theoretical analysis and simulation results show the effec-tiveness of the proposed method.
作者 季田辉 杨庚
出处 《计算机技术与发展》 2014年第7期162-165,169,共5页 Computer Technology and Development
基金 国家"973"重点基础研究发展计划项目(2011CB302903) 国家自然科学基金资助项目(61272084 61202004) 江苏省高校自然科学研究重大项目(11KJA520002) 江苏省科技支撑计划(社会发展)项目(BE2011826) 高等学校博士学科点专项科研基金资助课题(20113223110003 20093223120001)
关键词 无线传感器网络 数据融合 同态验证码 wireless sensor network data aggregation homomorphic verification code
  • 相关文献

参考文献13

  • 1Papadopoulos S, Kiayias A, Papadias D. Exact in-network ag- gregation with integrity and confidentiality[ J ]. IEEE Transac- tions on Knowledge and Data Engineering, 2012,24 ( 10 ) : 1760-1773.
  • 2He Weibo, Liu Xue, Nguyen H, et al. PDA : privacy-preserving data aggregation in wireless sensor networks [ C ]//Proc of the 26th IEEE international conference on computer communica- tions. Washington DC, USA: IEEE Computer Society Press, 2007 : 2045 - 2053.
  • 3He Weibo, Liu Xue, Nguyen H, et al. A duster-based protocol to enforce integrity and preserve privacy in data aggregation [ C]//Proc of the 29th IEEE international conference on dis- tributed computing systems. Montreal, QC : IEEE Press, 2009 : 14-19.
  • 4张双杰,魏琴芳,秦晓良.无线传感器网络中有效的安全数据融合机制[J].电视技术,2012,36(1):67-70. 被引量:1
  • 5Girao J, Westhoff D, Schneider M. CDA : concealed data aggre- gation for reverse multicast traffic in wireless sensor networks [ C]//Proc of 2005 IEEE international conference on commu- nications. [ s. 1. ] :IEEE ,2005:3044-3049.
  • 6Li Z, Gong G. Data aggregation integrity based on homomor- phic primitives in sensor networks[ M ]//Ad-Hoc, Mobile and Wireless Networks. Heidelberg, Berlin : Springer, 2010 : 149 - 162.
  • 7Intanagonwiwat C, Estrin D, Govindan R, et al. Impact of net- work density on data aggregation in wireless sensor networks [C ]//Proceedings of the 22nd international conference on distributed computing systems. [ s. 1. ] : [ s. n. ], 2002 : 457 - 458.
  • 8Tang X, Xu J. Extending network lifetime for precision eon- strained data aggregation in wireless sensor networks [ C ]// Proc of INFOCOM. Barcelona, Spain: IEEE ,2006 : 1 - 12.
  • 9Ynng Yi, Wang Xinran, Zhu Sencun, et al. SDAP: a secure hop-by-hop data aggregation protocol for sensor networks[ C l// Proc of MobiHoc. Florence, Italy : ACM,2006.
  • 10Wagner D. Resilient aggregation in sensor networks[ C ]//Pro- ceedings of the 2nd ACM workshop on security of ad hoc and sensor networks. New York, NY, USA : ACM ,2004:78-87.

二级参考文献10

  • 1GIRAO J,WESTHOFF D, SCHNEIDER M. CDA : concealed data aggregation for reverse multicast traffic in wireless sensor networks [ C ]//Proc. ICC 2005. Seoul : IEEE Press ,2005:3044-3049.
  • 2DOMINGO F J. A provably secure additive and rnuhiplicative privacy to- momorphism [ C ]//Proc. 5th International Conference on Information Security( ISC 2002). Sao Paulo : ISC ,2002:471-483.
  • 3CASTELLUCCIA C,MYKLENTN E,TSUDIK G. Efficient aggregation of encrypted data in wireless sensor networks [ C ]//Proc. Second Annual International Conference on MobiQuitous 2005. San Diego: IEEE Com puter Society,2005 : 109 - 117.
  • 4MLAIH E ,ALY S A. Secure hop-by-hop aggregation of end-to-end concealed data in wireless sensor networks[ C]//Proc. the INFOCOM 2008. Phoenix: IEEE Press,2008 : 1-6.
  • 5PETER S, PIOTROWSKI S, LANGENDOERFER R. On concealed data aggregation for WSNs[C]//Proc. CCNC 2007. Las Vegas:IEEE Press, 2007 : 192-196.
  • 6MYKLETUN E, GIRAO J, WESTHOFF D. Public key based cryptoschemes for data concealment in wireless sensor networks [ C ]//Proc. IEEE International Conference on Communications(ICC2006). Istanbul IEEE Press ,2006:2288-2295.
  • 7AZARDERAKHSH R, REYHANI M A, ABID Z E. A key management scheme for cluster basedwireless sensor networks [ C ]//Proc. EUC 2008. Shanghai : IEEE Press .2008:222-227.
  • 8DAS A K, SENGUPTA I. An effective group-based key establishment scheme for large-scale wireless sensor networks using bivariate polynomials [ C ]//Proc. COMSWARE 2008.Bangalore: IEEE Press ,2008:9-16.
  • 9罗蔚,胡向东.无线传感器网络中一种高效的安全数据融合协议[J].重庆邮电大学学报(自然科学版),2009,21(1):110-114. 被引量:14
  • 10刘鑫芝.无线传感器网络安全数据融合的研究[J].计算机与现代化,2010(5):151-155. 被引量:8

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部