期刊文献+

无线传感器网中基于隐私同态的数据聚合方案 被引量:6

Data Aggregation Scheme Based on Privacy Homomorphism for WSN
下载PDF
导出
摘要 DF数据聚合方案在加/解密时采用相同的秘钥,因此不能有效抵抗已知明文攻击、捕获攻击及中间人攻击。为解决该问题,提出一个适用于无线传感器网络的数据聚合方案。该方案利用一次一密的双重加密机制,多资源节点在加/解密时采用不同的密钥,从而有效抵抗明/密文攻击、捕获攻击以及中间人攻击。同时,基于隐私同态技术进行数据加密,使得聚合数据时无需解密,保证了数据机密性和用户的隐私性。分析结果表明,与SDAP和SEDA方案相比,该方案具有较强的前向安全性和较低的存储开销。 There is only a same key in Domingo-Ferrer (DF) data aggregation scheme while encryption/decryption,therefore it can not resist the known plaintext attack,capture attack,etc.In order to solve these problems,this paper proposes a data aggregation scheme based on Privacy Homomorphism (PH) mechanism.The scheme adopts a double encryption mechanism of one-time pad,multi-resource node uses different key while encryption/decryption,so that it can be effectively against plaintext/ciphertext attack,compromising attack and man-in-middle attack.It does not decrypt while aggregating,so need not the extra decryption overhead,and at the same time it ensures the confidentiality of the data and user' s privacy.Analysis result shows that this scheme has strong forward security and lower storage cost compared with the SDAP and SEDA scheme.
出处 《计算机工程》 CAS CSCD 2014年第8期101-105,共5页 Computer Engineering
基金 国家自然科学基金资助项目(61163038 71263045) 教育部人文社会科学研究基金资助项目"西部国家重点生态功能区生态安全预警研究"(12YJCZH282)
关键词 聚合 捕获攻击 隐私同态 聚合器 aggregation cluster compromised attack Privacy Homomorphism (PH) aggregator
  • 相关文献

参考文献19

  • 1Akyildiz I F,Su W,Sankarasubramaniam Y.A Survey on Sensor Networks[J].IEEE Communications Magazine,2002,40 (8):102-114.
  • 2Tang Xueyan,Xu Jianliang.Extending Network Lifetime for Precision Constrained Data Aggregation in Wireless sensor Networks[C]//Proceedings of the 25th IEEE International Conference on Computer Communications.Piscataway,USA:IEEE Press,2006:131-146.
  • 3Hu Lingxuan,Evans D.Secure Aggregation for Wireless Networks[C]//Proceedings of Workshop on Security and Assurance in Ad hoc Networks.Orlando,USA:IEEE Press,2003:384-390.
  • 4Przydatek B,Song D,Perrig A.SIA:Secure Information Aggregation in Sensor Networks[C]//Proceedings of SenSys' 03.[S.l.]:IEEE Press,2003:255-265.
  • 5Yang Yi,Wang Xinran,Zhu Sencun,et al.SDAP:A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks[C]//Proceedings of MOBIHOC' 06.[S.l.]:ACM Press,2006:1-30.
  • 6Westhoff D,Girao J,Acharya M.Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks:Encryption,Key Distribution and Routing Adaptation[J].IEEE Transactions on Mobile Computing,2006,5 (10):1417-1431.
  • 7Wu K,Dreef D,Sun B,et al.Secure Data Aggregation Without Persistent Cryptographic Operations in Wireless Sensor Networks[J].Ad Hoc Networks,2007,5 (1):100-111.
  • 8Ozdemir S.Secure,Reliable Data Aggregation for Wireless Sensor Networks[M]//Ichikawa H,Cho WeDuke,Satoh I.Ubiquitous Computing Systems,Tokyo,Japan:[s.n.],2007:25-28.
  • 9He W,Liu X,Nguyen H,et al.PDA:Privacy-preserving Data Aggregation in Wireless Sensor Networks[C]// Proceedings of the 26th IEEE International Conference on Computer Communications.Piscataway,USA:IEEE Press,2006:165-168.
  • 10Girao J,Westhoff D,Schneider M.CDA:Concealed Data Aggregation in Wireless Sensor Networks[C]// Proceedings of ACM Workshop on Wireless Security.Philadelphia,USA:IEEE Press,2004:3044-3049.

二级参考文献10

  • 1INTANAGONWlWAT C, GOVINDAN R, ESTRIN D, et al. Directed diffusion for wireless sensor networking[J]. IEEE/ACM Transactions on Networking, 2003, 11 ( 1):2-16.
  • 2BARTOSZ P, DAWN S, ADRIAN E SIA:secure information aggrega- tion in sensor networks[A]. Proceedings of ACM SenSys Confer- ence[C]. Los Angeles, USA, 2003.255-265.
  • 3WAGNER D. Resilient aggregation in sensor networks[A]. Proceed- ings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks[C]. Washington, DC, USA, 2004.78-87.
  • 4CAM H, OZDEMIR S. Energy-efficient security protocol for wireless sensor networks[A]. Proceedings of IEEE VTC Fall 2003 Confer- ence[C]. New York, USA, 2003.2981-2984.
  • 5ACHARYA M, GIRAO J. Secure comparison of encrypted data in wireless sensor networks[A]. 3rd International Symposium on Model- ing and Optimization in Mobile, Ad Hoc, and Wireless Networks[C]. Trentino, Italy, 2005.47-53.
  • 6HUANG S I, SHIUHPYNG S, TYGAR J D. Secure encrypted-data aggregation for wireless sensor network[J]. Springer Wireless Net- works, 2010, 5(16):915-927.
  • 7CHAN H, PERRIG A. ACE: an emergent algorithm for highly uni- form cluster formation[J]. LNCS, 2004,2(2920): 154-171.
  • 8SCHNEIER B. Fast software encryption[A]. Cambridge Security Workshop Proceedings[C]. Springer-Verlag, 1994.191-204.
  • 9WANDER A, GURA N, EBERLE H, et al. Energy analysis of pub- lic-key cryptography on small wireless devices[A]. Proc of Per- Com'05[C]. Kauai Island, Hawaii, USA, 2005.324-328.
  • 10MICA. datasheet[EB/OL], http://www.xbow.com/Pro-ducts/Product pd f_fi les/Wireless_pd f/MICA2_Datasheet.pd f/, 2006.

共引文献4

同被引文献46

  • 1彭木根,王英杰,王文博.无线传感器网络体系结构和关键技术研究[J].中兴通讯技术,2005,11(6):34-39. 被引量:5
  • 2郑勇,杨志义,李志刚,李凌.基于无线传感器网络的网内数据融合[J].计算机应用研究,2006,23(4):243-245. 被引量:11
  • 3杨浩淼,孙世新,李洪伟.双线性Diffie-Hellman问题研究[J].四川大学学报(工程科学版),2006,38(2):137-140. 被引量:12
  • 4张正勇,梅顺良.无线传感器网络节点自定位技术[J].计算机工程,2007,33(17):4-6. 被引量:10
  • 5AkyildizIF, Su W, Sankarasubramaniam Y, et al. Wireless Sensor Networks: A Survey I J 1. Computer Networks, 2002,38 ( 4 ) : 393-422.
  • 6周彦,李建勋,王冬丽.无线传感器网络目标跟踪综述[J].传感器与微系统,2011,30(s1):9-14.
  • 7Yick J,Mukherjee B, Ghosal D. Wireless Sensor Network Survey E J 1. Computer Networks, 2008,52 ( 12 ) :2292-2330.
  • 8Teng Jing,Snoussi H, Richard C, et al. Distributed Varia- tional Filtering for Simultaneous Sensor Localization and Target Tracking in Wireless Sensor Networks [ J ]. IEEE Transactions on Vehicular Technology, 2012, 61 ( 5 ) : 2305 -2318.
  • 9Taylor C, Shrobe H. Simultaneous Localization, Cali- bration,and Tracking in an Ad Hoc Sensor Network[C]// Proceedings of International Conference on Information Processing in Sensor Networks. Washington D. C., USA: IEEE Press ,2006:27-33.
  • 10Jajamovich G H, Wang Xiaodong. Joint Multitarget Tracking and Sensor Localization in Collaborative Sensor Networks [ J ]. IEEE Transactions on Aerospace and Electronic Systems, 2011,47 ( 4 ) : 2361-2375.

引证文献6

二级引证文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部