期刊文献+

基于同态加密与认证的WSN安全数据融合 被引量:2

SECURE DATA AGGREGATION IN WSN BASED ON HOMOMORPHIC ENCRYPTION AND AUTHENTICATION
下载PDF
导出
摘要 无线传感器网络数据融合技术能减少冗余信息的传输量,降低能耗,延长网络生命期。由于传感器节点通常部署在开放甚至敌对的环境中,数据融合的安全性尤为重要。端到端加密与认证的数据融合方案相比逐跳方案具有更强的抗节点捕获能力。为此,在CMT方案的基础上,提出一种密钥生成算法、一种高效的同态消息认证码算法以及一种优化的节点ID传输方案。分析与模拟结果表明,在保证安全性的前提下,该方案能有效降低计算和传输的开销。 Data aggregation technology in wireless sensor networks can reduce the transmission throughput of redundant information, lower energy consumption, and prolong network lifetime. Due to open or hostile environment in which the nodes are deployed, the security of data aggregation is of great important. Data aggregation schemes with end-to-end encryption and authentication provide better protection against node capture attacks than hop-by-hop schemes. Therefore, based on the CMT scheme, this paper proposes a key generation algorithm, an efficient homomorphic MAC algorithm and an optimised node ID transmission scheme. Analysis and simulation results show an effective reduction in the cost of computation and transmission, while the security is guaranteed.
作者 何劲
出处 《计算机应用与软件》 CSCD 北大核心 2014年第9期314-316,321,共4页 Computer Applications and Software
关键词 无线传感器网络 数据融合 同态加密 同态消息认证码 端到端安全 Wireless sensor network(WSN) Data aggregation Homomorphic encryption Homomorphic message authentication code(MAC) End-to-end security
  • 相关文献

参考文献9

  • 1姚向华.无线传感器网络原理与应用[M].北京:高等教育出版社.2011.
  • 2Suat Ozdemir,Yang Xiao.Secure Data Aggregation in Wireless SensorNetworks:A Comprehensive Overview[J].Computer Networks,2009,53:2022-2037.
  • 3杨庚,陈伟,曹晓梅.无线传感器网络安全[M].北京:科学出版社,2010.
  • 4Sjulia Albath,Sanjay Madria.Secure Hierarchical Data Aggregation inWireless Sensor Networks[C]//IEEE Communications Society SubjectMatter Experts for Publication in the WCNC 2009 Proceedings.
  • 5Castelluccia C,Mykletun E,Tsudik G.Efficient Aggregation of Encrypt-ed Data in Wireless Sensor Networks[C]//Proceedings of the Confer-ence on Mobile and Ubiquitous Systems:Networking And Services,2005:109-117.
  • 6魏琴芳,张双杰,胡向东,秦晓良.基于同态MAC的无线传感器网络安全数据融合[J].传感技术学报,2011,24(12):1750-1755. 被引量:5
  • 7Castelluccia C.Securing Very Dynamic Groups and Data Aggregation inWireless Sensor Networks[C]//Proceedings of IEEE InternationalConference on Mobile Ad hoc and Sensor Systems,Washington,2007.
  • 8Bista R,Yoo H K,Chang J W.Achieving Scalable Privacy PreservingData Aggregation for Wireless Sensor Networks[C]//10th IEEE Inter-national Conference on Computer and Information Technology,2010:1962-1969.
  • 9MarkStamp.信息安全原理与实践[M].北京:电子工业出版社.2007.

二级参考文献16

  • 1Przydatek B, Song D, Perrig A. SIA : Secure Information Aggregation in Sensor Networks [ C ]//Proc of SenSys 03. Los Angeles : ACM Press ,2003:255-265.
  • 2Yang Y,Wang X,Zhu S, et al. SDAP : A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks [ C ]//Proc of the ACM MOBIHOC 06. Florence : ACM Press,2006:356-367.
  • 3Castellueeia C, Myklentn E, Tsudik G. Efficient Aggregation of Encrypted Data in Wireless Sensor Networks [ C ]//The Second Annual International Conference on MobiQuitous 2005. San Diego : IEEE Computer Society,2005 : 109-117.
  • 4Poornima A S, Amberker B B. SEEDA: Secure End-to-End Data Aggregation in Wireless Sensor Networks [ C]//2010 Seventh In- ternational Conference On Wireless And Optical Communications Networks (WOCN) , Colombo : IEEE Press,2010 : 1-5.
  • 5Bahi J M, Guyeux C, Makhoul A. Efficient and Robust Secure Aggregation of Encrypted Data in Sensor Networks [ C ]//2010 Fourth International Conference on Sensor Technologies and Applications ( SENSORCOMM ) , Veniee/Mestre: IEEE Press, 2010:472-477.
  • 6Albath J,Madria S. Secure Hierarchical Data Aggregation in Wireless Sensor Networks [ C ]//Proc of the WCNC 2009. Budapest: IEEE Press,.2009 : 1-6.
  • 7Castelluccia C. Securing Very Dynamic Groups and Data Aggregation in Wireless Sensor Networks [ C ]//IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems (MASS). Washington DC : IEEE Computer Society Press ,2007 : 1-9.
  • 8Taiming Feng, Chuang Wang, Wensheng Zhang,et al. Confidentiality Protection for Distributed Sensor Data Aggregation [ C ]//The 27th Conference on Computer Communications ( INFOCOM ). New York : IEEE Communications Society Press ,2008:56-60.
  • 9Mykletun E, Girao J, Westhoff D. Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks [ C ]//Proc of the ICC 2006. Istanbul : IEEE Press,2006:2288-2295.
  • 10Peter S, Piotrowski S, Langendoerfer R. On Concealed Data Aggrega- tion for WSNs [ C]//Proc of the CCNC 2007. Las Vegas: IEEE Press ,2007 : 192-196.

共引文献20

同被引文献20

  • 1Jay Heiser,Mark Nicolett.Assessing the Security Risks of Cloud Computing[EB/OL].(2008-6-3)[2012-12-28].www.gartner.com/id=685308.
  • 2Bit network.HTC泄密等30起泄密案的启示[EB/OL].2013-09-05.http://www.people.com.cn/.
  • 3Riverst R,Adleman L,Dertouzos M.On data banks and privacy homomorphisms[M].New York:Academic Press,1978:169-180.
  • 4Gentry C.Fully homomorphic encryption using ideal lattices[M].New York:Association for Computing Machinery,2009:169-178.
  • 5Marten Van Dijk,Gentry C,Halev s,et al.Fully homomorphic encryption over the integers[C]//Pro of the 29th Annual International Conference on Theory and Application of Cryptograhic Technational.Berlin:Springer-Verlag,2010:24-43.
  • 6Song D,Wagner,Perrig A.Practical techniques for searcheson encrypted data[C]//Proc.of IEEE Symposium on Seccurity and Privacy’00.2000.
  • 7Boneh D,Crescenzo G D,Ostrovsky R,et al.Public keyenccryption with keyword search[C]//Proc.of Eurocryp’04,Volume3027 of LNCS.Springer,2004.
  • 8Wang C,Cao N,Li J,et al.Secure ranked keyword search over encrypted cloud data[C]//Proc.of ICDCS’10.2010.
  • 9周可,王桦,李春花.云存储技术及其应用[J].中兴通讯技术,2010,16(4):24-27. 被引量:130
  • 10黄永峰,张久岭,李星.云存储应用中的加密存储及其检索技术[J].中兴通讯技术,2010,16(4):33-35. 被引量:33

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部