期刊文献+

两层传感器网络中安全分类协议研究 被引量:1

Safe and secure classification protocol in two-tiered sensor networks
下载PDF
导出
摘要 提出了一种安全分类协议SSC,该协议在保护待分类数据和分类规则隐私的情况下使存储节点进行正确分类,并且sink节点可以对分类结果进行抽样认证,防止妥协存储节点伪造分类结果。提出了一种不经意比较(oblivious comparison)技术MHash,该技术首先将分类需要的大小比较转换成等值比较,并进一步采用模运算和散列技术实现隐私保护下的数据分类。提出了一种"十"字邻居技术,分别将传感器以及传感器采集的数据组织成链,并采用倒置布鲁姆过滤器技术同步传感器节点之间的数据,sink利用该技术可以抽样检查存储节点分类统计结果的正确性,分析和实验结果验证了所提方案的有效性。 A safe and security classification protocol named SSC was proposed for two-tiered sensor networks, which enable storage nodes to process classification correctly without knowing both the value of classifying rules and the data which will be classified. To protect privacy, an oblivious comparison technique was presented. MHash, which enable storage nodes to compare data items from sink and sensors without knowing their values. Based on MHash and prefix membership verification technique, classification target was achieved in protecting the privacy of both sensor collected data and sink issued classification rules. To verify the correctness of classification results, a crossed neighborhood technique was proposed which organize sensors and data items in one sensor in sequences, to allow the sink checking the correctness of sampling classification results. Analysis and experimental results validate the efficacy and efficiency of SSC protocol.
出处 《通信学报》 EI CSCD 北大核心 2015年第2期56-67,共12页 Journal on Communications
基金 国家自然科学基金资助项目(61370226 61472132) 中国博士后科学基金资助项目 湖南大学青年教师成长计划基金资助项目 上海电力学院引进人才启动基金资助项目(K2015-008)~~
关键词 两层传感器网络 安全分类 隐私保护 完整性认证 two-tiered sensor networks secure classification privacy preserving integrity verification
  • 相关文献

参考文献42

  • 1李建中,李金宝,石胜飞.传感器网络及其数据管理的概念、问题与进展[J].软件学报,2003,14(10):1717-1727. 被引量:620
  • 2崔莉,鞠海玲,苗勇,李天璞,刘巍,赵泽.无线传感器网络研究进展[J].计算机研究与发展,2005,42(1):163-174. 被引量:730
  • 3唐勇,周明天,张欣.无线传感器网络路由协议研究进展[J].软件学报,2006,17(3):410-421. 被引量:201
  • 4HU W, TRAN V N, BULUSU N,et al. Design and evaluation of ahybrid sensor network for cane-toad monitoring[J]. ACM Transactionson Sensor Networks, 2009, 5(1): 1-28.
  • 5DESNOYERS P,GANESAN D, LI H, et al PRESTO: a predictivestorage architecture for sensor networks[A]. Proceeding of Workshopon Hot Topics in Operating Systems (HotOS’()5)[C]. Berkeley, CA:USENIX Association, 2005.
  • 6RATNASAMY S, KARP B. SHENKER S, et al. Data-centric storagein sensor nets with ght, a geographic hash table[J]. Mobile Networksand Applications, 2003,4(8):427-442.
  • 7Intel lab data[EB/OL]. http://berkeley.intel-research.net/ labdata.
  • 8WANG Q, CHEN W,ZHENG R, et al. Acoustic target tracking usingtiny wireless sensor devices[A]. Proc of 2nd Inti Conf on InformationProcessing in Sensor Networks[C]. Palo Alto, CA,2003.642-657.
  • 9HE T,KRISHNAMURTHY S,STANKOVIC J A, et al. An en-ergy-efficient surveillance system using wireless sensor networks[A].Proc of Inti Conf on Mobile Systems, Applications’ and Services[C].Boston, MA, 2004.270-283.
  • 10BROOKS R R, SAYEED A M. Distributed target classification andtracking in sensor networks[J]. Proceedings of the IEEE, 2003,91(8):1163-1171.

二级参考文献173

  • 1崔莉,鞠海玲,苗勇,李天璞,刘巍,赵泽.无线传感器网络研究进展[J].计算机研究与发展,2005,42(1):163-174. 被引量:730
  • 2唐勇,周明天,张欣.无线传感器网络路由协议研究进展[J].软件学报,2006,17(3):410-421. 被引量:201
  • 3Ganesan D, Govindan R, Shenker S, Estrin D. Highly-Resilient, energy-efficient multipath muting in wireless sensor networks.Mobile Computing and Communications Review, 2002,1(2):295-298.
  • 4Braginsky D, Estrin D. Rumor routing algorithm for sensor networks. In: Raghavendra CS, ed. Proceedings of the 1st Workshop on Sensor Networks and Applications. New York: ACM Press, 2002.
  • 5Girod L, Bychkovskiy V, Elson J, Estrin D. Locating tiny sensors in time and space: A case study. In: Manoli Y, Kim KS, eds.Proceedings of the International Conference on Computer Design. Piscataway: IEEE Press, 2002. 195-204.
  • 6Bulusu N, Estrin D, Girod L, Heidemann J. Scalable coordination for wireless sensor networks: Self-Configuring localization systems. 2001. http://lecs.cs.ucla.edu/-bulusu/papers/Bulusu01c.html.
  • 7Cerpa A, Estrin D. ASCENT: Adaptive self-configuring sensor networks topologies. In: Kermani P, ed. Proceedings of the 21st International Annual Joint Conference of the IEEE Computer and Communications Societies. Piscataway: IEEE Press, 2002.101-111
  • 8Elson J. Time synchronization services for wireless sensor networks. In: Kumar V, ed. Proceedings of the 15th International Parallel & Distributed Processing Symposium. 2001. Los Alamitos: IEEE Computer Press, 2001. 1965-1970.
  • 9Ye W, Heidemann J, Estrin D. An energy-efficient MAC protocol for wireless sensor networks. In: Kermani P, ed. Proceedings of the 21st International Annual Joint Conference of the IEEE Computer and Communications Societies. Piscataway: IEEE Press,2002.91-100.
  • 10Heidemann J, Silva F, Intanagonwiwat C. Building efficient wireless sensor networks with low level naming. In: Marzullo K, ed.Proceedings of the 18th ACM Symposium on Operating System Principles. New York: ACM Press, 2001. 146-159.

共引文献1461

同被引文献8

  • 1Salami O, Bagula A, Anthony Chan H. Framework for link relia- bility in inter-working multi-hop wireless networks [J]. Mathe- matical and Computer Modelling, 2011, 53 (11): 2219-2228.
  • 2Khuller S, Purohit M, Sarpatwar K K. Analyzing the Optimal Neighborhood: Algorithms for Budgeted and Partial Connected Dominating Set Problems [C]. SODA, 2014, 43 (27): 1702 - 1713.
  • 3Eom H Y, Melikov A. Approximation Method for QoS Analysis of Wireless Cellular Networks with Impatient Calls [J]. IEMS, 2010, 9 (4): 339-347.
  • 4Samadian R, Noorhosseini S M. Probabilistic support vector ma- chine localization in wireless sensor networks [J]. ETRI Journal, 2011, 33 (6): 924-934.
  • 5VRPTW Benchmark Problems[EB/OL]. http://web, cba. neu. edu/-msolom on/problems, htm,2012.
  • 6顾云丽,徐昕,侯荣涛,杜杰,钱焕延,梅园.基于移动Sink的无线传感器网络任播路由协议[J].计算机科学,2013,40(12):166-168. 被引量:3
  • 7范松博,张永胜,孙泽宇.无线传感器网络中分簇路由优化算法[J].计算机测量与控制,2014,22(2):493-495. 被引量:6
  • 8苏金树,郭文忠,余朝龙,陈国龙.负载均衡感知的无线传感器网络容错分簇算法[J].计算机学报,2014,37(2):445-456. 被引量:80

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部