期刊文献+

基于可扩展加密的传感器网络数据隐私保护研究 被引量:5

A Scalable Encryption Routing Protocol for Privacy Preserving on Sensor Networks
下载PDF
导出
摘要 为了解决无线传感器网络中传统的数据隐私保护技术在抵御网络外部攻击或内部攻击以及数据隐私窃取等方面所存在的数据投递率低、网络稳定性差等缺陷,提出一种动态数据聚合加密的数据隐私保护路由算法,通过使用复数的加法法则进行可扩展数据聚合以及分段密钥等方法来实现对数据隐私的保护。仿真实验结果表明,所提路由算法具有数据投递率高、安全性高和网络稳定性较强等优点,能极大增强无线传感器网络防御典型数据隐私攻击的能力。 In order to solve the problem of low data delivery rate and poor network stability in traditional data privacy protection mechanisms which is against external and internal network attacks and data stealing on wireless sensor networks,this paper proposes a dynamic data aggregation and encryption routing protocol for privacy preserving on wireless sensor networks. The data privacy preserving is achieved by using the method of data aggregation and hierarchically encryption algorithm. The simulation results show that the proposed routing protocol has high data deliver rate,high network security,strong stability and extensibility in aspect of solving data privacy attacks. It enhanced the ability to against typical data privacy attack greatly.
出处 《计算机与现代化》 2015年第7期34-39,共6页 Computer and Modernization
基金 河南省科技攻关项目(112102210186) 河南省科技重点攻关项目(132102210246) 河南省教育厅自然科学研究计划项目(2010A520017) 河南省教育厅科技攻关项目(13B510001)
关键词 传感器网络 数据隐私保护 数据聚合 分段密钥 wireless sensor networks data privacy preserving data aggregation hierarchically encryption
  • 相关文献

参考文献10

  • 1Zhang Lei, Zhang Honggang, Conti M, et al. Preserving privacy against external and internal threats in WSN data aggregation[J]. Telecommunication Systems, 2013,52(4):2163-2176.
  • 2Memon I. An analysis of privacy preserving data aggregation protocols for WSNs[C]// The 9th IFIP International Conference on Network and Parallel Computing. 2012:119-128.
  • 3Kumar V, Madria S. PIP: Privacy and integrity preserving data aggregation in wireless sensor networks[C]// 2013 IEEE the 32nd International Symposium on ReliableDistributed Systems. 2013:10-19.
  • 4Zhou Jun, Zhen Yu Yang. Data privacy preservation in wireless sensor networks based on multisecret sharing scheme[C]// The 2nd International Conference on InformationTechnology and Management Innovation. 2013:411-414.
  • 5Wang Jin, Kim H, Tian Wei, et al. Data privacy protection solution for ubiquitous sensor networks[J]. Sensor Letters, 2013,11(2):384-387.
  • 6Ukil A. Privacy preserving data aggregation in wireless sensor networks[C]// The 6th International Conference on Wireless and Mobile Communications. 2010:435-440.
  • 7Westhoff D, Girao J, Acharya M. Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaptations[J].IEEE Transactions on Mobile Computing, 2006,5(10):1417-1431.
  • 8He Wenbo, Liu Xue, Hoang Nguyen, et al. PDA: Privacypreserving data aggregation in wireless sensor networks[C]// The 26th IEEE International Conference on ComputerCommunications(INFOCOM 2007). 2007:2045-2053.
  • 9Xu Huang, Sharma D. Fuzzy controller for a dynamic window in elliptic curve cryptography wireless networks for scalar multiplication[C]// 2010 the 16th AsiaPacificConference on Communications. 2010:458-463.
  • 10Zhang Wensheng, Wang Chuang, Feng Taiming. GP2S: Generic privacypreservation solutions for approximate aggregation of sensor data [C]// 2008 the 6th AnnualIEEE International Conference on Pervasive Computing and Communications. 2008:179-184.

同被引文献10

引证文献5

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部