期刊文献+

基于复数域的高效完整性保护数据融合算法 被引量:3

EFFICIENT INTEGRITY PROTECTION DATA FUSION ALGORITHM BASED ON COMPLEX FIELD
下载PDF
导出
摘要 随着WSNs的快速发展,其应用的领域越来越多。很多领域对数据的隐私性和完整性保护有着极高的要求,所以对传感器网络的安全性要求也更高了。设计一种能够同时兼顾数据隐私性和完整性保护的数据融合算法显得尤为重要,由此提出了一种基于复数域的高效的新数据融合安全算法,在保留原有复数域算法特点的同时,加入分布式验证数据完整性机制,使算法能够快速、高效地检测出被篡改的虚假数据。理论分析与仿真结果表明:算法在不增加能耗的同时,能够降低盲目丢弃率,提高安全性,并能更快速地检测出恶意数据。 With the rapid development of wireless sensor networks, they are applied to more and more fields. As there is a very high demand for data privacy and integrity protection in many fields, a higher requirement for the security of sensor networks is put forward. Therefore, it is very important to design a data fusion algorithm that can take into account both data privacy and integrity protection. In this paper, we propose an efficient and safe new integrity protection data fusion algorithm based on complex field. While retaining the characteristics of the original complex field algorithm, we add distributed data integrity verification mechanism, which enables the algorithm to quickly and efficiently detect the tampered false data. Theoretical analysis and simulation results show that the algorithm can reduce the blind discard rate, improve the security and detect the malicious data more quickly without increasing energy consumption.
出处 《计算机应用与软件》 2017年第4期70-74,148,共6页 Computer Applications and Software
基金 河南省科技攻关项目(132102210123) 河南省重点科技攻关项目(122102310309) 河南理工大学博士基金项目(B2009-21)
关键词 数据融合 完整性保护 隐私保护 复数域 Data aggregation Integrity protection Privacy protection Complex filed
  • 相关文献

参考文献3

二级参考文献37

  • 1He W, Nguyen H, Liu X, et al. iPDA : an integrity-protecting private data aggregation scheme for wireless sensor networks[ C]//Military Communications Conference. San Diego,CA: [s. n. ] ,2008:1-7.
  • 2He W,Liu X,Ngoyen H,et al. A cluster-based protocol to en- force integrity and preserve privacy in data aggregation[ C]// 29th IEEE International Conference on Distributed Computing Systems Workshops. Montreal,QC: [s, n. ],2009:14-19.
  • 3Bista R, Yoo H K, Chang J W. A new sensitive data aggrega- tion scheme for protecting integrity in wireless sensor networks [ C ]//lOth IEEE International Conference on Computer and Information Technology. Bradford, UK: [s. n. ] ,2010:2463- 2470.
  • 4Bista R,Jo K J,Chang J W. A new approach to secure aggrc- gotion of private data in wireless sensor networks[ C]//Eighth IEEE International Conference on Dependable Autonomic and Secure Computing. Chengdu,China: [s. n. ] ,2009:394-399.
  • 5Bista R, Kim H D, Chang J W. A new private data aggregation scheme for wireless sensor networks[ C]//10th IEEE Interna- tional Conference on Computer and Information Technology. Bradford, UK: [ s. n. ] ,2010:273-280.
  • 6覃志松,黄延磊.Zigbee无线传感器网络安全研究及改进[J].微计算信息,2010(3):54-55.
  • 7Madden S,Franklin M J,Hellerstein J M. TAG:a tiny asgregn- tion service for ad-hne sensor networks[ C]//Pmceedings of the 5th symposium on operating systems design and implemen- tation. New York, USA: [s. n. ] ,2002 : 131 - 146.
  • 8He W,Liu X,Ngnyen H,et al. PDA:privaey-preserving data aggregation in wireless sensor networks [ C ]//Proceedings of the 26th IEEE International Conference on Computer Commu- nications. Anehorage,AK: [s. n. ] ,2007:2045-2053.
  • 9Levis P, Lee N, Welsh M, et el. TOSSIM: accurate and scalable simulation of entire TinyOS applications[ C]//lst internation- al conference on embedded networked sermor systems. Los An- gnles, USA: [ s. n. ] ,2003 : 126-137.
  • 10Ozdemir S and Xiao Y. Secure data aggregation in wireless sensor networks: a comprehensive overview[J]. Computer Networks, 2009, 53(12): 2022-2037.

共引文献16

同被引文献20

引证文献3

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部