期刊文献+

数据融合中隐私保护完整性验证算法研究

Research on Privacy Preserving Integrity Verification Algorithm in Data Fusion
下载PDF
导出
摘要 无线传感器网络数据融合过程中面临着隐私泄露、信息不完整、数据篡改方面的严峻挑战,在保护数据隐私性的同时进行完整性验证是数据融合领域研究的热点之一。针对数据融合中信息不完整的问题,设计了一种基于数据融合隐私保护完整性验证算法(privacy preserving integrity-verification algorithm,PPIA)。该算法利用节点构造密码对,使用密码对采集的数据进行签名和加密运算,以确保数据的完整性和隐私性;为了降低通信开销,对签名结果采用Bayes网络的有向无环图模型进行融合。将融合结果传送至基站,由基站运用明码和密码签名的数据进行完整性验证,若消息在传输过程中被篡改或者伪造,则基站能够及时检测并丢弃,确保了数据在融合过程中的安全性。仿真结果表明,PPIA算法的安全性、隐私性和完整性都有显著提高。 The severe challenges such as privacy leakage, incomplete information, data tampering are faced in data fusion of wireless sensor networks. Integrity verification while protecting data privacy is one of the hotspots in the field of data fusion. Aiming at the problem of incomplete information in data fusion, we design a privacy preserving integrity verification algorithm (PPIA) based on data fusion. It uses the nodes to construct the password pair and the data collected by password pair to carry on the signature and the encryption computation in order to ensure the data integrity and privacy. To reduce the communication overhead, the signature result is fused by directed acyclic graph model of Bayes network. The fusion result is transmitted to the base station, the use of codes and cipher signature by the base station for data integrity verification. If the message in the transmission process is tampered or forged, the base station can detect and discard, ensuring the security of the data in the fusion process. The simulation shows that the security, privacy and integrity of PPIA algorithm are improved significantly
作者 黄娟 王军号 杜朋 HUANG Juan;WANG Jun-hao;DU Peng(School of Computer Science and Engineering,Anhui University of Science and Technology,Huainan 232001,China)
出处 《计算机技术与发展》 2018年第8期109-113,共5页 Computer Technology and Development
基金 国家自然科学基金(61300001) 安徽省质量工程教学研究项目(2016jyxm0266)
关键词 数据融合 隐私保护 完整性 签名 data fusion privacy preserving integrity signature
  • 相关文献

参考文献8

二级参考文献76

  • 1蒋良孝,蔡之华,刘钊.一种基于信息增益的分类规则挖掘算法[J].中南大学学报(自然科学版),2003,34(z1):69-71. 被引量:8
  • 2葛伟平,汪卫,周皓峰,施伯乐.基于隐私保护的分类挖掘[J].计算机研究与发展,2006,43(1):39-45. 被引量:20
  • 3杨晓春,刘向宇,王斌,于戈.支持多约束的K-匿名化方法[J].软件学报,2006,17(5):1222-1231. 被引量:60
  • 4王涛,李舟军,胡小华,颜跃进,陈火旺.一种高效的数据流挖掘增量模糊决策树分类算法[J].计算机学报,2007,30(8):1244-1250. 被引量:18
  • 5He W, Nguyen H, Liu X, et al. iPDA : an integrity-protecting private data aggregation scheme for wireless sensor networks[ C]//Military Communications Conference. San Diego,CA: [s. n. ] ,2008:1-7.
  • 6He W,Liu X,Ngoyen H,et al. A cluster-based protocol to en- force integrity and preserve privacy in data aggregation[ C]// 29th IEEE International Conference on Distributed Computing Systems Workshops. Montreal,QC: [s, n. ],2009:14-19.
  • 7Bista R, Yoo H K, Chang J W. A new sensitive data aggrega- tion scheme for protecting integrity in wireless sensor networks [ C ]//lOth IEEE International Conference on Computer and Information Technology. Bradford, UK: [s. n. ] ,2010:2463- 2470.
  • 8Bista R,Jo K J,Chang J W. A new approach to secure aggrc- gotion of private data in wireless sensor networks[ C]//Eighth IEEE International Conference on Dependable Autonomic and Secure Computing. Chengdu,China: [s. n. ] ,2009:394-399.
  • 9Bista R, Kim H D, Chang J W. A new private data aggregation scheme for wireless sensor networks[ C]//10th IEEE Interna- tional Conference on Computer and Information Technology. Bradford, UK: [ s. n. ] ,2010:273-280.
  • 10覃志松,黄延磊.Zigbee无线传感器网络安全研究及改进[J].微计算信息,2010(3):54-55.

共引文献35

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部