期刊文献+

低耗能的支持完整性验证的隐私保护融合方案 被引量:1

Energy-saving privacy preserving aggregation scheme with integrity verification support
下载PDF
导出
摘要 针对无线传感器网络中隐私暴露、信息篡改、虚假注入等安全问题,提出了一种支持完整性验证的隐私保护融合方案ESIPPA,它可以在实现数据隐私保护和ID隐私保护的基础上侦测到信息的非法篡改。ESIPPA用加权的方式对ID进行隐性传送,同时将ID号作为干扰因子引入对数据进行干扰的干扰公式中,提高隐私保护的安全性;通过构建双融合树模型,充分利用基站能量多的因素,减少节点负担,同时能够验证数据完整性。仿真实验结果显示,ESIPPA方案比已有的基于分布式认证的完整性保护数据融合方案在通信量方面下降了约7.5%,比DCSA方案下降了约15.4%,同时也更好地保护了数据的完整性和隐私性。 In order to solve the security problems existing in wireless sensor networks, such as privacy exposure, information tampering and false data injection, an energy- saving privacy protection integration scheme ESIPPA is proposed,which supports integrity verification. The ESIPPA scheme can detect unauthorized tampering of information on the basis of data privacy protection and ID privacy protection. It sends recessive ID number by the way of weighting, and makes ID number as a factor of interference formula which is used to implement interference for data, to improve the security of privacy protection. By constructing a model of double integration trees and making full use of base station with high energy,the ESIPPA can reduce the burden of nodes and validate data integrity. The simulation results show that the ESIPPAscheme respectively reduces 7. 5% and 15. 4% in the aspect of communication traffic compared with that of integrationpreservationdata aggregation scheme based on distributed authentication and DCSA scheme and it also better protects the integrity and privacy of data.
作者 贾宗璞 王冠琼 彭维平 郭海儒 JIA Zongpu;WANG Guanqiong;PENG Weiping;GUO Hairu(College of Computer Science and Technology, Henan University of Science and Technology, Jiaozuo, Henan 454000, China)
出处 《计算机工程与应用》 CSCD 北大核心 2017年第5期116-120,133,共6页 Computer Engineering and Applications
基金 河南省科技攻关(No.132102210123) 河南省重点科技攻关(No.122102310309) 河南理工大学博士基金(No.B2009-21)
关键词 无线传感器网络 数据融合 隐私保护 完整性验证 wireless sensor network data aggregation privacy preserving integrity verification
  • 相关文献

参考文献5

二级参考文献39

  • 1MarkStamp.信息安全原理与实践[M].北京:电子工业出版社.2007.
  • 2杨庚,陈伟,曹晓梅.无线传感器网络安全[M].北京:科学出版社,2010.
  • 3姚向华.无线传感器网络原理与应用[M].北京:高等教育出版社.2011.
  • 4MADDEN S, FRANKLIN M J, HELLERSTEIN J M. TAG: a tiny aggregation service for Ad Hoc sensor networks[ C]//Proceedings of the 5th Symposium on Operating Systems Design and Implementa- tion. New York: ACM Press, 2002:131-146.
  • 5HE W, LIU X, NGUYEN H, et al. PDA: privacy-preserving data aggregation in wireless sensor networks[ C]// Proceedings of IEEE INFOCOM 2007. Piscataway, NJ: IEEE Press, 2007: 2045- 2053.
  • 6BISTA R, KIM H D, CHANG J W. A new private data aggregation scheme for wireless sensor networks[ C]// Proceedings of the 10th IEEE International Conference on Computer and Information Tech- nology. Piscataway, NJ: IEEE Press, 2010:273-280.
  • 7BISTA R, YOO H K, CHANG J W. A new sensitive data aggrega- tion scheme for protecting integrity in wireless sensor networks[ C]// Proceedings of the 10th IEEE Intemational Conference on Computer and Information Technology. Piseataway, NJ: IEEE Press, 2010: 2463 - 2470.
  • 8GROAT M M, HE W, FORREST S. KIPDA: K-indistinguishable privacy-preserving data aggregation in wireless sensor networks[ C]// Proceedings of IEEE INFOCOM 2011. Piseataway, NJ: IEEE Press, 2011:2024 -2032.
  • 9HE W, NGUYEN H, LIU X, et al. iPDA: an integrity-protecting private data aggregation scheme for wireless sensor networks[ C]// Proceedings of IEEE M1LCOM 2008. Piscataway, NJ: IEEE Press, 2008:1 - 7.
  • 10HE W, LIU X, NGUYEN H, et al. A cluster-based protocol to en- force integrity and preserve privacy in data aggregation[ C]// Pro- ceedings of the 29th IEEE International Conference on Distributed Computing Systems Workshops. Piscataway, NJ: IEEE Press, 2009:14 - 19.

共引文献15

同被引文献7

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部