期刊文献+

低能耗支持完整性验证的数据融合隐私保护方法 被引量:2

Data fusion privacy protection method with low energy consumption and integrity verification
原文传递
导出
摘要 针对无线传感器网络中数据完整性和隐私保护难以同时兼顾的问题,提出一种低能耗支持完整性验证的数据融合隐私保护方法PPMLEC。PPMLEC将节点的ID号用节点的簇号与节点号组合的方式表示,将ID号隐性传输,同时利用哈希函数计算扰动值,对节点采集的数据进行扰动,提高数据的安全性,通过构造两棵融合树在基站进行完整性验证。实验结果表明:在没有能增加网络能耗的前提下,PPMLEC在通信量方面比现有的基于分布式认证的完整性保护方法降低了约4.7%,比DCSA方法降低了约9.5%。 Aiming at the problem that data integrity and privacy protection are difficult to take into account at the same time in wireless sensor networks,a data fusion privacy protection method PPMLEC with low energy consumption and integrity verification is proposed.PPMLEC expresses the ID number of a node by the combination of cluster number and node number,transmits the ID number implicitly,calculates the disturbance value by hash function,disturbs the data collected by the node,and improves the security of the data,and verifies the integrity at the base station by constructing two fusion trees.Experimental results show that,on the premise of not increasing network energy consumption,PPMLEC reduces the traffic by about 4.7%compared with the existing integrity protection scheme based on distributed authentication and by about 9.5%compared with DCSA scheme.
作者 王军 徐彦惠 李莉 WANG Jun;XU Yan-hui;LI Li(College of Computer Science and Technology,Shenyang University of Chemical Technology,Shenyang 110142,China;Key Laboratory of Industrial Intelligence Technology on Chemical Process,Shenyang University of Chemical Technology,Shenyang 110142,China)
出处 《吉林大学学报(工学版)》 EI CAS CSCD 北大核心 2022年第7期1657-1665,共9页 Journal of Jilin University:Engineering and Technology Edition
基金 辽宁省高校创新人才支持计划项目(LR2018057) 辽宁省“百千万人才工程”项目(辽人社[2019]45号) 辽宁省自然科学基金项目(2019-ZD-0068) 辽宁省教育厅项目(XXLJ2019010)。
关键词 计算机应用 无线传感器网络 ID传输 完整性验证 隐私保护 数据扰动 数据融合 computer application wireless sensor network ID transmission integrity verification privacy protection data disturbance data fusion
  • 相关文献

参考文献9

二级参考文献96

  • 1Ramesh R, Varshney P K. Data Aggregation Techniques in Sensor Networks: A Survey[J]. Communications Surveys & Tutorials, 2006, 8(4): 48-63.
  • 2Akyildiz I F, Su Weilian, Sankarasubramaniam Y, et al. Wireless Sensor Networks: A Survey[J]. Computer Networks, 2002, 38(4): 393-422.
  • 3Li Na, Zhang Nan, Dasa S K, et al. Privacy Preservation in Wireless Sensor Networks: A State-of-the-art Survey[J]. Ad Hoc Networks, 2009, 7(8): 1501-1514.
  • 4Chen Yanli, Yang Geng. An Efficient Broadcast Encryption Scheme for Wireless Sensor Network[C]//Proc. of International Conference on Wireless Communications, Networking and Mobile Computing. Shanghai, China: [s. n.], 2009.
  • 5Ozturk C, Zhang Yanzhou, Trappe W. Source Location Privacy in Energy Constrained Sensor Networks Routing[C]//Proc. of ACM Workshop on Security of Ad Hoc and Sensor Networks. [S. 1.]: ACM Press, 2004: 88-93.
  • 6Mehta K, Liu Donggang, Wright M. Location Privacy in Sensor Networks Against a Global Eaves Dropper[C]//Proc. of IEEE International Conference on Network Protocols. [S. 1.]: IEEE Press, 2007: 314-323.
  • 7Yang Yi, Shao Min, Zhu Sencun, et al. Towards Event Source Unobservability with Minimum Network Traffic in Sensor Networks[C]//Proc. of ACM Conference on Wireless Network Security. [S. 1.]: ACM Press, 2008: 77-88.
  • 8Shao Min, Yang Yi, Zhu Sencun. Towards Statistically Strong Source Anonymity for Sensor Network[C]//Proc. of INFOCOM'08. Phoenix, USA: [s. n.], 2008.
  • 9Mehta K, Liu Donggang, Wright M. Protecting Location Privacy in Sensor Networks Against a Global Avesdropper[J]. IEEE Transactions on Mobile Computing, 2011, 11(2): 1-18.
  • 10Spachos P, Song Liang, Bui F M. Improving Source-location Privacy Through Opportunistic Routing in Wireless Sensor Networks[C]//Proc. of IEEE Symposium on Computers and Communications. [S. 1.]: IEEE Press, 2011: 815-820.

共引文献51

同被引文献20

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部