浏览全部资源
扫码关注微信
1. 湖南大学 信息科学与工程学院,湖南 长沙 410082
2. 上海电力学院 计算机科学与技术学院,上海 200090
[ "李睿(1975-),男,湖南汨罗人,博士,湖南大学副教授,主要研究方向为无线传感器网络、网络安全、云计算安全。" ]
[ "李晋国(1985-),男,湖南衡阳人,博士,上海电力学院讲师,主要研究方向为信息安全。" ]
[ "陈浩(1975-),男,湖南邵阳人,博士,湖南大学副教授,主要研究方向为移动推荐、网络安全。" ]
网络出版日期:2015-02,
纸质出版日期:2015-02-25
移动端阅览
李睿, 李晋国, 陈浩. 两层传感器网络中安全分类协议研究[J]. 通信学报, 2015,36(2):56-67.
Rui LI, Jin-guo LI, Hao CHEN. Safe and secure classification protocol in two-tiered sensor networks[J]. Journal on communications, 2015, 36(2): 56-67.
李睿, 李晋国, 陈浩. 两层传感器网络中安全分类协议研究[J]. 通信学报, 2015,36(2):56-67. DOI: 10.11959/j.issn.1000-436x.2015034.
Rui LI, Jin-guo LI, Hao CHEN. Safe and secure classification protocol in two-tiered sensor networks[J]. Journal on communications, 2015, 36(2): 56-67. DOI: 10.11959/j.issn.1000-436x.2015034.
提出了一种安全分类协议SSC,该协议在保护待分类数据和分类规则隐私的情况下使存储节点进行正确分类,并且 sink 节点可以对分类结果进行抽样认证,防止妥协存储节点伪造分类结果。提出了一种不经意比较(oblivious comparison)技术MHash
该技术首先将分类需要的大小比较转换成等值比较,并进一步采用模运算和散列技术实现隐私保护下的数据分类。提出了一种“十”字邻居技术
分别将传感器以及传感器采集的数据组织成链,并采用倒置布鲁姆过滤器技术同步传感器节点之间的数据,sink利用该技术可以抽样检查存储节点分类统计结果的正确性,分析和实验结果验证了所提方案的有效性。
A safe and security classification protocol named SSC was proposed for two-tiered sensor networks
which enable storage nodes to process classification correctly without knowing both the value of classifying rules and the data which will be classified.To protect privacy
an oblivious comparison technique was presented.MHash
which enable storage nodes to compare data items from sink and sensors without knowing their values.Based on MHash and prefix membership verification technique
classification target was achieved in protecting the privacy of both sensor collected data and sink issued classification rules.To verify the correctness of classification results
a crossed neighborhood technique was proposed which organize sensors and data items in one sensor in sequences
to allow the sink checking the correctness of sampling classification results.Analysis and experimental results validate the efficacy and efficiency of SSC protocol.
李建中 , 李金宝 , 石胜飞 . 传感器网络及其数据管理的概念、问题与进展 [J ] . 软件学报 , 2003 , 14 ( 10 ): 1717 - 1727 .
LI J Z , LI J B , SHI S F . Concepts,issues and advance of sensor networks and data management of sensor networks [J ] . Journal of Software , 2003 , 14 ( 10 ): 1717 - 1727 .
崔莉 , 鞠海玲 , 苗勇 等 . 无线传感器网络研究进展 [J ] . 计算机研究与发展 , 2005 , 42 ( 1 ): 163 - 174 .
CUI L , JU HL , MIAO Y , et al . Overview of wireless sensor network [J ] . Computer Research and Development , 2005 , 42 ( 1 ): 163 - 174 .
唐勇 , 周明天 , 张欣 . 无线传感器网络路由协议研究进展 [J ] . 软件学报 , 2006 , 17 ( 3 ): 422 - 433 .
TANG Y , ZHOU M T , ZHANG X . Overview of routing protocols in wireless sensor networks [J ] . Journal of Software , 2006 , 17 ( 3 ): 410 - 421 .
HU W , TRAN V N , BULUSU N , et al . Design and evaluation of a hybrid sensor network for cane-toad monitoring [J ] . ACM Transactions on Sensor Networks , 2009 , 5 ( 1 ): 1 - 28 .
DESNOYERS P , GANESAN D , LI H , et al . PRESTO:a predictive storage architecture for sensor networks [A ] . Proceeding of Workshop on Hot Topics in Operating Systems (HotOS’05) [C ] . Berkeley,CA:USENIX Association , 2005 .
RATNASAMY S L , KARP B , SHENKER S , et al . Data-centric storage in sensor nets with ght,a geographic hash table [J ] . Mobile Networks and Applications , 2003 , 4 ( 8 ): 427 - 442 .
Intel lab data [EB/OL ] . http://berkeley.intel-research.net/labdata http://berkeley.intel-research.net/labdata .
WANG Q , CHEN W , ZHENG R , et al . Acoustic target tracking using tiny wireless sensor devices [A ] . Proc of 2nd Intl Conf on Information Processing in Sensor Networks [C ] . Palo Alto,CA , 2003 . 642 - 657 .
HE T , KRISHNAMURTHY S , STANKOVIC J A , et al . An energy-efficient surveillance system using wireless sensor networks [A ] . Proc of Intl Conf on Mobile Systems,Applications,and Services [C ] . Boston,MA , 2004 . 270 - 283 .
BROOKS R R , SAYEED A M . Distributed target classification and tracking in sensor networks [J ] . Proceedings of the IEEE , 2003 , 91 ( 8 ): 1163 - 1171 .
GU L , JIA D , VICAIRE P , et al . Lightweight detection and classification for wireless sensor networks in realistic environments [A ] . Third ACM Conference on Embedded Networked Sensor Systems [C ] . New York:ACM Press , 2005 . 205 - 217 .
HUANG Q , XING T , LIU H . Vehicle classification in wireless sensor networks based on rough neural networks [A ] . Proceedings of the 2nd IASTED International Conference on Advances in Computer Science and Technology [C ] . Anaheim:ACTA Press , 2006 . 141 - 144 .
PAI H , HAN Y , SUNG J . Two-dimensional coded classification schemes in wireless sensor networks [J ] . IEEE Transactions on Wireless Communications , 2008 , 7 ( 5 ): 1450 - 1455 .
KULAKOV A , DAVCEV D , TRAJKOVSKI G . Implementing artificial neural-networks in wireless sensor networks [A ] . Proceedings of IEEE Sarnoff Symposium on Advances in Wired and Wireless Communications [C ] . Piscataway:IEEE , 2005 . 94 - 97 .
ZHAO F , LIU J , GUIBAS L , et al . Collaborative signal and information processing:an information directed approach [A ] . Proceedings of the IEEE,Piscataway [C ] . 2003 , 91 ( 8 ): 1199 - 1209 .
PATTEM S , PODURI S , KRISHNAMACHARI B . Energy-quality tradeoffs for target tracking in wireless sensor networks [A ] . Proc of 2nd Intl Conf on Information Processing in Sensor Networks [C ] . Berlin:Springer-Verlag , 2003 . 32 - 46 .
WANG H , ESTRIN D , GIROD L . Preprocessing in a tiered sensor network for habitat monitoring [J ] . EURASIP Journal on Applied Signal Processing , 2003 , 4 ( 4 ): 392 - 401 .
SHENG B , LI Q . Verifiable privacy-preserving sensor network storage for range query [J ] . IEEE Transaction on Mobile Computing , 2011 , 10 ( 9 ): 1312 - 1326 .
SHI J , ZHANG R , ZHANG Y . A spatiotemporal approach to secure range queries in tiered sensor networks [J ] . IEEE Transactions on Wireless Communications , 2011 , 10 ( 1 ): 264 - 273 .
ZHANG R , SHI J , ZHANG Y , et al . Secure cooperative data storage and query processing in unattended tiered sensor networks [J ] . IEEE Journal on Selected Areas in Communications,Special Issue on Cooperative Networking Challenges and Applications , 2012 , 30 ( 2 ): 433 - 441 .
HACIGUMUS H , IYER B , LI C , et al . Executing sql over encrypted data in the database-service-provider model [A ] . Proc ACM Inte Conf on Management of Data (SIGMOD2002) [C ] . 2002 . 216 - 227 .
HORE B , MEHROTRA S , TSUDIK G . A privacy-preserving index for range queries [A ] . Proc 30th Inte Conf on Very Large Data (VLDB2004) [C ] . New Orleans,LA,USA , 2004 . 720 - 731 .
CHEN F , LIU A X . Privacy and integrity preserving range queries in sensor networks [J ] . IEEE/ACM Transactions on Networking , 2012 , 20 ( 6 ): 1774 - 1787 .
YI Y Q , LI R , CHEN F , et al . A digital watermarking approach to secure and precise range query processing in sensor networks [A ] . Proceedings of the IEEE Conference on Computer Communications 2013 (INFOCOM2013) [C ] . Turin,Italy , 2013 .
ZHANG R , SHI J , LIU Y Z , et al . Verifiable fine-grained top-k queries in tiered sensor networks [A ] . Proceeding of IEEE International Conference on Computer Communications (INFOCOM 2010) [C ] . Piscataway,NJ:IEEE , 2010 . 1199 - 1207 .
范永健 , 陈红 . 两层传感器网络中可验证隐私保护的 top-k 查询协议 [J ] . 计算机学报 , 2012 , 35 ( 3 ): 423 - 433 .
FAN Y J , CHEN H . Verifiable privacy-preserving top-k query protocol in two-tiered sensor networks [J ] . Chinese Journal of Computers , 2012 , 35 ( 3 ): 423 - 433 .
李睿 , 林亚平 , 易叶青 等 . 两层传感器网络中安全 top-k查询协议 [J ] . 计算机研究与发展 , 2012 , 49 ( 9 ): 1947 - 1958 .
LI R , LIN YP , YI Y Q , et al . A secure top-k query protocol in two-tiered sensor networks [J ] . Computer Research and Development , 2012 , 49 ( 9 ): 1947 - 1958 .
廖小静 , 李建中 , 余磊 . 一种能量有效的双层传感器网络安全top-k查询机制 [J ] . 计算机研究与发展 , 2013 , 50 ( 3 ): 490 - 497 .
LIAO X J , LI J Z , YU L . Secure and efficient top-k query processing in two-tier sensor network [J ] . Computer Research and Development , 2013 , 50 ( 3 ): 490 - 497 .
李睿 , 林亚平 , 李晋国 . 两层传感器网络中一种高效的加密数据条件聚合协议研究 [J ] . 通信学报 , 2012 , 33 ( 12 ): 58 - 68 .
LI R , LIN Y P , LI J G . Efficient conditional aggregation of encrypted data in tiered sensor networks [J ] . Journal on Communications , 2012 , 33 ( 12 ): 58 - 68 .
CHAN H , PERRIG A , SONG D . Secure hierarchical in-network aggregation in sensor networks [A ] . Proceedings of the 13th ACM Conference on Computer and Communications Security [C ] . New York:ACM Press , 2006 . 278 - 287 .
YANG Y , WANG X , ZHU S , et al . Sdap:a secure hop-by-hop data aggregation protocol for sensor networks [J ] . ACM Transactions on Information and System Security , 2008 , 11 ( 4 ): 1 - 43 .
YAO Y Y , XIONG N , PARK J , et al . Privacy-preserving max/min query in two-tiered wireless sensor networks [J ] . Computer and Mathematics with Application , 2012 , 2 : 1 - 8 .
AGRAWAL R , EVFIMIEVSKI A , SRIKANT R . Information sharing across private databases [A ] . Proceedings of the 2003 ACM SIGMOD International Conference on Management of data [C ] . New York:ACM Press , 2003 . 86 - 97 .
BAWA M , BAYARDO R R . Privacy-preserving indexing of documents on the network [A ] . Proceedings of the 29th International Conference on Very Large Data Bases [C ] . Berlin:VLDB Endowment , 2003 . 922 - 933 .
HORE B , MEHROTRA S , TSUDIK G . A privacy-preserving index for range queries [A ] . Proceedings of the 30th International Conference on Very Large Data Bases [C ] . Toronto:VLDB Endowment , 2004 . 720 - 731 .
CHENG J , YANG H , WONG S et al . Design and implementation of cross-domain cooperative firewall [A ] . IEEE International Conference of Network Protocol Piscataway IEEE [C ] . New Orleans,LA,USA , 2007 . 284 - 293 .
CHENG J , YANG H , WONG S H , et al . Design and implementation of cross-domain cooperative firewall [A ] . Proc International Conference on Network Protocols [C ] . Piscataway:IEEE , 2007 . 284 - 293 .
LIU A X , CHEN F . Collaborative enforcement of firewall policies in virtual private networks [A ] . Proceedings of the Twenty-Seventh ACM Symposium on Principles of Distributed Computing [C ] . New York:ACM Press , 2008 . 95 - 104 .
CHANG Y K . Fast binary and multiway prefix searches for packet forwarding [J ] . Computer Networks , 2007 , 51 ( 3 ): 588 - 605 .
HU Y P , LI R , ZHOU S W , et al . CCS-MAC:Exploiting the overheard data for compression in wireless sensor networks [J ] . Computer Communication , 2011 , 34 : 1696 - 1707 .
EPPSTEIN D , GOODRICH M T , UYEDA F , et al . What’s the difference? efficient set reconciliation without prior context [A ] . ACM SIGCOMM Computer Communication Review [C ] . New York:ACM Press , 2011 . 218 - 229 .
XIAO S , GONG W , TOWSLEY D . Secure wireless communication with dynamic secrets [A ] . Proc IEEE Inte Conf on Computer Communications,Piscataway:IEEE [C ] . New Orleans,LA,USA , 2010 . 1 - 9 .
0
浏览量
607
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构