浏览全部资源
扫码关注微信
1. 中国船舶重工集团 第716研究所,江苏 连云港 222006
2. 湖南大学 信息科学与工程学院,湖南 长沙 410082
3. 湖南人文科技学院 信息科学与工程系,湖南 娄底 417000
[ "曾玮妮(1982-),女,湖南邵阳人,博士,中国船舶重工集团第716研究所高级工程师,主要研究方向为网络安全、可信计算。" ]
[ "林亚平(1955-),男,湖南邵阳人,博士,湖南大学教授、博士生导师,主要研究方向为通信网络、机器学习。" ]
[ "易叶青(1976-),男,湖南邵阳人,博士,湖南人文科技学院副教授,主要研究方向为传感器网络安全。" ]
[ "何施茗(1986-),女,湖南永州人,湖南大学博士生,主要研究方向为无线网络。" ]
[ "陈鹏(1977-),男,湖北十堰人,博士,中国船舶重工集团第716研究所高级工程师,主要研究方向为多媒体网络。" ]
网络出版日期:2015-09,
纸质出版日期:2015-09-25
移动端阅览
曾玮妮, 林恸平, 易叶青, 等. 传感器网络数据处理中基于隐私向量的隐私保护机制[J]. 通信学报, 2015,36(9):34-46.
Wei-ni ZENG, Ya-ping LIN, Ye-qing YI, et al. Data processing based on the privacy-preserving vector for wireless sensor networks[J]. Journal on communications, 2015, 36(9): 34-46.
曾玮妮, 林恸平, 易叶青, 等. 传感器网络数据处理中基于隐私向量的隐私保护机制[J]. 通信学报, 2015,36(9):34-46. DOI: 10.11959/j.issn.1000-436x.2015250.
Wei-ni ZENG, Ya-ping LIN, Ye-qing YI, et al. Data processing based on the privacy-preserving vector for wireless sensor networks[J]. Journal on communications, 2015, 36(9): 34-46. DOI: 10.11959/j.issn.1000-436x.2015250.
针对传感器网络数据处理中的隐私保护需求,提出了新的分布式机制。构造了隐私向量,并设计了低能耗的隐私向量生成方法及使用方法,从而可有效实现求和、求最值及压缩等各类处理中的数据隐私保护。提出了种子分发算法,保证了隐私向量的安全动态生成。理论分析和仿真实验表明,与已有同类机制相比,新机制不仅能更好地抵御节点俘获攻击,具有更高的隐私保护有效性,且更为能量有效。
To solve the privacy disclosing problem during the data processing phase of wireless sensor networks
a dis-tributed mechanism was proposed.Privacy-preserving vector (vector for short) was constructed.Moreover
lightweight method for vector generation and novel method for using the vector were also presented.Thus
the methods were able to solve the privacy-preserving problem for various data processing funtions such as max/min and data compression effi-ciently.An algorithm based on data hiding and slice was given and then the vector was able to be generated securely and dynamically.Extensive analyses and experiments show that the mechanism is more robust to node compromise attack and thus can preserve privacy more efficiently.Moreover
the mechanism consumes less power.
杨庚 , 许健 , 陈伟 , 等 . 物联网安全特征与关键技术 [J ] . 南京邮电大学学报 ( 自然科学版 ), 2010 , 30 ( 4 ): 20 - 29 .
YANG G , XU J , CHEN W , et al . Security characteristic and technol-ogy in the Internet of things [J ] . Journal of Nanjing University of Posts and Telecommunications ( Natural Science ), 2010 , 30 ( 4 ): 20 - 29 .
李仁发 , 谢勇 , 李蕊 , 等 . 信息-物理融合系统若干关键问题综述 [J ] . 计算机研究与发展 , 2012 , 49 ( 6 ): 1149 - 1161 .
LI R F , XIE Y , LI R . Survey of cyber-physical systems [J ] . Journal of Computer Research and Development , 2012 , 49 ( 6 ): 1149 - 1161 .
范永健 , 陈红 , 张晓莹 . 无线传感器网络数据隐私保护技术 [J ] . 计算机学报 , 2012 , 35 ( 6 ): 1131 - 1146 .
FANG Y J , CHEN H , ZANG X Y . Data privacy preservation in wire-less sensor networks [J ] . Chinese Journal of Computers , 2012 , 35 ( 6 ): 1131 - 1146 .
HE W , LIU X , NGUYEN H , et al . PDA:privacy-preserving data aggregation in wireless sensor networks [A ] . Proceedings INFOCOM 2007:26th IEEE International Conference on Computer Communica-tions [C ] . Piscataway:IEEE Press , 2006 . 165 - 168 .
杨庚 , 王安琪 , 陈正宇 , 等 . 一种低耗能的数据融合隐私保护算法 [J ] . 计算机学报 , 2011 , 34 ( 5 ): 792 - 800 .
YANG G , WANG A Q , CHEN X Y , et al . An energy_saving privacy-preserving data aggregation algorithm [J ] . Chinese Journal of Com-puters , 2011 , 34 ( 5 ): 792 - 800 .
周强 , 杨庚 , 李森 , 等 . 一种可检测数据完整性的隐私数据融合算法 [J ] . 电子与信息学报 , 2013 , 35 ( 6 ): 1277 - 1283 .
ZHOU Q , YANG G , LI S , et al . An integrity-checking private data ag-gregation algorithm [J ] . Journal of Electronics &Information Tech-nology , 2013 , 35 ( 6 ): 1277 - 1283 .
CASTELLUCCIA C , CHAN A , MYKLETUN E , et al . Efficient and provably secure aggregation of encrypted data in wireless sensor net-works [J ] . ACM Transactions on Sensor Networks . 2009 , 5 ( 3 ): 1 - 36 .
FENG T , WANG C , ZHANG W , et al . Confidentiality protection schemes for data aggregation in sensor networks [A ] . Proceedings INFOCOM 2008:27th IEEE International Conference on Computer Communications [C ] . Piscataway:IEEE Press , 2008 . 131 - 146 .
CONTI M , ZHANG L , ROY S , et al . Privacy-preserving robust data aggregation in wireless sensor networks [J ] . Security and Communica-tion Networks , 2009 , 2 ( 2 ): 195 - 213 .
曾玮妮 , 林亚平 , 何施茗 , 等 . 无线传感器网络中基于隐私保护元的数据聚合机制 [J ] . 通信学报 , 2012 , 10 ( 6 ): 16 - 25 .
ZENG W N , LIN Y P , HE S M , et al . A data aggregation scheme based on privacy- preserving element for wireless sensor networks [J ] . Journl on Communictions , 2012 , 10 ( 6 ): 16 - 25 .
JUNG T , MAO F , LI X , et al . Privacy-preserving data aggregation with-out secure channel:multivariate polynomial evaluation [A ] . Proceedings INFOCOM 2013:32th IEEE International Conference on Computer Communications [C ] . Piscataway:IEEE Press , 2013 . 2634 - 2642 .
GREUNEN J , RABAEY J . Lightweight time synchronization for sensor networks [A ] . Proceedings of the Second ACM International Workshop on Wireless Sensor Networks and Applications,WSNA 2003 [C ] .Association for Computing Machinery, 2003 . 11 - 19 .
ZHANG W , WANG C , FENG T . GP 2 S:Generic privacy-preservation solutions for approximate aggregation of sensor data [A ] . Proceedings of the 6th Annual IEEE International Conference on Pervasive Com-puting and Communications,PerCom 2008 [C ] . Hongkong,China , 2008 .
GROAT M , HE W , FORREST S . KIPDA:k-indistinguishable pri-vacy-preserving data aggregation in wireless sensor networks [A ] . Pro-ceedings INFOCOM 2011:30th IEEE International Conference on Com-puter Communications [C ] . Piscataway:IEEE Press , 2011 . 2024 - 2032 .
ZHANG W , TRAN M N , ZHU S , et al . A random perturbation-based scheme for pairwise key establishment in sensor networks [A ] . Mobi-Hoc'07:Proceedings of the Eighth ACM International Symposium on Mobile Ad Hoc Networking and Computing [C ] . New York ,Associa-tion for Computing Machinery, 2007 . 90 - 99 .
ALI F , MEHDI B , HOSSEIN S , et al . A high performance and intrin-sically secure key establishment protocol for wireless sensor net-works [J ] . Computer Networks , 2011 , 55 ( 8 ): 1849 - 1863 .
MADDEN S , FRANKLIN M , HELLERSTEIN J , et al . Tag:a tiny aggregation service for ad-hoc sensor networks [J ] . SIGOPS Oper yst Rev , 2002 , 36 : 131 - 146 .
GOBRIEL S , KHATTAB S , MOSSE D , et al . Ridesharing:fault tol-erant aggregation in sensor networks using corrective actions [A ] . Pro-ceeding of the Sensor and Ad Hoc Communications and Networks,2006.SECON '06 [C ] . Reston,VA , 2006 .
PERRIG A , SZEWCZYK R , WEN V , et al . SPINS:security protocols for sensor networks [A ] . Proceedings of the Seventh Annual Interna-tional Conference on Mobile Computing and Networks [C ] . Rome,Italy , 2001 .
WANDER A S , GURA N , EBERLE H , et al . Energy analysis of pub-lic-key cryptography for wireless sensor networks [A ] . Proceedings -Third IEEE International Conference on Pervasive Computing and Communications,PerCom 2005 [C ] . Kauai Island,HI,United States , 2005 .
0
浏览量
615
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构