浏览全部资源
扫码关注微信
1. 华侨大学计算机科学与技术学院,福建 厦门 361021
2. 泉州师范学院数学与计算机科学学院,福建 泉州 362000
3. 福建省大数据管理新技术与知识工程重点实验室,福建 泉州362000
[ "蒋文贤(1974-),男,福建漳州人,华侨大学副教授,主要研究方向为物联网安全、网络协议等。" ]
[ "张振兴(1991-),男,黑龙江双鸭山人,华侨大学硕士生,主要研究方向为网络安全、隐私保护技术等。" ]
[ "吴晶晶(1975-),女,福建漳州人,博士,泉州师范学院教授,主要研究方向为无线传感器网络、数据挖掘和大数据管理和分析等。" ]
网络出版日期:2018-03,
纸质出版日期:2018-03-25
移动端阅览
蒋文贤, 张振兴, 吴晶晶. 基于可逆数字水印认证的无线传感网数据融合协议[J]. 通信学报, 2018,39(3):118-127.
Wenxian JIANG, Zhenxing ZHANG, Jingjing WU. Reversible digital watermarking-based protocol for data integrity in wireless sensor network[J]. Journal on communications, 2018, 39(3): 118-127.
蒋文贤, 张振兴, 吴晶晶. 基于可逆数字水印认证的无线传感网数据融合协议[J]. 通信学报, 2018,39(3):118-127. DOI: 10.11959/j.issn.1000-436x.2018046.
Wenxian JIANG, Zhenxing ZHANG, Jingjing WU. Reversible digital watermarking-based protocol for data integrity in wireless sensor network[J]. Journal on communications, 2018, 39(3): 118-127. DOI: 10.11959/j.issn.1000-436x.2018046.
针对无线传感网隐私保护协议的高能耗与传感网络资源受限的对立问题,基于可逆数字水印与同态加密技术,提出一种同时保证数据完整性与机密性的可恢复数据融合协议。一方面采用可逆数字水印技术中的差异扩展方法对传感器采集数据进行嵌入,在融合数据被破坏时可以通过可逆水印恢复原始数据,保证融合数据的完整性校验;另一方面采用基于椭圆曲线的同态加密对数据进行加密融合,防止在数据传输过程中传感器数据被感知。安全推理表明,所提协议可以很好地抵御簇头节点妥协和篡改攻击。性能分析表明,该协议比其他算法在计算与通信开销、传输时延方面具有显著优势。实验对比结果表明,该协议有更低的资源开销,可以提升网络性能。
For the contradiction between high energy consumption of WSN privacy protection algorithm and constrained resources of sensor network
a recoverable data fusion protocol that ensures data integrity and confidentiality based on reversible digital watermarking and homomorphic encryption technology was proposed.On the one hand
the data from the sensor was embedded by the difference expansion method by using the reversible digital watermarking technique
and original data could be recovered by using a reversible watermark to ensure the integrity check of the fusion data when the fusion data were destroyed.On the other hand
elliptic curve homomorphic encryption encrypted data to prevent sensor data from being perceived during data transmission.Security results show that the proposed protocol performs well against cluster head node compromise as well as tampering from an attack.Performance analysis shows that the protocol has significant advantages over other algorithms in terms of computation
communication overhead and propagation delay.The experimental results show that the protocol has a low resource overhead and improves network performance.
李建中 , 李金宝 , 石胜飞 . 传感器网络及其数据管理的概念、问题与进展 [J ] . 软件学报 , 2003 , 14 ( 10 ): 1717 - 1727 .
LI J Z , LI J B , SHI S F . Concepts,issues and advance of sensor networks and data management of sensor networks [J ] . Journal of Software , 2003 , 14 ( 10 ): 1717 - 1727 .
董晓蕾 . 物联网隐私保护研究进展 [J ] . 计算机研究与发展 , 2015 , 52 ( 10 ): 2341 - 2352 .
DONG X L . Advances of privacy preservation in Internet of things [J ] . Journal of Computer Research and Development , 2015 , 52 ( 10 ): 2341 - 2352 .
白乐强 , 李玲 , 钱施光 , 等 . 基于椭圆模型的无线传感器网络源位置隐私保护算法 [J ] . 控制与决策 , 2017 , 32 ( 2 ): 255 - 261 .
BAI L Q , LI L , QIAN S G , et al . Source-location privacy protection algorithm in WSN based on ellipse model [J ] . Control and Decision , 2017 , 32 ( 2 ): 255 - 261 .
CHEN C M , LIN Y H , LIN Y C , et al . RCDA:recoverable concealed data aggregation for data integrity in wireless sensor networks [J ] . IEEE Transactions on Parallel and Distributed Systems , 2012 , 23 ( 4 ): 727 - 734 .
付帅 , 姜奇 , 马建峰 . 一种无线传感器网络隐私保护数据聚合方案 [J ] . 计算机研究与发展 , 2016 , 53 ( 9 ): 2030 - 2038 .
FU S , JIANG Q , MA J F . A privacy-preserving data aggregation scheme in wireless sensor networks [J ] . Journal of Computer Research and Development , 2016 , 53 ( 9 ): 2030 - 2038 .
苘大鹏 , 王臣也 , 杨武 , 等 . 低能耗的无线传感器网络隐私数据融合方法 [J ] . 清华大学学报(自然科学版) , 2017 , 57 ( 2 ): 213 - 219 .
MAN D P , WANG C Y , YANG W , et al . Energy-efficient cluster-based privacy data aggregation for wireless sensor networks [J ] . Journal of Tsinghua University(Science and Technology) , 2017 , 57 ( 2 ): 213 - 219 .
丁超 , 杨立君 , 吴蒙 . 一种同时保障隐私性与完整性的无线传感器网络可恢复数据聚合方案 [J ] . 电子与信息学报 , 2015 , 37 ( 12 ): 2808 - 2814 .
DING C , YANG L J , WU M . A recoverable privacy preserving integrity assured data aggregation scheme for wireless sensor networks [J ] . Journal of Electronics and Information Technology , 2015 , 37 ( 12 ): 2808 - 2814 .
GUO H P , LI Y J , JAJODIA S . Chaining watermarks for detecting malicious modifications [J ] . Information Sciences , 2007 , 177 ( 1 ): 281 - 298 .
GUAN T H , CHEN Y H . A node clone attack detection scheme based on digital watermark in WSN [C ] // First IEEE International Conference on Computer Communication and the Internet . 2016 : 257 - 260 .
HAMEED K , KHAN M S , AHMED I , et al . A zero watermarking scheme for data integrity in wireless sensor networks [C ] // 19th International Conference on Network Based Information Systems . 2016 , 56 : 119 - 126 .
KHAN A , SIDDIQA A , MUNIB S , et al . A recent survey of reversible watermarking techniques [J ] . Information Sciences , 2014 , 27 ( 9 ): 251 - 272
LFTIKHAR S , KAMRAN M , MUNIR E U , et al . A reversible watermarking technique for social network datasets for enabling data trust in cyber,physical,and social computing [J ] . IEEE Systems Journal , 2017 , 11 ( 1 ): 197 - 206 .
SHI X , XIAO D . A reversible watermarking authentication seheme for wireless sensor networks [J ] . Information Sciences , 2013 , 240 ( 8 ): 173 - 183 .
GNAWALI O , FONSECA R , JAMIESON K , et al . Collection tree protocol [C ] // The 7th ACM Conference on Embedded Networked Sensor Systems . 2009 : 1 - 14 .
HEIDARI-BATENI G , MCGILLEM C D . A Chaotic direct sequence spread spectrum communication system [J ] . IEEE Transactions on Communications , 1994 , 42 ( 2-4 ): 1524 - 1527 .
LIU X X , GUO Y C , SUN C . A novel data integrity protection algorithm based on grouping negotiation and watermarking for WSN [J ] . Journal of Computational Information Systems , 2015 , 11 ( 7 ): 2693 - 2700 .
TIAN J . Reversible data embedding using a difference expansion [J ] . IEEE Transactions on Circuits and Systems for Video Technology , 2003 , 13 ( 8 ): 890 - 896 .
MEULENAER G D , GOSSET F , STANDAERT F X , et al . On the energy cost of communication and cryptography in wireless sensor networks [C ] // IEEE International Conference on Wireless and Mobile Computing,Networking and Communications . 2008 : 580 - 585 .
MYKLETUN E , GIRAO J , WESTHOFF D . Public key based cryptoschemes for data concealment in wireless sensor networks [C ] // IEEE International Conference on Communications . 2006 : 2288 - 2295 .
YANG L , DING C , WU M . RPIDA:recoverable privacy preserving integrity-assured data aggregation scheme for wireless sensor networks [J ] . KSII Transactions on Internet and Information Systems , 2015 , 37 ( 12 ): 2808 - 2814 .
0
浏览量
1182
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构