浏览全部资源
扫码关注微信
江苏大学 计算机科学与通信工程学院,江苏 镇江 212013
[ "李星(1991-),女,福建宁德人,江苏大学硕士生,主要研究方向为传感器网络安全数据融合。" ]
[ "李春彦(1988-),女,山东菏泽人,江苏大学硕士生,主要研究方向为车联网中的入侵检测技术。" ]
[ "王良民(1977-),男,安徽潜山人,江苏大学教授、硕士生导师,主要研究方向为信息安全与物联网工程。" ]
网络出版日期:2014-11,
纸质出版日期:2014-11-30
移动端阅览
李星, 李春彦, 王良民. 基于隐私同态数据融合的完整性验证协议[J]. 通信学报, 2014,35(Z2):256-260.
Xing LI, Chun-yan LI, Liang-min WANG. Integrity verification protocol based on privacy homomorphism data aggregation[J]. Journal on communications, 2014, 35(Z2): 256-260.
李星, 李春彦, 王良民. 基于隐私同态数据融合的完整性验证协议[J]. 通信学报, 2014,35(Z2):256-260. DOI: 10.3969/j.issn.1000-436x.2014.z2.036.
Xing LI, Chun-yan LI, Liang-min WANG. Integrity verification protocol based on privacy homomorphism data aggregation[J]. Journal on communications, 2014, 35(Z2): 256-260. DOI: 10.3969/j.issn.1000-436x.2014.z2.036.
在无线传感器网络中的安全数据融合能够有效防止隐私泄露和数据篡改等问题,并实现高效的数据传输。由此提出一种基于隐私同态数据融合的完整性验证协议IV-PHDA。该协议采用同态加密保证数据隐私性;利用随机检测节点对节点聚合结果的完整性进行检测,以验证聚合节点是否忠实地传输每个数据分组。通过理论分析和仿真对比,对其算法的性能进行验证,结果表明,该协议能够在网络传输的过程中检测数据的完整性,并且实现较好的隐私保护和较高的数据精确度。
Secure data aggregation in wireless sensor networks can effectively prevent privacy leakage
data tampering and other issues
it also achieves efficient data transmission.An integrity verification protocol based on privacy homomorphism data aggregation (IV-PHDA) was presented.The protocol uses homomorphism encryption to ensure data privacy
then it used random detection nodes to detect the integrity of the aggregated results to verify whether the aggregation node faithfully transmit each data packet.The theoretical analysis and simulation comparison verify the performance of the algorithm
the results show that this protocol can detect data integrity through transmission
and achieve better privacy protection and higher data accuracy.
RAMESH R , VARSHNEY P K . Data aggregation techniques in sensor networks:a survey [J ] . Communications Surveys & Tutorials , 2006 , 8 ( 4 ): 48 - 63 .
OZDEMIR S , YANG X . Secure data aggregation in wireless sensor networks:a comprehensive overview [J ] . Computer Networks , 2009 , 53 ( 12 ): 2022 - 2037 .
GUO J , FANG J A , CHEN X M . Survey on secure data aggregation for wireless sensor networks [J ] . IEEE Internaional Conference on SOLI , 2011 , 7 : 138 - 143 .
PRZYDATEK B , SONG D , PERRIG A . SIA:secure information aggregation in sensor networks [A ] . Proc of 1st Conference on Embedded Networked Sensor Systems [C ] . Amsterdam : IOS Press , 2003 . 255 - 265 .
HE W , LIU X , NGUYEN H . PDA:privacy-preserving data aggregation in wireless sensor networks [A ] . Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM) [C ] . 2007 . 2045 - 2053 .
WESTHOFF D , GIRAO J , ACHARYA M . Concealed data aggregation for reverse multicast traffic in sensor networks:encryption,key distribution,and routing adaptation [J ] . IEEE Transactions on Mobile Computing , 2006 , 5 ( 10 ): 1417 - 1431 .
CHEN C M , LIN Y H , LIN Y C . RCDA:recoverable concealed data aggregation for data integrity in wireless sensor networks [J ] . IEEE Transactions on Parallel and Distributed Systems , 2012 , 23 ( 4 ): 727 - 734 .
ESCHENAUER L , GLIGOR V D . A key-management scheme for distributed sensor networks [A ] . Proceedings of the 9th ACM Conference on Computer and Communications Security [C ] . Washington , 2002 . 41 - 47 .
MADDEN S , FRANKLIN M J , HELLERSTEIN J M . TAG:a tiny aggregation service for ad-hoc sensor networks [A ] . Proceedings of the 5th symposium on Operating systems design and implementation [C ] . New York,USA:ACM , 2002 . 131 - 146 .
DOMINGO-FERRER J . A provably secure additive and multi-plicative privacy homomorphism [A ] . Proceedings of the Information Security Conference [C ] . 2002 . 471 - 483 .
CASTELLUCCIA C , MYKLETUN E , TSUDIK G . Efficient aggregation of encrypted data in wireless sensor networks [A ] . The Second Annual International Conference on Mobile and Ubiquitous Systems:Networking and Services [C ] . San Diego,CA , 2005 . 109 - 117 .
0
浏览量
0
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构