高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

一种同时保障隐私性与完整性的无线传感器网络可恢复数据聚合方案

杨立君 丁超 吴蒙

杨立君, 丁超, 吴蒙. 一种同时保障隐私性与完整性的无线传感器网络可恢复数据聚合方案[J]. 电子与信息学报, 2015, 37(12): 2808-2814. doi: 10.11999/JEIT150208
引用本文: 杨立君, 丁超, 吴蒙. 一种同时保障隐私性与完整性的无线传感器网络可恢复数据聚合方案[J]. 电子与信息学报, 2015, 37(12): 2808-2814. doi: 10.11999/JEIT150208
Ding Chao, Yang Li-jun, Wu Meng. A Recoverable Privacy-preserving Integrity-assured Data Aggregation Scheme for Wireless Sensor Networks[J]. Journal of Electronics & Information Technology, 2015, 37(12): 2808-2814. doi: 10.11999/JEIT150208
Citation: Ding Chao, Yang Li-jun, Wu Meng. A Recoverable Privacy-preserving Integrity-assured Data Aggregation Scheme for Wireless Sensor Networks[J]. Journal of Electronics & Information Technology, 2015, 37(12): 2808-2814. doi: 10.11999/JEIT150208

一种同时保障隐私性与完整性的无线传感器网络可恢复数据聚合方案

doi: 10.11999/JEIT150208
基金项目: 

国家973计划项目(2011CB302903),国家自然科学基金青年项目(61100213),教育部高等学校博士学科点专项科研基金(20113223120007)和江苏省高校自然科学研究重点项目(10KJA510035)

A Recoverable Privacy-preserving Integrity-assured Data Aggregation Scheme for Wireless Sensor Networks

Funds: 

The National 973 Program of China (2011CB302903)

  • 摘要: 该文针对无线传感器网络(WSNs)数据聚合与安全目标之间的矛盾,基于隐私同态和聚合消息验证码技术提出一种同时保障数据隐私性与完整性的可恢复数据聚合方案。该方案支持由聚合结果恢复出各感知数据,从而一方面能够验证感知数据和聚合数据的完整性,另一方面能够对原始数据进行任意所需的处理,不受聚合函数类型的限制。安全分析表明该方案不仅支持数据隐私性、完整性,还能够抵抗未授权聚合攻击,聚合节点俘获攻击,且能够在一定范围内检测及定位恶意节点。性能分析表明,该方案相比其他算法在通信和计算开销方面具有显著优势。为了评估方案性能和可行性,基于TinyOS给出了算法的原型实现。实验结果表明,该方案开销较低,对于资源受限的WSNs是高效可行的。
  • Girao J, Westhoff D, and Schneider M. CDA: concealed data aggregation for reverse multicast traffic in wireless sensor networks[C]. Proceedings of 5th IEEE International Conference on Communications (ICC05), Seoul, Korea, 2005: 3044-3049.
    Lin Y H, Chang S Y, and Sun H M. CDAMA: concealed data aggregation scheme for multiple applications in wireless sensor networks[J]. IEEE Transactions on Knowledge and Data Engineering, 2013, 25(7): 1471-1483.
    Mykletun E, Girao J, and Westhoff D. Public key based cryptoschemes for data concealment in wireless sensor networks[C]. Proceedings of 6th International Conference on Communication (ICC06), Istanbul, Turkey, 2006: 2288-2295.
    Taeho J, Mao X F, Li X Y, et al.. Privacy-preserving data aggregation without secure channel: multivariate polynomial evaluation[C]. Proceedings of 32nd IEEE International Conference on Computer Communications (IEEE INFOCOM 2013), Turin, Italy, 2013: 2634-2642.
    Yang Y, Wang X, Zhu S, et al.. SDAP: a secure hop-by-hop data aggregation protocol for sensor networks[J]. ACM Transactions on Information System Security, 2008, 11(4): 1-43.
    Zhu L, Yang Z, Li M, et al.. An efficient data aggregation protocol concentrated on data integrity in wireless sensor networks[J]. International Journal of Distributed Sensor Networks, 2013(7): 718-720.
    Niu S, Wang C, Yu Z, et al.. Lossy data aggregation integrity scheme in wireless sensor networks[J]. Computers Electrical Engineering, 2013, 39(6): 1726-1735.
    OzeDemir S and Cam H. Integration of false data detection with data aggregation and confidential transmission in wireless sensor networks[J]. IEEE/ACM Transactions on Networking, 2010, 18(3): 736-749.
    赵小敏, 梁学利, 蒋双双, 等. 安全的WSN数据融合隐私保护方案设计[J]. 通信学报, 2014, 35(11): 154-161.
    Zhao Xiao-min, Liang Xue-li, Jiang Shuang-shuang, et al.. Design of secure privacy-preserving data aggregation scheme for wireless sensor network[J]. Journal on Communications, 2014, 35(11): 154-161.
    Sun H, Chen C, and Lin Y. RCDA: recoverable concealed data aggregation for data integrity in wireless sensor networks[J]. IEEE Transactions on Parallel and Distributed Systems, 2011, 23(4): 727-734.
    Ozdemir S and Xiao Y. Integrity protecting hierarchical concealed data aggregation for wireless sensor networks[J]. Computer Networks, 2011, 55(8): 1735-1746.
    Zhou Q, Yang G, and He L. A secure-enhanced data aggregation based on ECC in wireless sensor networks[J]. Sensors (Basel, Switzerland), 2014, 14(4): 6701-6721.
    Papadopoulos S, Kiayias A, and Papadias D. Exact in-network aggregation with integrity and confidentiality[J]. IEEE Transactions on Knowledge Data Engineering, 2012, 24(10): 1760-1773.
    Katz J and Lindell A. Aggregate message authentication codes[C]. Proceedings of the Cryptographers Track at the RSA Conference, San Francisco, CA, USA, 2008: 155-169.
    Rivest R, Adleman L, and Dertouzos M. Foundations of Secure Computation[M]. Academia Press, 1978: 169-179.
    Peter S, Westhoff D, and Castelluccia C. A survey on the encryption of convergecast traffic with in-network processing[J]. IEEE Transactions on Dependable and Secure Computing, 2010, 7(1): 20-34.
  • 加载中
计量
  • 文章访问数:  1410
  • HTML全文浏览量:  172
  • PDF下载量:  655
  • 被引次数: 0
出版历程
  • 收稿日期:  2015-02-05
  • 修回日期:  2015-08-25
  • 刊出日期:  2015-12-19

目录

    /

    返回文章
    返回