浏览全部资源
扫码关注微信
1. 宿迁学院计算机科学系 宿迁223800
2. 南京航空航天大学计算机科学与技术学院 南京210016
[ "石鲁生,男,宿迁学院副教授,主要研究方向为信息安全、无线传感器网络。" ]
[ "朱慧博,女,宿迁学院副教授,主要研究方向为无线传感器、高频功率电子变换技术。" ]
[ "陈林,男,宿迁学院副教授,主要研究方向为Web服务和语义Web服务。" ]
网络出版日期:2013-11,
纸质出版日期:2013-11-20
移动端阅览
石鲁生, 朱慧博, 陈林. 异构无线传感器网络中一种可恢复数据的安全聚集算法[J]. 电信科学, 2013,29(11):23-28.
Lusheng Shi, Huibo Zhu, Lin Chen. Security Data Aggregation with Recoverable Data in Heterogeneous Wireless Sensor Network[J]. Telecommunications science, 2013, 29(11): 23-28.
石鲁生, 朱慧博, 陈林. 异构无线传感器网络中一种可恢复数据的安全聚集算法[J]. 电信科学, 2013,29(11):23-28. DOI: 10.3969/j.issn.1000-0801.2013.11.005.
Lusheng Shi, Huibo Zhu, Lin Chen. Security Data Aggregation with Recoverable Data in Heterogeneous Wireless Sensor Network[J]. Telecommunications science, 2013, 29(11): 23-28. DOI: 10.3969/j.issn.1000-0801.2013.11.005.
现有无线传感器网络的安全聚集算法能耗开销大,聚集类型单一,提出一种针对异构无线传感器网络的可恢复数据的安全聚集算法。算法使用基于椭圆曲线的同态加密技术实现数据隐私保护,利用高效的签名聚集方案为数据完整性和真实性的验证提供可靠保障。算法独特的数据恢复功能,使聚集节点可在得到聚集结果的同时恢复聚集前的原始数据,方便后续操作,也丰富了聚集类型。算法充分利用异构无线传感器网络中的节点差异,将大量计算工作转移至高资源节点,提高了执行效率。仿真实验和对比分析表明,算法安全性好、效率高,虽然单次聚集过程的通信量稍大,但数据恢复节省了后续工作的开销,整体能耗实际有所降低。
Recently
many security aggregation algorithms in wireless sensor network have high communication overhead and the usage of aggregation functions is constrained. A secure data aggregation algorithm with recoverable data in heterogeneous wireless sensor network was proposed. The algorithm uses homomorphism encryption techniques based on elliptic curve to address data privacy protection
and uses an efficient aggregate signature scheme to ensure data integrity and authenticity. The unique data recovery function of this algorithm can recover individual data together with getting the aggregated results
and can facilitate the follow-up operation
and enrich the aggregate type. The algorithm takes full advantage of the difference of nodes in heterogeneous wireless sensor network
and diverts large number of calculation work to h-sensors
this approach improves the efficiency of the implementation. Simulation and comparative analysis show that algorithm has high safety and high efficiency
although the communication overhead of single aggregate process is high
data recovery process saves the overhead of the follow-up work
and the overall energy consumption is actually reduced.
Duarte-Melo E J , Liu M Y . Analysis of energy consumption and lifetime of heterogeneous wireless sensor networks . Proceedings of the GLOBECOM 2002 , New York, USA , 2002 : 21 ~ 25
Yarvis M , Kushalnagar N , Singh H , et al . Exploiting heterogeneity in sensor networks . Proceedings of 24th Annual Joint Conference of the IEEE Computer and Communications Societies(INFOCOM 2005) , Miami, FL, USA , 2005 : 878 ~ 890
Malhotra B , Nikolaidis I , Nascimento M A . Aggregation convergecast scheduling in wireless sensor networks . Wireless Network , 2011 , 17 ( 2 ): 319 ~ 335
Desnoyers P , Ganesan D , Li H , et al . PRESTO: a predictive storage architecture for sensor networks . Proceedings of the Tenth Conference on Hot Topics in Operating Systems(HotOS-X) , Santa Fe, New Mexico, USA , 2005 : 231 ~ 236
Madden S , Franklin M J , Hellerstein J M . TAG: a tiny aggregation service for Ad Hoc sensor networks . Proceedings of the 5th Symposium on Operating Systems Design and Implementation , New York, USA , 2002 : 131 ~ 146
Deshpande A , Nath S , Gibbons P B , et al . Cache-and-query for wide area sensor databases . Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data , San Diego, CA, USA , 2003 : 503 ~ 514
Tang X , Xu J . Extending network lifetime for precision constrained data aggregation in wireless sensor networks . Proceedings of the IEEE INFOCOM , Barcelona, Catalunya, Spain , 2006 : 755 ~ 766
Yao J B , Wen G J . Protecting classification privacy data aggregation in wireless sensor networks . Proceedings of the 4th International Conference on Wireless Communication, Networking and Mobile Computing(WiCOM) , Dalian, China , 2008 : 1 ~ 5
杨庚 , 王安琪 , 陈正宇 等 . 一种低耗能的数据融合隐私保护算法 . 计算机学报 , 2011 , 34 ( 5 ): 792 ~ 800
Papadopoulos S , Kiayias A Papadias D . Secure and efficient in-network processing of exact SUM queries . Proceedings of the 27th International Conference on Data Engineering(ICDE) , Hannover, Germany , 2011 : 517 ~ 528
He W , Liu X , Nguyen H , et al . A cluster-based protocol to enforce integrity and preserve privacy in data aggregation . Proceedings of the 29th IEEE International Conference on Distributed Computing Systems Workshops , Montreal, QC, Canada , 2009 : 14 ~ 19
Nath S , Yu H , Chan H . Secure outsourced aggregation via one way chains . Proceedings of the ACM SIGMOD International Conference on Management of Data , Rhode Island,USA , 2009 : 31 ~ 34
Mykletun E , Girao J , Westhoff D . Public key based crypto schemes for data concealment in wireless sensor networks . Proceedings of the 2006 IEEE International Conference on Communications (ICC 2006) , Istanbul, Turkey , 2006 : 2288 ~ 2295
Boneh D , Gentry C , Lynn B , et al . Aggregate and verifiably encrypted signatures from bilinear maps . Proceedings of the 22nd International Conference on Theory and Applications of Cryptographic Techniques(Eurocrypt 2003) , Warsaw, Poland , 2003 : 416 ~ 432
Madden S , Franklin M J , Hellerstein J M . TAG: a tiny aggregation service for Ad Hoc sensor networks . Proceedings of the 5th Symposium on Operating Systems Design and Implementation , New York, USA , 2002 : 131 ~ 146
0
浏览量
490
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构