期刊文献+

无线传感器网络中有效的安全数据融合机制 被引量:1

Efficient and Secure Data Aggregation Scheme for Wireless Sensor Networks
在线阅读 下载PDF
导出
摘要 在无线传感器网络中,数据融合是实现有效传输和节省能源的一个重要途径,许多应用都需要可靠并且可信的数据来进行融合。针对上述要求,提出了一个新的安全数据融合算法来保证融合数据的机密性和完整性。算法使用端到端加密和逐跳加密相结合的方式进行数据传输,通过认证过程进行恶意节点及伪造数据的检测。仿真表明,提出的算法能够有效地检测出恶意节点,并保证融合结果的准确性。 Data aggregation is an important solution for achieving effective transmission and better power conservation in wireless sensor networks. Many applications require reliable and trustful data aggregation. Aimed at the demand, a new secure data aggregation algorithm is proposed to ensure the confi- dentiality and integrity of aggregated data. The algorithm uses the blend of end-to-end and hop-by-hop encryption for data transmission, and attestation algorithm to detect the malicious node and forged data. Simulation results show that tile proposed algorithm can effectively detect malicious nodes and en- sure the accuracy of the aggregation.
出处 《电视技术》 北大核心 2012年第1期67-70,105,共5页 Video Engineering
基金 重庆市科委自然科学基金项目(CSTC 2009BB2278)
关键词 无线传感器网络 数据融合 安全数据融合 完整性 认证 wireless sensor networks data aggregation secure data aggregation integrity attestation
  • 相关文献

参考文献10

  • 1刘鑫芝.无线传感器网络安全数据融合的研究[J].计算机与现代化,2010(5):151-155. 被引量:8
  • 2GIRAO J,WESTHOFF D, SCHNEIDER M. CDA : concealed data aggregation for reverse multicast traffic in wireless sensor networks [ C ]//Proc. ICC 2005. Seoul : IEEE Press ,2005:3044-3049.
  • 3DOMINGO F J. A provably secure additive and rnuhiplicative privacy to- momorphism [ C ]//Proc. 5th International Conference on Information Security( ISC 2002). Sao Paulo : ISC ,2002:471-483.
  • 4CASTELLUCCIA C,MYKLENTN E,TSUDIK G. Efficient aggregation of encrypted data in wireless sensor networks [ C ]//Proc. Second Annual International Conference on MobiQuitous 2005. San Diego: IEEE Com puter Society,2005 : 109 - 117.
  • 5MLAIH E ,ALY S A. Secure hop-by-hop aggregation of end-to-end concealed data in wireless sensor networks[ C]//Proc. the INFOCOM 2008. Phoenix: IEEE Press,2008 : 1-6.
  • 6PETER S, PIOTROWSKI S, LANGENDOERFER R. On concealed data aggregation for WSNs[C]//Proc. CCNC 2007. Las Vegas:IEEE Press, 2007 : 192-196.
  • 7MYKLETUN E, GIRAO J, WESTHOFF D. Public key based cryptoschemes for data concealment in wireless sensor networks [ C ]//Proc. IEEE International Conference on Communications(ICC2006). Istanbul IEEE Press ,2006:2288-2295.
  • 8AZARDERAKHSH R, REYHANI M A, ABID Z E. A key management scheme for cluster basedwireless sensor networks [ C ]//Proc. EUC 2008. Shanghai : IEEE Press .2008:222-227.
  • 9DAS A K, SENGUPTA I. An effective group-based key establishment scheme for large-scale wireless sensor networks using bivariate polynomials [ C ]//Proc. COMSWARE 2008.Bangalore: IEEE Press ,2008:9-16.
  • 10罗蔚,胡向东.无线传感器网络中一种高效的安全数据融合协议[J].重庆邮电大学学报(自然科学版),2009,21(1):110-114. 被引量:14

二级参考文献31

  • 1郭利,张锡恩,马彦恒.模糊数据融合算法在设备状态监测中的应用[J].传感器技术,2004,23(6):73-75. 被引量:16
  • 2贾玉福,董天临,石坚.无线传感器网络安全问题分析[J].网络安全技术与应用,2005(1):48-51. 被引量:11
  • 3芦东昕,徐文龙,王利存.无线传感器网络[J].工业控制计算机,2005,18(4):24-25. 被引量:14
  • 4王传英,付华.模糊数据融合算法在煤矿安全系统中的应用[J].传感器技术,2005,24(6):72-73. 被引量:11
  • 5张海玉,贾润亮.无线传感器网络研究[J].科技情报开发与经济,2006,16(9):185-186. 被引量:4
  • 6Sang Yingpeng,Shen Hong,et al.Secure data aggregation in wireless sensor networks:A survey[C]//Proceedings of the Seventh International Conference on Parallel and Distributed Computing,Applications and Technologies.2006:315-320.
  • 7Girao J,Westhoff D,Schneider M.CDA:Concealed data aggregation for reverse multicast traffic in wireless sensor networks[C]//Proceedings of IEEE International Conference on Communications(ICC'05).Seoul,Korea,2005,5:3044-3049.
  • 8Westhoff D,Girao J,Acharya M.Concealed data aggregation for reverse multicast traffic in sensor networks:Encryption,key distribution and routing adaptation[J].IEEE Transactions on Mobile Computing,2006,5(10):1417-1431.
  • 9Acharya M,Girao J,Westhoff D.Secure comparison of encrypted data in wireless sensor networks[C]//Proceedings of the Third International Symposium on Modeling and Optimization in Mobile,Ad Hoc,and Wireless Networks.Trentino,Italy,2005:47-53.
  • 10Mykletun E,Girao J,Westhoff D.Public key based cryptoschemes for data concealment in wireless sensor networks[C]//Proceedings of IEEE Conference on Communications ICC2006.2006:174-180.

共引文献17

同被引文献12

  • 1Papadopoulos S, Kiayias A, Papadias D. Exact in-network ag- gregation with integrity and confidentiality[ J ]. IEEE Transac- tions on Knowledge and Data Engineering, 2012,24 ( 10 ) : 1760-1773.
  • 2He Weibo, Liu Xue, Nguyen H, et al. PDA : privacy-preserving data aggregation in wireless sensor networks [ C ]//Proc of the 26th IEEE international conference on computer communica- tions. Washington DC, USA: IEEE Computer Society Press, 2007 : 2045 - 2053.
  • 3He Weibo, Liu Xue, Nguyen H, et al. A duster-based protocol to enforce integrity and preserve privacy in data aggregation [ C]//Proc of the 29th IEEE international conference on dis- tributed computing systems. Montreal, QC : IEEE Press, 2009 : 14-19.
  • 4Girao J, Westhoff D, Schneider M. CDA : concealed data aggre- gation for reverse multicast traffic in wireless sensor networks [ C]//Proc of 2005 IEEE international conference on commu- nications. [ s. 1. ] :IEEE ,2005:3044-3049.
  • 5Li Z, Gong G. Data aggregation integrity based on homomor- phic primitives in sensor networks[ M ]//Ad-Hoc, Mobile and Wireless Networks. Heidelberg, Berlin : Springer, 2010 : 149 - 162.
  • 6Intanagonwiwat C, Estrin D, Govindan R, et al. Impact of net- work density on data aggregation in wireless sensor networks [C ]//Proceedings of the 22nd international conference on distributed computing systems. [ s. 1. ] : [ s. n. ], 2002 : 457 - 458.
  • 7Tang X, Xu J. Extending network lifetime for precision eon- strained data aggregation in wireless sensor networks [ C ]// Proc of INFOCOM. Barcelona, Spain: IEEE ,2006 : 1 - 12.
  • 8Ynng Yi, Wang Xinran, Zhu Sencun, et al. SDAP: a secure hop-by-hop data aggregation protocol for sensor networks[ C l// Proc of MobiHoc. Florence, Italy : ACM,2006.
  • 9Wagner D. Resilient aggregation in sensor networks[ C ]//Pro- ceedings of the 2nd ACM workshop on security of ad hoc and sensor networks. New York, NY, USA : ACM ,2004:78-87.
  • 10Agrawal S, Boneh D. Homomorphic MACs : MAC-based integ- rity for network coding[ C ]//Proc of the 7th international con-ference on applied cryptography and network security. Heidel- berg, Berlin : Springer-Verlag ,2009:292-305.

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部