期刊文献+

基于簇内分层的无线传感器网络隐私保护数据融合算法 被引量:1

PRIVACY PROTECTION AND DATA AGGREGATION ALGORITHM FOR WSN BASED ON INTRA-CLUSTER STRATIFICATION
在线阅读 下载PDF
导出
摘要 在无线传感器网络中,提供高效的数据融合的同时又保证数据的隐私性是一个具有挑战性的研究问题。提出一个基于簇内二叉分层的完整性和机密性保护的数据融合算法(TIPDA),算法将簇内节点按照二叉树的逻辑结构进行组织,并引入了数据切片的思想完成数据融合,同时将中国剩余定理的思想引入进行端到端的完整性验证。理论分析和实验结果都表明,TIPDA算法可以有效地保护无线传感器网络融合数据的机密性和完整性,且花费较少的通信开销和计算开销。 Providing efficient data aggregation while preserving data privacy is a challenging research problem in wireless sensor networks. In this paper,we present an intra-cluster binary stratification-based data aggregation algorithm with integrity and confidentiality protection (TIPDA).The algorithm organises intra-cluster nodes according to the logic structure of binary tree and introduce the idea of data-slicing to achieve data aggregation,meanwhile it applies the thought of Chinese remainder theorem to end-to-end integrity verification.Theoretical analysis and experimental results all show that TIPDA can effectively protect the confidentiality and integrity of data aggregation in wireless sensor networks with less communication and computational overhead.
出处 《计算机应用与软件》 CSCD 2015年第4期109-112,140,共5页 Computer Applications and Software
基金 国家自然科学基金项目(61103245) 广西自然科学基金项目(2013GXNSFAA253003)
关键词 无线传感器网络 隐私保护 数据融合 中国剩余定理 Wireless sensor networks (WSM) Privacy-preserving Data aggregation Chinese remainder theorem
  • 相关文献

参考文献9

  • 1范永健,陈红,张晓莹.无线传感器网络数据隐私保护技术[J].计算机学报,2012,35(6):1131-1146. 被引量:64
  • 2许建,杨庚,陈正宇,王海勇,杨震.WSN数据融合中的隐私保护技术研究[J].计算机工程,2012,38(15):134-138. 被引量:8
  • 3He W B, Liu X, Nguyen H. PDA : Privacy-preserving Data Aggregation in Wireless Sensor Networks[ C]//Proceedings of the 26th 1EEE Inter- national Conference on Computer Communications (INFOCOM). An- chorage,USA, 2007:2045 -2053.
  • 4Michael M Groat, He W B, Stephanie Forrest. KIPDA : k-indistinguisha- ble Privacy-Preserving data aggregation in wireless sensor networks [ C ]//Proceedings of the 30th IEEE International Conference on Com- puter Communication ( INFOCOM ). Shanghai, China, 2011 : 1735 - 1746.
  • 5Bista R,Yoo H K,Chang J W. A new sensitive data aggregation scheme for protecting integrity in wireless sensor networks [ C ]//10th IEEE In- ternational Conference on Computer and Information Technology. Brad- ford, UK,2010.2463-2470.
  • 6He W B,Nguyen H, Liu X. iPDA:An integrity-protecting private data aggregation scheme for wireless sensor networks [ C ]//Proceedings of the Military Communincation Conference ( MILCOM ). San Diego, CA, USA, 2008 : 1 - 7.
  • 7Ozxtemir Suat, Yang Xiao. Secure data aggregation in wireless sensor networks : A comprehensive overview [ J ]. Computer Networks, 2009, 53(12) : 2022 -2037.
  • 8周强,杨庚.WSNs中可保护数据完整性和隐私的数据融合算法[J].计算机应用研究,2013,30(7):2100-2104. 被引量:7
  • 9Madden S, Franklin M J, Hellerstein J M. TAG: a tiny aggregation serv- ice for ad-hoc sensor networks[ C]//Proceedings of the 5th symposium on operating system design and implementation. New York, USA ,2002 : 131 - 146.

二级参考文献51

  • 1Ramesh R, Varshney P K. Data Aggregation Techniques in Sensor Networks: A Survey[J]. Communications Surveys & Tutorials, 2006, 8(4): 48-63.
  • 2Akyildiz I F, Su Weilian, Sankarasubramaniam Y, et al. Wireless Sensor Networks: A Survey[J]. Computer Networks, 2002, 38(4): 393-422.
  • 3Li Na, Zhang Nan, Dasa S K, et al. Privacy Preservation in Wireless Sensor Networks: A State-of-the-art Survey[J]. Ad Hoc Networks, 2009, 7(8): 1501-1514.
  • 4Chen Yanli, Yang Geng. An Efficient Broadcast Encryption Scheme for Wireless Sensor Network[C]//Proc. of International Conference on Wireless Communications, Networking and Mobile Computing. Shanghai, China: [s. n.], 2009.
  • 5Ozturk C, Zhang Yanzhou, Trappe W. Source Location Privacy in Energy Constrained Sensor Networks Routing[C]//Proc. of ACM Workshop on Security of Ad Hoc and Sensor Networks. [S. 1.]: ACM Press, 2004: 88-93.
  • 6Mehta K, Liu Donggang, Wright M. Location Privacy in Sensor Networks Against a Global Eaves Dropper[C]//Proc. of IEEE International Conference on Network Protocols. [S. 1.]: IEEE Press, 2007: 314-323.
  • 7Yang Yi, Shao Min, Zhu Sencun, et al. Towards Event Source Unobservability with Minimum Network Traffic in Sensor Networks[C]//Proc. of ACM Conference on Wireless Network Security. [S. 1.]: ACM Press, 2008: 77-88.
  • 8Shao Min, Yang Yi, Zhu Sencun. Towards Statistically Strong Source Anonymity for Sensor Network[C]//Proc. of INFOCOM'08. Phoenix, USA: [s. n.], 2008.
  • 9Mehta K, Liu Donggang, Wright M. Protecting Location Privacy in Sensor Networks Against a Global Avesdropper[J]. IEEE Transactions on Mobile Computing, 2011, 11(2): 1-18.
  • 10Spachos P, Song Liang, Bui F M. Improving Source-location Privacy Through Opportunistic Routing in Wireless Sensor Networks[C]//Proc. of IEEE Symposium on Computers and Communications. [S. 1.]: IEEE Press, 2011: 815-820.

共引文献75

同被引文献4

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部