一種同時(shí)保障隱私性與完整性的無線傳感器網(wǎng)絡(luò)可恢復(fù)數(shù)據(jù)聚合方案
doi: 10.11999/JEIT150208 cstr: 32379.14.JEIT150208
-
1.
(南京郵電大學(xué)計(jì)算機(jī)學(xué)院 南京 210003) ②(南京郵電大學(xué)通信與信息工程學(xué)院 南京 210003) ③(南京郵電大學(xué)寬帶無線通信與傳感網(wǎng)技術(shù)教育部重點(diǎn)實(shí)驗(yàn)室 南京 210003)
國家973計(jì)劃項(xiàng)目(2011CB302903),國家自然科學(xué)基金青年項(xiàng)目(61100213),教育部高等學(xué)校博士學(xué)科點(diǎn)專項(xiàng)科研基金(20113223120007)和江蘇省高校自然科學(xué)研究重點(diǎn)項(xiàng)目(10KJA510035)
A Recoverable Privacy-preserving Integrity-assured Data Aggregation Scheme for Wireless Sensor Networks
-
1.
(College of Computer Science &
The National 973 Program of China (2011CB302903)
-
摘要: 該文針對(duì)無線傳感器網(wǎng)絡(luò)(WSNs)數(shù)據(jù)聚合與安全目標(biāo)之間的矛盾,基于隱私同態(tài)和聚合消息驗(yàn)證碼技術(shù)提出一種同時(shí)保障數(shù)據(jù)隱私性與完整性的可恢復(fù)數(shù)據(jù)聚合方案。該方案支持由聚合結(jié)果恢復(fù)出各感知數(shù)據(jù),從而一方面能夠驗(yàn)證感知數(shù)據(jù)和聚合數(shù)據(jù)的完整性,另一方面能夠?qū)υ紨?shù)據(jù)進(jìn)行任意所需的處理,不受聚合函數(shù)類型的限制。安全分析表明該方案不僅支持?jǐn)?shù)據(jù)隱私性、完整性,還能夠抵抗未授權(quán)聚合攻擊,聚合節(jié)點(diǎn)俘獲攻擊,且能夠在一定范圍內(nèi)檢測及定位惡意節(jié)點(diǎn)。性能分析表明,該方案相比其他算法在通信和計(jì)算開銷方面具有顯著優(yōu)勢(shì)。為了評(píng)估方案性能和可行性,基于TinyOS給出了算法的原型實(shí)現(xiàn)。實(shí)驗(yàn)結(jié)果表明,該方案開銷較低,對(duì)于資源受限的WSNs是高效可行的。
-
關(guān)鍵詞:
- 無線傳感器網(wǎng)絡(luò) /
- 數(shù)據(jù)聚合 /
- 隱私保護(hù) /
- 完整性保護(hù) /
- 原型實(shí)現(xiàn)
Abstract: To address the contradiction between data aggregation and data security in Wireless Sensor Networks (WSNs), a recoverable privacy-preserving integrity-assured data aggregation scheme is proposed based on the technologies of privacy homomorphism and aggregate message authentication code. The proposed scheme enables the Base Station (BS) to recover all the original sensing data from the final aggregated results, which makes it possible to verify the integrity of each sensing data and aggregated data, and perform any further operations on them on demand. The security analysis shows that the proposal not only provides the data privacy and data integrity, but also resists against unauthorized aggregation attack and aggregator capture attack; besides, it is able to detect and locate the malicious nodes which injects false data to the network in a certain range. The performance analysis shows that the proposed scheme has remarkable advantages over existing schemes in terms of computation and communication overhead. In order to evaluate the performance and feasibility of the proposal, the prototype implementation is presented based on the TinyOS platform. The experiment results demonstrate the proposed scheme is feasible and efficient for resource-constrained WSNs. -
Girao J, Westhoff D, and Schneider M. CDA: concealed data aggregation for reverse multicast traffic in wireless sensor networks[C]. Proceedings of 5th IEEE International Conference on Communications (ICC05), Seoul, Korea, 2005: 3044-3049. Lin Y H, Chang S Y, and Sun H M. CDAMA: concealed data aggregation scheme for multiple applications in wireless sensor networks[J]. IEEE Transactions on Knowledge and Data Engineering, 2013, 25(7): 1471-1483. Mykletun E, Girao J, and Westhoff D. Public key based cryptoschemes for data concealment in wireless sensor networks[C]. Proceedings of 6th International Conference on Communication (ICC06), Istanbul, Turkey, 2006: 2288-2295. Taeho J, Mao X F, Li X Y, et al.. Privacy-preserving data aggregation without secure channel: multivariate polynomial evaluation[C]. Proceedings of 32nd IEEE International Conference on Computer Communications (IEEE INFOCOM 2013), Turin, Italy, 2013: 2634-2642. Yang Y, Wang X, Zhu S, et al.. SDAP: a secure hop-by-hop data aggregation protocol for sensor networks[J]. ACM Transactions on Information System Security, 2008, 11(4): 1-43. Zhu L, Yang Z, Li M, et al.. An efficient data aggregation protocol concentrated on data integrity in wireless sensor networks[J]. International Journal of Distributed Sensor Networks, 2013(7): 718-720. Niu S, Wang C, Yu Z, et al.. Lossy data aggregation integrity scheme in wireless sensor networks[J]. Computers Electrical Engineering, 2013, 39(6): 1726-1735. OzeDemir S and Cam H. Integration of false data detection with data aggregation and confidential transmission in wireless sensor networks[J]. IEEE/ACM Transactions on Networking, 2010, 18(3): 736-749. 趙小敏, 梁學(xué)利, 蔣雙雙, 等. 安全的WSN數(shù)據(jù)融合隱私保護(hù)方案設(shè)計(jì)[J]. 通信學(xué)報(bào), 2014, 35(11): 154-161. Zhao Xiao-min, Liang Xue-li, Jiang Shuang-shuang, et al.. Design of secure privacy-preserving data aggregation scheme for wireless sensor network[J]. Journal on Communications, 2014, 35(11): 154-161. Sun H, Chen C, and Lin Y. RCDA: recoverable concealed data aggregation for data integrity in wireless sensor networks[J]. IEEE Transactions on Parallel and Distributed Systems, 2011, 23(4): 727-734. Ozdemir S and Xiao Y. Integrity protecting hierarchical concealed data aggregation for wireless sensor networks[J]. Computer Networks, 2011, 55(8): 1735-1746. Zhou Q, Yang G, and He L. A secure-enhanced data aggregation based on ECC in wireless sensor networks[J]. Sensors (Basel, Switzerland), 2014, 14(4): 6701-6721. Papadopoulos S, Kiayias A, and Papadias D. Exact in-network aggregation with integrity and confidentiality[J]. IEEE Transactions on Knowledge Data Engineering, 2012, 24(10): 1760-1773. Katz J and Lindell A. Aggregate message authentication codes[C]. Proceedings of the Cryptographers Track at the RSA Conference, San Francisco, CA, USA, 2008: 155-169. Rivest R, Adleman L, and Dertouzos M. Foundations of Secure Computation[M]. Academia Press, 1978: 169-179. Peter S, Westhoff D, and Castelluccia C. A survey on the encryption of convergecast traffic with in-network processing[J]. IEEE Transactions on Dependable and Secure Computing, 2010, 7(1): 20-34. -
計(jì)量
- 文章訪問數(shù): 1454
- HTML全文瀏覽量: 184
- PDF下載量: 657
- 被引次數(shù): 0