一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級(jí)搜索

留言板

尊敬的讀者、作者、審稿人, 關(guān)于本刊的投稿、審稿、編輯和出版的任何問題, 您可以本頁添加留言。我們將盡快給您答復(fù)。謝謝您的支持!

姓名
郵箱
手機(jī)號(hào)碼
標(biāo)題
留言內(nèi)容
驗(yàn)證碼

一種同時(shí)保障隱私性與完整性的無線傳感器網(wǎng)絡(luò)可恢復(fù)數(shù)據(jù)聚合方案

楊立君 丁超 吳蒙

楊立君, 丁超, 吳蒙. 一種同時(shí)保障隱私性與完整性的無線傳感器網(wǎng)絡(luò)可恢復(fù)數(shù)據(jù)聚合方案[J]. 電子與信息學(xué)報(bào), 2015, 37(12): 2808-2814. doi: 10.11999/JEIT150208
引用本文: 楊立君, 丁超, 吳蒙. 一種同時(shí)保障隱私性與完整性的無線傳感器網(wǎng)絡(luò)可恢復(fù)數(shù)據(jù)聚合方案[J]. 電子與信息學(xué)報(bào), 2015, 37(12): 2808-2814. doi: 10.11999/JEIT150208
Ding Chao, Yang Li-jun, Wu Meng. A Recoverable Privacy-preserving Integrity-assured Data Aggregation Scheme for Wireless Sensor Networks[J]. Journal of Electronics & Information Technology, 2015, 37(12): 2808-2814. doi: 10.11999/JEIT150208
Citation: Ding Chao, Yang Li-jun, Wu Meng. A Recoverable Privacy-preserving Integrity-assured Data Aggregation Scheme for Wireless Sensor Networks[J]. Journal of Electronics & Information Technology, 2015, 37(12): 2808-2814. doi: 10.11999/JEIT150208

一種同時(shí)保障隱私性與完整性的無線傳感器網(wǎng)絡(luò)可恢復(fù)數(shù)據(jù)聚合方案

doi: 10.11999/JEIT150208 cstr: 32379.14.JEIT150208
基金項(xiàng)目: 

國家973計(jì)劃項(xiàng)目(2011CB302903),國家自然科學(xué)基金青年項(xiàng)目(61100213),教育部高等學(xué)校博士學(xué)科點(diǎn)專項(xiàng)科研基金(20113223120007)和江蘇省高校自然科學(xué)研究重點(diǎn)項(xiàng)目(10KJA510035)

A Recoverable Privacy-preserving Integrity-assured Data Aggregation Scheme for Wireless Sensor Networks

Funds: 

The National 973 Program of China (2011CB302903)

  • 摘要: 該文針對(duì)無線傳感器網(wǎng)絡(luò)(WSNs)數(shù)據(jù)聚合與安全目標(biāo)之間的矛盾,基于隱私同態(tài)和聚合消息驗(yàn)證碼技術(shù)提出一種同時(shí)保障數(shù)據(jù)隱私性與完整性的可恢復(fù)數(shù)據(jù)聚合方案。該方案支持由聚合結(jié)果恢復(fù)出各感知數(shù)據(jù),從而一方面能夠驗(yàn)證感知數(shù)據(jù)和聚合數(shù)據(jù)的完整性,另一方面能夠?qū)υ紨?shù)據(jù)進(jìn)行任意所需的處理,不受聚合函數(shù)類型的限制。安全分析表明該方案不僅支持?jǐn)?shù)據(jù)隱私性、完整性,還能夠抵抗未授權(quán)聚合攻擊,聚合節(jié)點(diǎn)俘獲攻擊,且能夠在一定范圍內(nèi)檢測及定位惡意節(jié)點(diǎn)。性能分析表明,該方案相比其他算法在通信和計(jì)算開銷方面具有顯著優(yōu)勢(shì)。為了評(píng)估方案性能和可行性,基于TinyOS給出了算法的原型實(shí)現(xiàn)。實(shí)驗(yàn)結(jié)果表明,該方案開銷較低,對(duì)于資源受限的WSNs是高效可行的。
  • Girao J, Westhoff D, and Schneider M. CDA: concealed data aggregation for reverse multicast traffic in wireless sensor networks[C]. Proceedings of 5th IEEE International Conference on Communications (ICC05), Seoul, Korea, 2005: 3044-3049.
    Lin Y H, Chang S Y, and Sun H M. CDAMA: concealed data aggregation scheme for multiple applications in wireless sensor networks[J]. IEEE Transactions on Knowledge and Data Engineering, 2013, 25(7): 1471-1483.
    Mykletun E, Girao J, and Westhoff D. Public key based cryptoschemes for data concealment in wireless sensor networks[C]. Proceedings of 6th International Conference on Communication (ICC06), Istanbul, Turkey, 2006: 2288-2295.
    Taeho J, Mao X F, Li X Y, et al.. Privacy-preserving data aggregation without secure channel: multivariate polynomial evaluation[C]. Proceedings of 32nd IEEE International Conference on Computer Communications (IEEE INFOCOM 2013), Turin, Italy, 2013: 2634-2642.
    Yang Y, Wang X, Zhu S, et al.. SDAP: a secure hop-by-hop data aggregation protocol for sensor networks[J]. ACM Transactions on Information System Security, 2008, 11(4): 1-43.
    Zhu L, Yang Z, Li M, et al.. An efficient data aggregation protocol concentrated on data integrity in wireless sensor networks[J]. International Journal of Distributed Sensor Networks, 2013(7): 718-720.
    Niu S, Wang C, Yu Z, et al.. Lossy data aggregation integrity scheme in wireless sensor networks[J]. Computers Electrical Engineering, 2013, 39(6): 1726-1735.
    OzeDemir S and Cam H. Integration of false data detection with data aggregation and confidential transmission in wireless sensor networks[J]. IEEE/ACM Transactions on Networking, 2010, 18(3): 736-749.
    趙小敏, 梁學(xué)利, 蔣雙雙, 等. 安全的WSN數(shù)據(jù)融合隱私保護(hù)方案設(shè)計(jì)[J]. 通信學(xué)報(bào), 2014, 35(11): 154-161.
    Zhao Xiao-min, Liang Xue-li, Jiang Shuang-shuang, et al.. Design of secure privacy-preserving data aggregation scheme for wireless sensor network[J]. Journal on Communications, 2014, 35(11): 154-161.
    Sun H, Chen C, and Lin Y. RCDA: recoverable concealed data aggregation for data integrity in wireless sensor networks[J]. IEEE Transactions on Parallel and Distributed Systems, 2011, 23(4): 727-734.
    Ozdemir S and Xiao Y. Integrity protecting hierarchical concealed data aggregation for wireless sensor networks[J]. Computer Networks, 2011, 55(8): 1735-1746.
    Zhou Q, Yang G, and He L. A secure-enhanced data aggregation based on ECC in wireless sensor networks[J]. Sensors (Basel, Switzerland), 2014, 14(4): 6701-6721.
    Papadopoulos S, Kiayias A, and Papadias D. Exact in-network aggregation with integrity and confidentiality[J]. IEEE Transactions on Knowledge Data Engineering, 2012, 24(10): 1760-1773.
    Katz J and Lindell A. Aggregate message authentication codes[C]. Proceedings of the Cryptographers Track at the RSA Conference, San Francisco, CA, USA, 2008: 155-169.
    Rivest R, Adleman L, and Dertouzos M. Foundations of Secure Computation[M]. Academia Press, 1978: 169-179.
    Peter S, Westhoff D, and Castelluccia C. A survey on the encryption of convergecast traffic with in-network processing[J]. IEEE Transactions on Dependable and Secure Computing, 2010, 7(1): 20-34.
  • 加載中
計(jì)量
  • 文章訪問數(shù):  1454
  • HTML全文瀏覽量:  184
  • PDF下載量:  657
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  2015-02-05
  • 修回日期:  2015-08-25
  • 刊出日期:  2015-12-19

目錄

    /

    返回文章
    返回