[1]季田辉,杨庚. 无线传感器网络中安全数据融合方法研究[J].计算机技术与发展,2014,24(07):162-165.
 JI Tian-hui,YANG Geng. Research on Security of Data Aggregation in Wireless Sensor Networks[J].,2014,24(07):162-165.
点击复制

 无线传感器网络中安全数据融合方法研究()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
24
期数:
2014年07期
页码:
162-165
栏目:
安全与防范
出版日期:
2014-07-10

文章信息/Info

Title:
 Research on Security of Data Aggregation in Wireless Sensor Networks
文章编号:
1673-629X(2014)07-0162-04
作者:
 季田辉杨庚
 南京邮电大学 计算机学院
Author(s):
 JI Tian-huiYANG Geng
关键词:
 无线传感器网络数据融合同态验证码
Keywords:
 wireless sensor networkdata aggregationhomomorphic verification code
分类号:
TP301
文献标志码:
A
摘要:
 随着无线传感器网络应用的不断增加,很多应用都需要保证信息或数据的隐私性和完整性,这就对数据融合提出了更高的要求和新的挑战,因此设计一种兼顾数据机密性和完整性的数据融合算法就显得尤为重要。文中提出了一种基于同态加密对数据的安全性进行保护和基于同态验证码对数据的完整性进行保护的算法。同态加密可以对加密数据直接进行操作,同态验证码抗攻击性强,具有良好的完整性保护特性。同时算法依据数据融合的树结构本身的特征,减少了数据通信开销,计算复杂度低。理论分析和仿真结果显示了该方法的有效性。
Abstract:
 With the increasing application of wireless sensor networks,many applications need to guarantee the privacy and integrity of the information or data,the data fusion has been put forward higher requirements and new challenges,therefore,to design an data fusion algo-rithm with both data confidentiality and integrity is particularly important. It presents an algorithm for data security protection based on homomorphic encryption and to promise the data integrity based on homomorphic verification code. Homomorphic verficiation code of strong attack resisting,has good properties of integrity protection. At the same time,the algorithm based on tree structure data fusion it-self,reduces the data communication overhead with low computing complexity. Theoretical analysis and simulation results show the effec-tiveness of the proposed method.

相似文献/References:

[1]李雷 付东阳.基于分层模型的无线传感器网络分簇路由算法[J].计算机技术与发展,2010,(01):132.
 LI Lei,FU Dong-yang.Clustering Protocol Algorithm of Wireless Sensor Networks Based on Level Model[J].,2010,(07):132.
[2]魏烨嘉 王汝传[] 李伟伟 黄海平[] 孙力娟[].基于普适计算环境的三维空间RSSI位置感知研究[J].计算机技术与发展,2010,(04):183.
 WEI Ye-jia,WANG Ru-ehuan[],LI Wei-wei,et al.Research on RSSI- Based Location- Aware in Three- Dimensional Space for Pervasive Computing Environment[J].,2010,(07):183.
[3]邓黎黎 刘才兴.基于信任的无线传感器网络安全路由研究[J].计算机技术与发展,2010,(06):159.
 DENG Li-li,LIU Cai-xing.Research of Trust-Based Secure Routing Protocols for Wireless Sensor Networks[J].,2010,(07):159.
[4]杜鹏雷 吴晓 杨丽平 江涌.面向精准农业的感知节点传感器驱动与控制[J].计算机技术与发展,2010,(06):233.
 DU Peng-lei,WU Xiao,YANG Li-ping,et al.Drive and Control of Sensor Node Facing Precision Agriculture[J].,2010,(07):233.
[5]程佳 支小莉 大贝 晴俊.基于无线传感器网络和ICA的桥梁诊断系统[J].计算机技术与发展,2009,(06):1.
 CHENG Jia,ZHI Xiao-li,OGAI Harutoshi.A Bridge Diagnosis System Based on Wireless Sensor Network and Independent Component Analysis[J].,2009,(07):1.
[6]汪小龙[] 方潜生 葛运建 张伟林[] 周学海[].基于WSN的智能建筑综合控制系统研究[J].计算机技术与发展,2009,(07):48.
 WANG Xiao-long,FANG Qian-sheng,GE Yun-jian,et al.Research on Integrated- Control- System of Intelligent- Building Based on WSN[J].,2009,(07):48.
[7]户晓玲 曾建潮.基于微粒群模型的移动传感器网络部署研究[J].计算机技术与发展,2009,(10):81.
 HU Xiao-ling,ZENG Jian-chao.Deployment of Wireless Sensor Networks Mobile Nodes Based on Particle Swarm Optimization Model[J].,2009,(07):81.
[8]闫倩倩 许勇 夏海燕.一种ZigBee路由算法的分析与改进[J].计算机技术与发展,2009,(12):59.
 YAN Qian-qian,XU Yong,XIA Hai-yan.Analysis and Improvement of a Routing Algorithm in Wireless Sensor Network Based on ZigBee[J].,2009,(07):59.
[9]刘曙 刘林峰 陶军.一种基于蜂窝结构的改进GAF算法[J].计算机技术与发展,2009,(01):39.
 LIU Shu,LIU Lin-feng,TAO Jun.Improved GAF Algorithm with Hexagon- Based Virtual Infrastructure[J].,2009,(07):39.
[10]邓明 张国枢 陈蕴.一种基于ZigBee协议的矿井人员定位技术研究[J].计算机技术与发展,2009,(02):243.
 DENG Ming,ZHANG Guo-shu,CHEN Yun.Research on Positioning Technology of Mining Personnel Based upon ZigBee Protocol[J].,2009,(07):243.
[11]汪玉美,崔逊学,吴海兵,等. 基于多跳LEACH防御流量分析攻击算法研究[J].计算机技术与发展,2014,24(09):154.
 WANG Yu-mei,CUI Xun-xue,WU Hai-bing,et al. Research on Defense Traffic Analysis Attacks Algorithm Based on Multi-hop LEACH[J].,2014,24(07):154.
[12]张美燕[],蔡文郁[],周丽萍[]. 无线Zigbee传感网RSSI定位技术研究[J].计算机技术与发展,2014,24(10):238.
 ZHANG Mei-yan[],CAI Wen-yu[],ZHOU Li-ping[]. Research on Locating Technology of RSSI for Wireless Zigbee Sensor Networks[J].,2014,24(07):238.
[13]廖兴宇,汪伦杰. 基于UWB/AOA/TDOA的WSN节点三维定位算法研究[J].计算机技术与发展,2014,24(11):61.
 LIAO Xing-yu,WANG Lun-jie. Study on Three-dimensional Localization Algorithm in WSN Based on UWB/AOA/TDOA[J].,2014,24(07):61.
[14]刘爽,吴蒙. 基于IEEE 802.15.4c TinyOS平台的移植研究[J].计算机技术与发展,2014,24(11):114.
 LIU Shuang,WU Meng. Research on Porting TinyOS Platform Based on IEEE 802 . 15 . 4 c[J].,2014,24(07):114.
[15]张载龙[][],徐莉[]. 基于PMIPv6的移动性管理方案研究[J].计算机技术与发展,2014,24(11):190.
 ZHANG Zai-long[] [],XU Li[].Research on Mobility Management Scheme Based on PMIPv6[J].,2014,24(07):190.
[16]杨洋[],王秀芹[]. 基于能量衰减的增量式声源跟踪算法研究[J].计算机技术与发展,2014,24(12):41.
 YANG Yang[],WANG Xiu-qin[]. Research on Incremental Tracking Algorithm of Sound Source Based on Energy Attenuation[J].,2014,24(07):41.
[17]秦臻,管有庆. 无线传感器网络事务提交协议研究[J].计算机技术与发展,2015,25(02):108.
 Research on Transaction Commit Protocol for Wireless Sensor Networks. QIN Zhen,GUAN You-qing[J].,2015,25(07):108.
[18]宋杰,张昆. 基于k匿名假包注入的汇聚节点位置隐私保护[J].计算机技术与发展,2015,25(02):156.
 SONG Jie,ZHANG Kun. Research on Sink-location Privacy Protection Based on k-Anonymity and Fake Packet Injection[J].,2015,25(07):156.
[19]王东东,崔宝同. 基于非均匀分簇多跳通信的改进Q-Leach研究[J].计算机技术与发展,2015,25(02):202.
 WANG Dong-dong,CUI Bao-tong. Research on Modified Q-Leach Routing Protocol Based on Unequal Clustering and Multiple Hops Routing[J].,2015,25(07):202.
[20]王娜,霍英. 一种改进的无线传感器网络MCDS构造算法[J].计算机技术与发展,2015,25(03):122.
 WANG Na,HUO Ying. An Improved MCDS Constructing Algorithm on Wireless Sensor Network[J].,2015,25(07):122.

更新日期/Last Update: 2015-03-16