计算机科学 ›› 2018, Vol. 45 ›› Issue (5): 102-107.doi: 10.11896/j.issn.1002-137X.2018.05.018

• 信息安全 • 上一篇    下一篇

一种面向体域网的数据安全混合传输机制

汪卫星   

  1. 重庆大学机械传动国家重点实验室 重庆400030
  • 出版日期:2018-05-15 发布日期:2018-07-25
  • 基金资助:
    本文受广西高校中青年教师基础能力提升项目(KY2016YB755)资助

Data Security Mix Transmission Mechanism in Body Area Network

WANG Wei-xing   

  • Online:2018-05-15 Published:2018-07-25

摘要: 无线体域网作为一种新型网络,被广泛应用到健康医疗、紧急救护等领域。然而,无线体域网收集到的数据大部分都是与用户个人有关的信息,在实际的应用部署过程中必然会面临严重的敏感隐私数据泄露或者被恶意篡改的风险。为了保证体域网环境下用户数据的隐私安全性,提出了一种数据安全混合传输机制,即基于多环模式的K匿名混合传输算法(AMT-ML),其主要思想是对通信节点进行网络划分,将其分成若干个通信环网络,并将K匿名方案应用到层次模型的感知层与传输层,通过进行多次K匿名处理来保证每一层的用户数据在概率上是相对安全的。实验结果显示,AMT-ML算法的隐私保护性优于基于单环模式的K匿名混合传输算法(AMT-SL),二层网络中多环模式的通信距离也小于单环模式的通信距离。

关键词: 无线体域网,数据安全,数据传输

Abstract: Wireless body area network,as a new type of network,is widely used in health care,emergency rescue and other fields.However,the data collected by wireless body area network are mostly related to user’s personal information.In the actual application of the deployment process,it is bound to face serious sensitive privacy data leakage or malicious tampering risks.In order to protect the privacy security of user data in the body area network environment,this paper proposed a data security mix transmission mechanism,which is a K-anonymous mix transmission algorithm based on single-loop model (AMT-ML).The main idea is to divide the communication nodes into several communication loop networks,and apply the K anonymous scheme to the perceptual layer and the transport layer of hierarchical model.In order to ensure that the user data in each layer are relatively safe,this paper used multiple K anonymous processing.The experimental results show that the privacy protection of AMT-ML is superior to K-anonymous mix transmission algorithm based on single-loop model (AMT-SL) algorithm,and the communication distance of the multi-loop mode in the two layer network is less than that of the single-loop mode.

Key words: Wireless body area network,Data security,Data transmission

[1] MAINANWAL V,GUPTA M,UPADHAYAY S K.A survey on wireless body area network:Security technology and its design methodology issue[C]∥International Conference on Innovations in Information,Embedded and Communication Systems.Coimbatore:IEEE Press,2015:1-5.
[2] GONG J B,WANG R,CUI L.Research Ddvances and Challenges of body Sensor network[J].Journal of Computer Research and Development,2010,7(5):737-753.(in Chinese) 宫继兵,王睿,崔莉.体域网BSN的研究进展及面临的挑战[J].计算机研究与发展,2010,7(5):737-753.
[3] LIU L,XUE X Q,LUO X L.Architecture and Challenges ofWireless Body Area Network[J].Computer Knowledge and Technology,2012,8(29):6918-6920.(in Chinese) 刘璐,薛秀芹,罗先露.无线体域网的体系结构及面临的挑战[J].电脑知识与技术,2012,8(29):6918-6920.
[4] ZHOU J,CAO Z,DONG X,et al.4S:A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks[J].Information Sciences,2015,314(2):255-276.
[5] VENKATASUBRAMANIAN K K,BANERJEE A,GUPTA S K S.PSKA:usable and secure key agreement scheme for body area networks[J].Information Technology in Biomedicine,2010,14(1):60-68.
[6] LI X,IBRAHIM M H,KUMARI S,et al.Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks[J].Computer Networks,2017,115(1):1-15.
[7] GALUBA W,PAPADIMITRATOS P,P OTURALSKI M,et al.Castor:scalable secure routing for ad hoc networks[C]∥Proceedings of IEEE INFOCOM.San Diego:IEEE Press,2010:1-9.
[8] DEFRAWY K E,TSUDIK G.Privacy-preserving location-based on-demand routing in MANETs[J].Selected Areas in Communications,2011,29(10):1926-1934.
[9] JARADAT T,BENHADDOU D,BALAKRISHNAN M,et al.Energy efficient cross-layer routing protocol in Wireless Sensor Networks based on fuzzy logic[C]∥Wireless Communications and Mobile Computing Conference.Sardinia:IEEE Press,2013:177-182.
[10] WANG H,YANG G,XU J,et al.A reliable data transmission protocol based on multipath routing for wireless sensor networks[J].Sensor Letters,2016,14(9):923-927.
[11] QUANG P T A,KIM D S.Clustering algorithm of hierarchical structures in large-scale wireless sensor and actuator networks[J].Journal of Communications & Networks,2015,17(5):473-481.
[12] REN J,ZHANG Y,ZHANG K,et al.Adaptive and channel-aware detection of selective forwarding attacks in wireless sensor networks[J].IEEE Transactions on Wireless Communications,2016,15(5):3718-3731.
[13] SHARMILEE K M,MUKESH R,DAMODARAM A,et al.Secure WBAN using rule-based IDS with biometrics and MAC authentication[C]∥International Conference on E-Health Networking.Singapore:IEEE Press,2008:102-107.
[14] SHAO M,YANG Y,ZHU S C,et al.Towards statisticallystrong source anonymity for sensor networks[C]∥The 27th Conference on Computer Communications(INFOCOM 2008).Phoenix:IEEE Press,2008:51-55.
[15] CHEN S L.A Power-Efficient Adaptive Fuzzy Resolution Control System for Wireless Body Sensor Networks[J].Access IEEE,2015,3:743-751.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!