Computer Science ›› 2016, Vol. 43 ›› Issue (Z6): 353-356.doi: 10.11896/j.issn.1002-137X.2016.6A.084

Previous Articles     Next Articles

Integrity-checking Security Data Aggregation Protocol

LIU Huai-jin, CHEN Yong-hong, TIAN Hui, WANG Tian and CAI Yi-qiao   

  • Online:2018-11-14 Published:2018-11-14

Abstract: In wireless sensor network (WSN),how to aggregate data transmission and protect data privacy and integrity is an important challenge in current Internet of things applications.Ozdemir put forward PRDA (Polynomial Regression-based Secure Data Aggregation) protocol based on clustering and properties by using Polynomial of aggregated data privacy protection,but it is unable to validate data integrity.Because aggregated data of PRDA agreement may have been tampered with or counterfeit,this paper proposed a security data aggregation protocol called iPRDA which can detect the data integrity.It uses polynomial functions and data perturbation technology to protect data privacy,and detects data integrity using the link between the data features in base stations.Experiments show that this scheme under the condition of not affecting the data confidentiality,data integrity can be test effectively.

Key words: Polynomial regression,Data aggregation,Privacy protection,Data integrity

[1] Ozdemir S,Xiao Y.Secure data aggregation in wireless sensor networks:A comprehensive overview[J].Computer Networks,2009,53(12):2022-2037
[2] Wang G,Cao J,Wang H,et al.Polynomial regression for data gathering in environmental monitoring applications[C]∥Global Telecommunications Conference,2007(GLOBECOM’07).IEEE,2007:1307-1311
[3] Madden S,Franklin M J,Hellerstein J M,et al.TAG:A tiny aggregation service for ad-hoc sensor networks[J].ACM SIGOPS Operating Systems Review,2002,36(SI):131-146
[4] He W,Liu X,Nguyen H,et al.Pda:Privacy-preserving data aggregation in wireless sensor networks[C]∥26th IEEE International Conference on Computer Communications INFOCOM 2007.IEEE,2007:2045-2053
[5] Westhoff D,Girao J,Acharya M.Concealed data aggregation for reverse multicast traffic in sensor networks:Encryption,key distribution,and routing adaptation[J].IEEE Transactions on Mobile Computing,2006,5(10):1417-1431
[6] Ozdemir S,Xiao Y.Polynomial regression based secure data aggregation for wireless sensor networks[C]∥2011 IEEE Global Telecommunications Conference (GLOBECOM 2011).IEEE,2011:1-5
[7] Bista R,Yoo H K,Chang J W.A new sensitive data aggregation scheme for protecting integrity in wireless sensor networks[C]∥2010 IEEE 10th International Conference on Computer and Information Technology (CIT).IEEE,2010:2463-2470
[8] 周强,杨庚,李森,等.一种可检测数据完整性的隐私数据融合算法[J].电子与信息学报,2013,35(6):1277-1283
[9] Seetharam D,Rhee S.An efficient pseudo random numbergenerator for low-power sensor networks [wireless networks[C]∥29th Annual IEEE International Conference on Local Computer Networks,2004.IEEE,2004:560-562
[10] Ozdemir S.Secure Load Balancing via Hierarchical Data Aggregation in Heterogeneous Sensor Networks[J].J.Inf.Sci.Eng.,2009,25(6):1691-1705
[11] He W,Liu X,Nguyen H,et al.A cluster-based protocol to enforce integrity and preserve privacy in data aggregation[C]∥29th IEEE International Conference on Distributed Computing Systems Workshops,2009(ICDCS Workshops’09).IEEE,2009:14-19
[12] Du W,Deng J,Han Y S,et al.A pairwise key predistributionscheme for wireless sensor networks[J].ACM Transactions on Information and System Security (TISSEC),2005,8(2):228-258
[13] Eschenauer L,Gligor V D.A key-management scheme for distributed sensor networks[C]∥Proceedings of the 9th ACM Conference on Computer and Communications Security.ACM,2002:41-47
[14] Heinzelman W R,Chandrakasan A,Balakrishnan H.Energy-efficient communication protocol for wireless microsensor networks[C]∥Proceedings of the 33rd annual Hawaii international conference on System sciences,2000.IEEE,2000:10
[15] Hu L,Evans D.Secure aggregation for wireless networks [C]∥2003 Symposium on Applications and the Internet Workshops,2003.IEEE,2003:384-391
[16] Mlaih E,Aly S.Secure hop-by-hop aggregation of end-to-end concealed data in wireless sensor networks[C]∥INFOCOM Workshops 2008.IEEE,2008:1-6

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!