计算机科学 ›› 2023, Vol. 50 ›› Issue (8): 333-341.doi: 10.11896/jsjkx.220800089
高光勇1,2,3, 韩婷婷1,3, 夏志华4
GAO Guangyong1,2,3, HAN Tingting1,3, XIA Zhihua4
摘要: 针对无线传感器网络数据安全认证协议的高能耗与传感器节点资源受限的对立问题,文中提出了一种基于可逆数字水印的聚合协议。一方面,在感知节点处,将水印嵌入到感知数据中,对水印数据进行基于椭圆曲线的同态加密,以此保证数据在传输过程中的私密性;在簇头节点处,对接收的数据只进行聚合和转发操作,以此减小网络通信开销;在基站处,通过提取水印对数据进行完整性认证。另一方面,该协议提出了一种基于环的聚合树,从而降低节点的传输能耗,延长网络生命周期。通过理论分析证明了所提协议将水印技术与数据聚合技术进行了更好的结合,具有较好的安全性和较低的计算开销,且能实现感知数据的完整性认证。此外,与同类算法的对比实验表明该协议在通信开销和时延方面都具有一定的优势。
中图分类号:
[1]JAN S R U,KHAN R,JAN M A.An energy-efficient data aggregation approach for cluster-based wireless sensor networks[J].Annals of Telecommunications,2021,76(5):321-329. [2]MANDEEP K,AMIT M.Data aggregation algorithms for wireless sensor network:A review[J].Ad Hoc Networks,2020,100(3):102083. [3]SANKARALINGAM S K,NARMADHA A S.Energy aware decision stump linear programming boosting node classification based data aggregation in WSN[J].Computer Communications,2020,155:133-142. [4]ADAM M S,ANIST M H,ALI I.Object tracking sensor networks in smart cities:Taxonomy,architecture,applications,research challenges and future directions[J].Future Generation Computer Systems,2020,107:909-923. [5]GOMATHI S,GOPALA K C.Malicious node detection in wireless sensor networks using an efficient secure data aggregation protocol[J].Wireless Personal Communications,2020,113(4):1775-1790. [6]ADNAN M,YANG L,AHMAD T,et al.An unequally clus-tered multi-hop routing protocol based on fuzzy logic for wireless sensor networks[J].IEEE Access,2021,9:38531-38545. [7]JURADO-LASSO F F,CLARKE K,CADAVID A N,et al.Energy-aware routing for software-defined multihop wireless sensor networks[J].IEEE Sensors Journal,2021,21(8):10174-10182. [8]LIU X,YU J,LI F,et al.Data aggregation in wireless sensor networks:from the perspective of security[J].IEEE Internet of Things Journal,2019,7(7):6495-6513. [9]RAWAT P,CHAUHAN S.A Novel Cluster Head Selection and Data Aggregation Protocol for Heterogeneous Wireless Sensor Network[J].Arabian Journal for Science and Engineering,2022,47:1971-1986. [10]ZHANG J,HU P,XIE F,et al.An energy efficient and reliable in-network data aggregation scheme for WSN[J].IEEE Access,2018,6:71857-71870. [11]HE W,LIU X,NGUYEN H,et al.PDA:Privacy-preservingdata aggregation in wireless sensor networks[C]//26th IEEE International Conference on Computer Communications(IEEE INFOCOM 2007).IEEE,2007:2045-2053. [12]HE W,LIU X,NGUYEN H V,et al.PDA:privacy-preserving data aggregation for information collection[J].ACM Transactions on Sensor Networks(TOSN),2011,8(1):1-22. [13]FANG W,WEN X Z,XU J,et al.CSDA:a novel cluster-based secure data aggregation scheme for WSNs[J].Cluster Computing,2019,22(3):5233-5244. [14]HUA P,LIU X,YU J,et al.Energy-efficient adaptive slice-based secure data aggregation scheme in WSN[J].Procedia Computer Science,2018,129:188-193. [15]ZHANG X,LIU X,YU J,et al.Energy-efficient privacy preserving data aggregation protocols based on slicing[C]//2019 International Conference on Internet of Things(iThings) and IEEE Green Computing and Communications(GreenCom) and IEEE Cyber,Physical and Social Computing(CPSCom) and IEEE Smart Data(SmartData).IEEE,2019:546-551. [16]ZHOU L,GE C,HU S,et al.Energy-efficient and privacy-preserving data aggregation algorithm for wireless sensor networks[J].IEEE Internet of Things Journal,2019,7(5):3948-3957. [17]HE W,LIU X,NGUYEN H,et al.A cluster-based protocol to enforce integrity and preserve privacy in data aggregation[C]//2009 29th IEEE International Conference on Distributed Computing Systems Workshops.IEEE,2009:14-19. [18]WANG T,QIN X,DING Y,et al.Privacy-preserving and energy-efficient continuous data aggregation algorithm in wireless sensor networks[J].Wireless Personal Communications,2018,98(1):665-684. [19]NELS S N,SINGH J.Security-aware authorization and verification based data aggregation model for wireless sensor networks[J].International Journal of Numerical Modelling:Electronic Networks,Devices and Fields,2021,34(3):e2844. [20]CHEN C M,LIN Y H,LIN Y C,et al.RCDA:Recoverable concealed data aggregation for data integrity in wireless sensor networks[J].IEEE Transactions on parallel and distributed systems,2011,23(4):727-734. [21]YANG L,DING C,WU M.RPIDA:Recoverable Privacy-preserving Integrity-assured Data Aggregation Scheme for Wireless Sensor Networks[J].KSII Transactions on Internet and Information Systems(TIIS),2015,9(12):5189-5208. [22]SHEN L,MA J,LIU X,et al.A secure and efficient id-based aggregate signature scheme for wireless sensor networks[J].IEEE Internet of Things Journal,2016,4(2):546-554. [23] MIN W,RUIXIANG C,SHUNBIN H.A Secure Data Aggregation Approach in Hierarchical Wireless Sensor Networks[C]//the 10th International Conference.ACM,2016:1-7. [24]ANITA D D,ROSLIN S E.Data validation and integrity verifi-cation for trust based data aggregation protocol in WSN[J].Microprocessors and Microsystems,2021,80(1):1-6. [25]KUMAR S,SINGH B K,PUNDIR S,et al.Role of Digital Watermarking in Wireless Sensor Network[J].Recent Advances in Computer Science and Communications(Formerly:Recent Patents on Computer Science),2022,15(2):215-228. [26]WAZIRALI R,AHMAD R,AL-AMAYREH A,et al.Securewatermarking schemes and their approaches in the iot technology:an overview[J].Electronics,2021,10(14):1744. [27]SHI X,XIAO D.A reversible watermarking authenticationscheme for wireless sensor networks[J].Information Sciences,2013,240:173-183. [28]ALROMIH A,AL-RODHAAN M,TIAN Y.A RandomizedWatermarking Technique for Detecting Malicious Data Injection Attacks in Heterogeneous Wireless Sensor Networks for Internet of Things Applications[J].Sensors,2018,18(12):4346. [29]JIANG W X,ZHANG Z X,WU J J.Reversible digital water-marking-based protocol for data integrity in wireless sensor network[J].Journal of Communication,2018,39(3):118-127. [30]QING L,ZHU Q X,WANG M W.Design of a distributed energy-efficient clustering algorithm for heterogeneous wireless sensor networks[J].Computer Communications,2006,29(12):2230-2237. |
|