计算机科学 ›› 2013, Vol. 40 ›› Issue (Z6): 311-314.

• 信息安全 • 上一篇    下一篇

基于复数的隐私保护数据融合方案

曹晓梅,刘大伟   

  1. 南京邮电大学计算机学院 南京210003;南京邮电大学计算机学院 南京210003
  • 出版日期:2018-11-16 发布日期:2018-11-16

Complex Number-based Privacy Data Aggregation

CAO Xiao-mei and LIU Da-wei   

  • Online:2018-11-16 Published:2018-11-16

摘要: 致力于如何实现无线传感器网络的安全数据融合,提出了一种基于复数的隐私保护数据融合方案CNPD(Complex Number-based Privacy Data Aggregation)。CNPD方案中,传感器节点在采集到数据之后,利用自身的私有数据形成复数形式的自定义数据来隐藏和融合敏感数据。即使隐私数据被攻击者窃听或解密,该方案也可以防止它们恢复出敏感信息,从而有效地保护了用户隐私数据的安全。通过理论分析和仿真实验表明:与PDA相比,CNPD在通信开销以及安全方面更加高效。

关键词: 无线传感器网络,数据融合,复数,数据安全

Abstract: The scheme is committed to realize the security of data aggregation,and we proposed an secure data aggregation scheme CNPD based on in wireless sensor networks.CNPD scheme applies its own private data to form a plural custom data to hide sensitive data.Even if the private data being eavesdropped or decrypted by the attacker,this method can prevent them to resuming the sensitive information,so there is an effective protection of user privacy data security.The theoretical analysis and simulation experiments finally show that CNPD is more efficient than PDA in terms of communication overhead and security.

Key words: Wireless sensor networks,Data aggregation,Complex number,Data security

[1] 孙利民,等.无线传感器网络[M].北京:清华大学出版社,2005
[2] Culler D,Estrin D,Srivastava M.Overview of Sensor Networks[J].IEEE Computer Society Press,2004,7(8):41-49
[3] 康健,左宪章,唐力伟,等.无线传感器网络数据融合技术[J].计算机科学,2010,7(4):31-35
[4] 张鹏,喻建平,刘宏伟.传感器网络安全数据融合[J].计算机科学,2011,4(8):106-108
[5] Dong Xiao-mei,Li Shan-shan.A Secure Data Aggregation Ap-proach Based on Monitoring in Wireless Sensor Networks[J].IEEE Computer Society,2011,10(9):122-129
[6] Chen Chien-ming,Lin Yue-Hsun,Lin Ya-Ching,et al.RCDA:Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks[J].IEEE Computer Society,2012,23(4):727-734
[7] 黎为.无线传感器网络数据融合安全方案的研究[D].长沙:湖南大学,2009
[8] Girao J,Westhoff D,Schneider M.CDA:Concealed Data Aggregation for Reverse Multicast Traffic in Wireless Sensor Networks[C]∥Proc of IEEE International Conference on Communications.Washington:IEEE Computer Society Press,2005:3044-3049
[9] Ferrer J D.A Provably Secure Additive and Multiplicative Privacy Homomorphism[C]∥Proc of the 5th International Confe-rence on Information Security.London:Springer-Verlag Press,2002:471-483
[10] Castelluccia C,Mykletun E,Tsudik G.Efficient Aggregation of Encrypted Data in Wireless Sensor Networks[C]∥Proc.of the Second Annual International Conference on Mobile and Ubiquitous Systems:Networking and Services.2005:109-117
[11] Mykletun E,Girao J,Westhoff D.Public Key Based Cryptos-chemes for Data Concealment in Wireless Sensor Networks[C]∥Proc of IEEE International Conference on Communications.New York:IEEE Communications Society Press,2006:2288-2295
[12] He W B,Liu X,Nguyen H.Pda:Privacy-preserving Data Aggregation in Wireless Sensor Networks[C]∥Proc of 26th IEEE International Conference on Computer Communications.Washington:IEEE Computer Society Press,2007:2045-2053
[13] Li H,Lin K,Li K.Energy-efficient and High-Accuracy SecureData Aggregation in Wireless Sensor Networks[J].Computer Communication,2011,34:591-597
[14] 杨庚,王安琪,等.一种低能耗的数据融合隐私保护算法[J].计算机学报,2011,34(5):792-800
[15] Madden,Samuel R,Franklin,et al.TAG:a Tiny Aggregation Service for Ad Hoc Sensor Networks[J].OSDI,2002,36(SI)
[16] Madden,Franklin,Hellerstein,et al.TinyDB:an AcquisitionalQuery Processing System for Sensor Networks[J].ACM Transactions on Database Systems,2004,30(1):122-173
[17] Zitterbart M.An Efficient Key Establishment Scheme for Secure Aggregating Sensor Networks[C]∥Proceedings of the 2006ACM Symposium on Information,Computer and Communications Security.March 2006:303-310

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!