计算机科学 ›› 2014, Vol. 41 ›› Issue (12): 95-100.doi: 10.11896/j.issn.1002-137X.2014.12.021

• 信息安全 • 上一篇    下一篇

面向两层WSNs的高效随机调制隐私保护最值查询协议

刘泓晖,刘树波,刘梦君,蔡朝晖   

  1. 武汉大学计算机学院 武汉430072;武汉大学空天信息安全与可信计算教育部重点实验室B类 武汉430072;武汉大学计算机学院 武汉430072;武汉大学空天信息安全与可信计算教育部重点实验室B类 武汉430072;武汉大学计算机学院 武汉430072;武汉大学空天信息安全与可信计算教育部重点实验室B类 武汉430072;武汉大学计算机学院 武汉430072
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受国家973计划项目(2011CB302306),中央高校基本科研业务费专项资金(211-274230),国家自然科学基金(41371402),水利部“948”项目(201044),湖北省水利厅农村饮用水水资源远程监控项目资助

Efficient Random Modulation Privacy-preserving MAX/MIN Query Protocol in Two-tiered Wireless Sensor Networks

LIU Hong-hui,LIU Shu-bo,LIU Meng-jun and CAI Zhao-hui   

  • Online:2018-11-14 Published:2018-11-14

摘要: 无线传感器网络(WSNs)隐私保护一直是研究热点,其中包括对隐私保护最值查询的研究。针对隐私保护最值查询问题,首先利用随机数和数值变换,提出一种不泄露原始参数的数值比较方法,并通过该方法和密码理论,提出一种面向两层无线传感器网络的高效随机调制隐私保护最值查询协议(ERM-MQP)。传感节点使用随机数对采样数据进行调制产生隐私保护数据,在存储节点处查找隐私保护数据的最值,Sink节点恢复 隐私保护最值数据得到采样数据最值,完成最值查找。在整个查询过程中数据加密后传送。最后,对安全性和能耗进行了分析,并通过实验与现有的隐私保护最值查询协议进行能耗对比,证明了ERM-MQP协议是安全且高效的。

关键词: 两层无线传感器网络,隐私保护,随机调制,最值查询

Abstract: Privacy preservation is always a hot research area in wireless sensor networks (WSNs),which includes the privacy-preserving MAX/MIN Query Protocol.This paper proposed a numeric comparison method that will not leak the raw value first to address the problem of pricacy-preserving MAX/MIN query,which is based on random number and numerical map.With this numeric comparison method and cryptography,we proposed an efficient random modulation privacy preserving MAX/MIN query protocol (ERM-MQP) in two-tiered wireless sensor networks.In ERM-MQP,sensors modulate the sampled data with random number to compute the privacy-preserving data and the storage nodes search the privacy-preserving MAX/MIN value.The Sink sensor recovers the privacy-preserving MAX/MIN data and gets the MAX/MIN value of sampled data in the end.All data is encrypted before transmission on query process.Finally according to the result of security analysis and energy analysis,and comparing with existing method by experiment on energy consumption,the ERM-MQP is secure and needs less energy.

Key words: Two-tiered wireless sensor networks,Privacy preserving,Random modulation,MAX/MIN query

[1] Gnawali O,Jang K Y,Paek J,et al.The tenet architecture for tiered sensor networks[C]∥Proceedings of the 4th ACM Conference on Embedded Networked Sensor Systems.Boulder,Co-lorado,USA,2006:153-166
[2] Desnoyers P,Ganesan D,Shenoy P.TSAR:a two tier sensor storage architecture using inteval skip graphs[C]∥Proceedings of the 3rd ACM Conference on Embedded Networked Sensor Systems.San Diego,Calif,USA,2005:39-50
[3] 许建,杨庚,陈正宇,等.WSN 数据融合中的隐私保护技术研究[J].计算机工程,2012,38(15):134-138
[4] Sheng Bo,Li Qun.Verifiable privacy-preserving range query in two-tiered sensor networks[C]∥27th IEEE International Conference on Computer Communications.Phoenix,AZ,USA,2008:46-50
[5] Chen Fei,Liu Alex X.SafeQ:secure and efficient query processing in sensor networks[C]∥29th IEEE International Conference on Computer Communications.San Diego,CA,USA,2010:1-9
[6] 窦轶,黄海平,王汝传,等.两层无线传感器网络安全范围查询协议[J].计算机研究与发展,2013,0(6):1253-1266
[7] Shi Jing,Zhang Rui,Zhang Yan-chao.A spatiotemporal approach for secure range queries in tiered sensor networks[J].IEEE Transactions on Wireless Communications,2011,10(1):264-273
[8] Yao Yong-lei,Xiong Nai-xue,Park J H,et al.Privacy-preserving max/ min query in two-tiered wireless sensor networks[J].Computers & Mathematics with Applications,2013,65:1318-1325
[9] 戴华,秦小麟,刘亮,等.基于Z-O编码的两层WSNs隐私保护最值查询处理协议[J].电子与信息学报,2013,35(4):970-976
[10] Dai Hua,Yang Geng,Qin Xiao-lin.EMQP:An Energy-Efficient Privacy-Preserving MAX/MIN Query Processing in Tiered Wireless Sensor Networks[J].International Journal of Distributed Sensor Networks,2013(2013)
[11] Lin Hsiao-ying,Tzeng Wen-guey.An efficient solution to the millionaires’ problem based on homomorphic encryption[C]∥Proceedings of the 3rd International Conference on Applied Cryptography and Network Security.New York,NY,USA,2005:97-134
[12] 查俊,苏锦海,闫少阁,等.姚氏百万富翁问题的高效解决方案[J].计算机工程,2010,6(14):124-126
[13] Zhang Lan,Li Xiang-yang,Liu Yun-hao,et al.Verifiable Private Multi-party Computation:Ranging and Ranking[C]∥IEEE InFOCOM 2013.Turin Italy,2013:605-609
[14] 李顺东,王道顺.基于同态加密的高效多方保密计算[J].电子学报,2013,1(4):798-803
[15] 肖倩,罗守山,陈萍,等.半诚实模型下安全多方排序问题的研究[J].电子学报,2008,6(4):709-714
[16] 邱梅,罗守山,刘文,等.利用RSA密码体制解决安全多方多数据排序问题[J].电子学报,2009,37(5):1119-1123
[17] 刘文,王永滨.安全多方信息比较相等协议及其应用[J].电子学报,2012,40(5):871-876 (下转第128页)(上接第100页)
[18] Yao A.Protocols for secure computation [C]∥Proceeding of the 23th IEEE Symposium on Foundations of Computer Science.IEEE Computer Society Press,Los Alamitos,USA,1982:160-164
[19] 杨庚,王江涛,程宏兵,等.基于身份加密的无线传感器网络密钥分配方法[J].电子学报,2007,35(1):180-184
[20] 刘梦君,刘树波,刘泓晖,等.异构无线传感器网络动态混合密钥管理方案研究[J].山东大学学报:理学版,2012,7(11):67-73
[21] 郭萍,张宏,傅德胜,等.一种混合轻量型无线传感器网络公钥密码方案[J].计算机科学,2012,39(1):69-81
[22] Boneh D,Franklin M.Identity-based encryption from the Weilpairing [C]∥Advances in Cryptology,CRYPTO 2001,Lecture Notes in Computer Science.Berlin:Springer-Verlag,2001,2139:213-229
[23] Groat M M,Hey W,Forrest S.KIPDA:k-indistinguishable privacy-preserving data aggregation in wireless sensor networks[C]∥30th IEEE International Conference on Computer Communications.Shanghai,China,2011:2024-2032

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!