计算机科学 ›› 2014, Vol. 41 ›› Issue (12): 95-100.doi: 10.11896/j.issn.1002-137X.2014.12.021
刘泓晖,刘树波,刘梦君,蔡朝晖
LIU Hong-hui,LIU Shu-bo,LIU Meng-jun and CAI Zhao-hui
摘要: 无线传感器网络(WSNs)隐私保护一直是研究热点,其中包括对隐私保护最值查询的研究。针对隐私保护最值查询问题,首先利用随机数和数值变换,提出一种不泄露原始参数的数值比较方法,并通过该方法和密码理论,提出一种面向两层无线传感器网络的高效随机调制隐私保护最值查询协议(ERM-MQP)。传感节点使用随机数对采样数据进行调制产生隐私保护数据,在存储节点处查找隐私保护数据的最值,Sink节点恢复 隐私保护最值数据得到采样数据最值,完成最值查找。在整个查询过程中数据加密后传送。最后,对安全性和能耗进行了分析,并通过实验与现有的隐私保护最值查询协议进行能耗对比,证明了ERM-MQP协议是安全且高效的。
[1] Gnawali O,Jang K Y,Paek J,et al.The tenet architecture for tiered sensor networks[C]∥Proceedings of the 4th ACM Conference on Embedded Networked Sensor Systems.Boulder,Co-lorado,USA,2006:153-166 [2] Desnoyers P,Ganesan D,Shenoy P.TSAR:a two tier sensor storage architecture using inteval skip graphs[C]∥Proceedings of the 3rd ACM Conference on Embedded Networked Sensor Systems.San Diego,Calif,USA,2005:39-50 [3] 许建,杨庚,陈正宇,等.WSN 数据融合中的隐私保护技术研究[J].计算机工程,2012,38(15):134-138 [4] Sheng Bo,Li Qun.Verifiable privacy-preserving range query in two-tiered sensor networks[C]∥27th IEEE International Conference on Computer Communications.Phoenix,AZ,USA,2008:46-50 [5] Chen Fei,Liu Alex X.SafeQ:secure and efficient query processing in sensor networks[C]∥29th IEEE International Conference on Computer Communications.San Diego,CA,USA,2010:1-9 [6] 窦轶,黄海平,王汝传,等.两层无线传感器网络安全范围查询协议[J].计算机研究与发展,2013,0(6):1253-1266 [7] Shi Jing,Zhang Rui,Zhang Yan-chao.A spatiotemporal approach for secure range queries in tiered sensor networks[J].IEEE Transactions on Wireless Communications,2011,10(1):264-273 [8] Yao Yong-lei,Xiong Nai-xue,Park J H,et al.Privacy-preserving max/ min query in two-tiered wireless sensor networks[J].Computers & Mathematics with Applications,2013,65:1318-1325 [9] 戴华,秦小麟,刘亮,等.基于Z-O编码的两层WSNs隐私保护最值查询处理协议[J].电子与信息学报,2013,35(4):970-976 [10] Dai Hua,Yang Geng,Qin Xiao-lin.EMQP:An Energy-Efficient Privacy-Preserving MAX/MIN Query Processing in Tiered Wireless Sensor Networks[J].International Journal of Distributed Sensor Networks,2013(2013) [11] Lin Hsiao-ying,Tzeng Wen-guey.An efficient solution to the millionaires’ problem based on homomorphic encryption[C]∥Proceedings of the 3rd International Conference on Applied Cryptography and Network Security.New York,NY,USA,2005:97-134 [12] 查俊,苏锦海,闫少阁,等.姚氏百万富翁问题的高效解决方案[J].计算机工程,2010,6(14):124-126 [13] Zhang Lan,Li Xiang-yang,Liu Yun-hao,et al.Verifiable Private Multi-party Computation:Ranging and Ranking[C]∥IEEE InFOCOM 2013.Turin Italy,2013:605-609 [14] 李顺东,王道顺.基于同态加密的高效多方保密计算[J].电子学报,2013,1(4):798-803 [15] 肖倩,罗守山,陈萍,等.半诚实模型下安全多方排序问题的研究[J].电子学报,2008,6(4):709-714 [16] 邱梅,罗守山,刘文,等.利用RSA密码体制解决安全多方多数据排序问题[J].电子学报,2009,37(5):1119-1123 [17] 刘文,王永滨.安全多方信息比较相等协议及其应用[J].电子学报,2012,40(5):871-876 (下转第128页)(上接第100页) [18] Yao A.Protocols for secure computation [C]∥Proceeding of the 23th IEEE Symposium on Foundations of Computer Science.IEEE Computer Society Press,Los Alamitos,USA,1982:160-164 [19] 杨庚,王江涛,程宏兵,等.基于身份加密的无线传感器网络密钥分配方法[J].电子学报,2007,35(1):180-184 [20] 刘梦君,刘树波,刘泓晖,等.异构无线传感器网络动态混合密钥管理方案研究[J].山东大学学报:理学版,2012,7(11):67-73 [21] 郭萍,张宏,傅德胜,等.一种混合轻量型无线传感器网络公钥密码方案[J].计算机科学,2012,39(1):69-81 [22] Boneh D,Franklin M.Identity-based encryption from the Weilpairing [C]∥Advances in Cryptology,CRYPTO 2001,Lecture Notes in Computer Science.Berlin:Springer-Verlag,2001,2139:213-229 [23] Groat M M,Hey W,Forrest S.KIPDA:k-indistinguishable privacy-preserving data aggregation in wireless sensor networks[C]∥30th IEEE International Conference on Computer Communications.Shanghai,China,2011:2024-2032 |
No related articles found! |
|