计算机科学 ›› 2023, Vol. 50 ›› Issue (8): 333-341.doi: 10.11896/jsjkx.220800089

• 信息安全 • 上一篇    下一篇

基于可逆数字水印的无线传感器网络可恢复数据聚合协议

高光勇1,2,3, 韩婷婷1,3, 夏志华4   

  1. 1 南京信息工程大学数字取证教育部工程研究中心 南京 210044
    2 九江学院计算机与大数据科学学院 江西 九江 332005
    3 南京信息工程大学计算机学院、软件学院、网络空间安全学院 南京 210044
    4 暨南大学网络空间安全学院 广州 510632
  • 收稿日期:2022-08-09 修回日期:2022-11-22 出版日期:2023-08-15 发布日期:2023-08-02
  • 通讯作者: 夏志华(xia_zhihua@163.com )
  • 作者简介:(gaoguangyong@163.com)
  • 基金资助:
    江西省自然科学基金重点项目(20192ACBL20031);国家自然科学基金(61662039,62122032,U1936118);国家重点研发计划(2020YFB1005600);南京信息工程大学人才引进启动基金(2019r070)

Recoverable Data Aggregation Protocol for Wireless Sensor Networks Based on Reversible DigitalWatermarking

GAO Guangyong1,2,3, HAN Tingting1,3, XIA Zhihua4   

  1. 1 Engineering Research Center of Digital Forensics, Ministry of Education, Nanjing University of Information Science & Technology, Nanjing 210044, China
    2 School of Computer and Big Data Science,Jiujiang University,Jiujiang,Jiangxi 332005,China
    3 School of Computer Science,Nanjing University of Information Science & Technology,Nanjing 210044,China
    4 College of Cyber Security,Jinan University,Guangzhou 510632,China
  • Received:2022-08-09 Revised:2022-11-22 Online:2023-08-15 Published:2023-08-02
  • About author:GAO Guangyong,born in 1973,Ph.D,professor,is a senior member of China Computer Federation.His main research interests include reversible data hiding,computer networks security,multimedia information security,and digital image processing.
    XIA Zhihua,born in 1983,Ph.D,professor,Ph.D supervisor,is a senior member of China Computer Federation.His main research interests include digital forensic and encrypted image proces-sing.
  • Supported by:
    Key Program of the Natural Science Foundation of Jiangxi Province,China(20192ACBL20031),National Natural Science Foundation of China(61662039,62122032,U1936118),National Key Research and Development Program of China(2020YFB1005600) and Startup Foundation for Introducing Talent of Nanjing University of Information Science and Technology(NUIST)(2019r070).

摘要: 针对无线传感器网络数据安全认证协议的高能耗与传感器节点资源受限的对立问题,文中提出了一种基于可逆数字水印的聚合协议。一方面,在感知节点处,将水印嵌入到感知数据中,对水印数据进行基于椭圆曲线的同态加密,以此保证数据在传输过程中的私密性;在簇头节点处,对接收的数据只进行聚合和转发操作,以此减小网络通信开销;在基站处,通过提取水印对数据进行完整性认证。另一方面,该协议提出了一种基于环的聚合树,从而降低节点的传输能耗,延长网络生命周期。通过理论分析证明了所提协议将水印技术与数据聚合技术进行了更好的结合,具有较好的安全性和较低的计算开销,且能实现感知数据的完整性认证。此外,与同类算法的对比实验表明该协议在通信开销和时延方面都具有一定的优势。

关键词: 可逆数字水印, 完整性验证, 数据聚合, 同态加密

Abstract: Aiming at the opposition between the high energy consumption of data security authentication protocol and the resource limitation of sensor nodes in wireless sensor networks,this paper proposes an aggregation protocol based on reversible di-gital watermarking.On the one hand,at the sensing node,the watermarking is embedded into the sensing data,and the elliptic curve is used to encrypt the watermarked data homomorphically,so as to ensure the privacy of the data in the transmission process.At the cluster head node,the received data are only performed aggregation and forwarding operations,so as to reduce network communication overhead.At the base station,the watermark is extracted to authenticate the integrity of data.On the other hand,this scheme proposes an aggregation tree protocol based on clustering protocol,which can reduce the transmission energy consumption of nodes and prolong the network lifetime.Theoretical analysis proves that the proposed protocol combines watermarking technology and data aggregation technology better,has good security and lower computation cost,and can realize the integrity authentication of perception data.In addition,experimental results show that,compared with the latest similar algorithms,the proposed protocol has certain advantages in communication cost and delay.

Key words: Reversible digital watermarking, Integrity verification, Data aggregation, Homomorphic encryption

中图分类号: 

  • TP393
[1]JAN S R U,KHAN R,JAN M A.An energy-efficient data aggregation approach for cluster-based wireless sensor networks[J].Annals of Telecommunications,2021,76(5):321-329.
[2]MANDEEP K,AMIT M.Data aggregation algorithms for wireless sensor network:A review[J].Ad Hoc Networks,2020,100(3):102083.
[3]SANKARALINGAM S K,NARMADHA A S.Energy aware decision stump linear programming boosting node classification based data aggregation in WSN[J].Computer Communications,2020,155:133-142.
[4]ADAM M S,ANIST M H,ALI I.Object tracking sensor networks in smart cities:Taxonomy,architecture,applications,research challenges and future directions[J].Future Generation Computer Systems,2020,107:909-923.
[5]GOMATHI S,GOPALA K C.Malicious node detection in wireless sensor networks using an efficient secure data aggregation protocol[J].Wireless Personal Communications,2020,113(4):1775-1790.
[6]ADNAN M,YANG L,AHMAD T,et al.An unequally clus-tered multi-hop routing protocol based on fuzzy logic for wireless sensor networks[J].IEEE Access,2021,9:38531-38545.
[7]JURADO-LASSO F F,CLARKE K,CADAVID A N,et al.Energy-aware routing for software-defined multihop wireless sensor networks[J].IEEE Sensors Journal,2021,21(8):10174-10182.
[8]LIU X,YU J,LI F,et al.Data aggregation in wireless sensor networks:from the perspective of security[J].IEEE Internet of Things Journal,2019,7(7):6495-6513.
[9]RAWAT P,CHAUHAN S.A Novel Cluster Head Selection and Data Aggregation Protocol for Heterogeneous Wireless Sensor Network[J].Arabian Journal for Science and Engineering,2022,47:1971-1986.
[10]ZHANG J,HU P,XIE F,et al.An energy efficient and reliable in-network data aggregation scheme for WSN[J].IEEE Access,2018,6:71857-71870.
[11]HE W,LIU X,NGUYEN H,et al.PDA:Privacy-preservingdata aggregation in wireless sensor networks[C]//26th IEEE International Conference on Computer Communications(IEEE INFOCOM 2007).IEEE,2007:2045-2053.
[12]HE W,LIU X,NGUYEN H V,et al.PDA:privacy-preserving data aggregation for information collection[J].ACM Transactions on Sensor Networks(TOSN),2011,8(1):1-22.
[13]FANG W,WEN X Z,XU J,et al.CSDA:a novel cluster-based secure data aggregation scheme for WSNs[J].Cluster Computing,2019,22(3):5233-5244.
[14]HUA P,LIU X,YU J,et al.Energy-efficient adaptive slice-based secure data aggregation scheme in WSN[J].Procedia Computer Science,2018,129:188-193.
[15]ZHANG X,LIU X,YU J,et al.Energy-efficient privacy preserving data aggregation protocols based on slicing[C]//2019 International Conference on Internet of Things(iThings) and IEEE Green Computing and Communications(GreenCom) and IEEE Cyber,Physical and Social Computing(CPSCom) and IEEE Smart Data(SmartData).IEEE,2019:546-551.
[16]ZHOU L,GE C,HU S,et al.Energy-efficient and privacy-preserving data aggregation algorithm for wireless sensor networks[J].IEEE Internet of Things Journal,2019,7(5):3948-3957.
[17]HE W,LIU X,NGUYEN H,et al.A cluster-based protocol to enforce integrity and preserve privacy in data aggregation[C]//2009 29th IEEE International Conference on Distributed Computing Systems Workshops.IEEE,2009:14-19.
[18]WANG T,QIN X,DING Y,et al.Privacy-preserving and energy-efficient continuous data aggregation algorithm in wireless sensor networks[J].Wireless Personal Communications,2018,98(1):665-684.
[19]NELS S N,SINGH J.Security-aware authorization and verification based data aggregation model for wireless sensor networks[J].International Journal of Numerical Modelling:Electronic Networks,Devices and Fields,2021,34(3):e2844.
[20]CHEN C M,LIN Y H,LIN Y C,et al.RCDA:Recoverable concealed data aggregation for data integrity in wireless sensor networks[J].IEEE Transactions on parallel and distributed systems,2011,23(4):727-734.
[21]YANG L,DING C,WU M.RPIDA:Recoverable Privacy-preserving Integrity-assured Data Aggregation Scheme for Wireless Sensor Networks[J].KSII Transactions on Internet and Information Systems(TIIS),2015,9(12):5189-5208.
[22]SHEN L,MA J,LIU X,et al.A secure and efficient id-based aggregate signature scheme for wireless sensor networks[J].IEEE Internet of Things Journal,2016,4(2):546-554.
[23] MIN W,RUIXIANG C,SHUNBIN H.A Secure Data Aggregation Approach in Hierarchical Wireless Sensor Networks[C]//the 10th International Conference.ACM,2016:1-7.
[24]ANITA D D,ROSLIN S E.Data validation and integrity verifi-cation for trust based data aggregation protocol in WSN[J].Microprocessors and Microsystems,2021,80(1):1-6.
[25]KUMAR S,SINGH B K,PUNDIR S,et al.Role of Digital Watermarking in Wireless Sensor Network[J].Recent Advances in Computer Science and Communications(Formerly:Recent Patents on Computer Science),2022,15(2):215-228.
[26]WAZIRALI R,AHMAD R,AL-AMAYREH A,et al.Securewatermarking schemes and their approaches in the iot technology:an overview[J].Electronics,2021,10(14):1744.
[27]SHI X,XIAO D.A reversible watermarking authenticationscheme for wireless sensor networks[J].Information Sciences,2013,240:173-183.
[28]ALROMIH A,AL-RODHAAN M,TIAN Y.A RandomizedWatermarking Technique for Detecting Malicious Data Injection Attacks in Heterogeneous Wireless Sensor Networks for Internet of Things Applications[J].Sensors,2018,18(12):4346.
[29]JIANG W X,ZHANG Z X,WU J J.Reversible digital water-marking-based protocol for data integrity in wireless sensor network[J].Journal of Communication,2018,39(3):118-127.
[30]QING L,ZHU Q X,WANG M W.Design of a distributed energy-efficient clustering algorithm for heterogeneous wireless sensor networks[J].Computer Communications,2006,29(12):2230-2237.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!