计算机科学 ›› 2016, Vol. 43 ›› Issue (Z6): 353-356.doi: 10.11896/j.issn.1002-137X.2016.6A.084

• 信息安全 • 上一篇    下一篇

一种可检测数据完整性的安全数据聚合协议

刘怀进,陈永红,田辉,王田,蔡奕侨   

  1. 华侨大学计算机科学与技术学院 厦门361021,华侨大学计算机科学与技术学院 厦门361021,华侨大学计算机科学与技术学院 厦门361021,华侨大学计算机科学与技术学院 厦门361021,华侨大学计算机科学与技术学院 厦门361021
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受基于数字水印的网络入侵检测的研究(61370007),基于移动雾节点的传感云关键技术研究(61572206),福建省新世纪优秀人才计划项目(2014FJ-NCET-ZR06)资助

Integrity-checking Security Data Aggregation Protocol

LIU Huai-jin, CHEN Yong-hong, TIAN Hui, WANG Tian and CAI Yi-qiao   

  • Online:2018-11-14 Published:2018-11-14

摘要: 在无线传感器网络中如何对传输的聚合数据同时进行数据隐私保护和完整性保护是当前物联网应用中的重要挑战。Ozdemir等人提出的PRDA(Polynomial Regression Based Secure Data Aggregation)协议基于分簇思想并利用多项式性质对聚合数据进行隐私保护,但无法验证数据的完整性。针对PRDA协议的聚合数据可能被篡改或伪造等问题,提出了一种可检测数据完整性的安全数据聚合协议iPRDA。该协议采用多项式函数和数据扰动技术对数据进行隐私保护,通过利用数据之间的关联特性在基站进行完整性检测。实验表明:该方案在不影响数据机密性的条件下,能有效地进行数据完整性检测。

关键词: 多项式回归,数据聚合,隐私保护,数据完整性

Abstract: In wireless sensor network (WSN),how to aggregate data transmission and protect data privacy and integrity is an important challenge in current Internet of things applications.Ozdemir put forward PRDA (Polynomial Regression-based Secure Data Aggregation) protocol based on clustering and properties by using Polynomial of aggregated data privacy protection,but it is unable to validate data integrity.Because aggregated data of PRDA agreement may have been tampered with or counterfeit,this paper proposed a security data aggregation protocol called iPRDA which can detect the data integrity.It uses polynomial functions and data perturbation technology to protect data privacy,and detects data integrity using the link between the data features in base stations.Experiments show that this scheme under the condition of not affecting the data confidentiality,data integrity can be test effectively.

Key words: Polynomial regression,Data aggregation,Privacy protection,Data integrity

[1] Ozdemir S,Xiao Y.Secure data aggregation in wireless sensor networks:A comprehensive overview[J].Computer Networks,2009,53(12):2022-2037
[2] Wang G,Cao J,Wang H,et al.Polynomial regression for data gathering in environmental monitoring applications[C]∥Global Telecommunications Conference,2007(GLOBECOM’07).IEEE,2007:1307-1311
[3] Madden S,Franklin M J,Hellerstein J M,et al.TAG:A tiny aggregation service for ad-hoc sensor networks[J].ACM SIGOPS Operating Systems Review,2002,36(SI):131-146
[4] He W,Liu X,Nguyen H,et al.Pda:Privacy-preserving data aggregation in wireless sensor networks[C]∥26th IEEE International Conference on Computer Communications INFOCOM 2007.IEEE,2007:2045-2053
[5] Westhoff D,Girao J,Acharya M.Concealed data aggregation for reverse multicast traffic in sensor networks:Encryption,key distribution,and routing adaptation[J].IEEE Transactions on Mobile Computing,2006,5(10):1417-1431
[6] Ozdemir S,Xiao Y.Polynomial regression based secure data aggregation for wireless sensor networks[C]∥2011 IEEE Global Telecommunications Conference (GLOBECOM 2011).IEEE,2011:1-5
[7] Bista R,Yoo H K,Chang J W.A new sensitive data aggregation scheme for protecting integrity in wireless sensor networks[C]∥2010 IEEE 10th International Conference on Computer and Information Technology (CIT).IEEE,2010:2463-2470
[8] 周强,杨庚,李森,等.一种可检测数据完整性的隐私数据融合算法[J].电子与信息学报,2013,35(6):1277-1283
[9] Seetharam D,Rhee S.An efficient pseudo random numbergenerator for low-power sensor networks [wireless networks[C]∥29th Annual IEEE International Conference on Local Computer Networks,2004.IEEE,2004:560-562
[10] Ozdemir S.Secure Load Balancing via Hierarchical Data Aggregation in Heterogeneous Sensor Networks[J].J.Inf.Sci.Eng.,2009,25(6):1691-1705
[11] He W,Liu X,Nguyen H,et al.A cluster-based protocol to enforce integrity and preserve privacy in data aggregation[C]∥29th IEEE International Conference on Distributed Computing Systems Workshops,2009(ICDCS Workshops’09).IEEE,2009:14-19
[12] Du W,Deng J,Han Y S,et al.A pairwise key predistributionscheme for wireless sensor networks[J].ACM Transactions on Information and System Security (TISSEC),2005,8(2):228-258
[13] Eschenauer L,Gligor V D.A key-management scheme for distributed sensor networks[C]∥Proceedings of the 9th ACM Conference on Computer and Communications Security.ACM,2002:41-47
[14] Heinzelman W R,Chandrakasan A,Balakrishnan H.Energy-efficient communication protocol for wireless microsensor networks[C]∥Proceedings of the 33rd annual Hawaii international conference on System sciences,2000.IEEE,2000:10
[15] Hu L,Evans D.Secure aggregation for wireless networks [C]∥2003 Symposium on Applications and the Internet Workshops,2003.IEEE,2003:384-391
[16] Mlaih E,Aly S.Secure hop-by-hop aggregation of end-to-end concealed data in wireless sensor networks[C]∥INFOCOM Workshops 2008.IEEE,2008:1-6

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!