计算机科学 ›› 2013, Vol. 40 ›› Issue (11): 197-202.
石鲁生,秦小麟
SHI Lu-sheng and QIN Xiao-lin
摘要: 为使无线传感器网络可以真正满足大规模应用的需求,提出了一种既能保护数据隐私又能验证数据完整性的聚集算法。算法首先构造不相交聚集树,然后让节点在各自对应的时间片内,按不同度数将自身数据分解为数个切片,并将切片分别加密传输至各聚集树中,达到保护节点数据隐私和获取冗余数据的目的,最后采用基于路由树的网内聚集将各聚集树的聚集结果传送至基站,由基站验证最终结果的完整性。仿真实验表明,在资源受限特征突出的无线传感器网络中,算法能够以较低的通信开销获得较高准确度的聚集结果,并具备较好的隐私保护性能和鉴别聚集结果完整性的能力。
[1] He W,Nguyen H,Liu X,et al.iPDA:Anintegrity-protectingprivate data aggregation scheme for wireless sensor networcks[C]∥Proceedings of the Military Communications Conference.SanDiego,CA,USA,2008:1-7 [2] Madden S,Franklin M J,Hellerstein J M.TAG:A Tiny Aggregation Service for Ad hoc Sensor Networks[C]∥Proceedings of the 5th Symposium on Operating Systems Design and Implementation.NewYork,USA,2002:131-146 [3] Deshpande A,Nath S,Gibbons P B,et al.Cache-and-query for wide area sensor databases [C]∥Proceedings of the 2003ACM SIGMOD International Conference on Management of Data.SanDiego,CA,USA,2003:503-514 [4] Tang X,Xu J.Extending network lifetime forprecision con-strained data aggregation in wireless sensor networks[C]∥Proceedings of the IEEE INFOCOM.Barcelona,Catalunya,Spain,2006:755-766 [5] 范永健,陈红,张晓莹.无线传感器网络数据隐私保护技术[J].计算机学报,2012,5(6):1131-1146 [6] He W,Liu X,Nguyen H,et al.PDA:Privacy-preserving dataaggregation in wireless sensor networks[C]∥Proceedings of the 26th IEEE International Conference on Computer Communications(INFOCOM).Anchorage,USA,2007:2045-2053 [7] Yao Jian-bo,Wen Guang-jum.Protecting classification priracydata aggregation in wireless sensor networks[C]∥Proceedings of the 4th International Conference on Wireless Communication.Networking and Mobile Computing(WiCOM).Dalian,China,2008:1-5 [8] 杨庚,王安琪,陈正宇,等.一种低耗能的数据融合隐私保护算法[J].计算机学报,2011,34(5):792-800 [9] Joao G,Dirk W,Markns S.CDA:Concealed data aggregation for reverse muhicastt raffic in wireleass sensor networks[C]∥Proceedings of the IEEE International Conference on Communications(ICC).Seoul,Korea,2005:3044-3049 [10] Castelluceia C,Mykletun E,Tsudik G.Efficient aggregation ofencrypted data in wireless sensor networks[C]∥Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems:Computing,Networking and Services(MobiQuitoue).SanDiego,CA,USA,2005:109-117 [11] Feng Tai-ming,Wang Chnang,Zhang Wen-shang,et al.Confi-dentiality protection for distributed sensor data aggregation[C]∥Proceedings of the 27th IEEE International Conference on Computer Communications(INFOCOM).Phoenix,USA,2008:56-60 [12] Ozdemir S,Yang Xiao.Integrity protecting hierarchical con-cealed data aggregation for wireless sensor networks[J].Computer Networks,2011,55(8):1735-1746 [13] Papadopoulos S,Kiayias A,Papadias D.Secure and efficient in-network processing of exact SUM queries[C]∥Proceedings of the 27th International Conference on Data Engineering(ICDE).Hannover,Germany,2011:517-528 [14] Zhang W S,Wang C,Feng T M.GP2S:Generic privacy-preserving solutions for approximate aggregation of sensor data[C]∥Proceedings of the 6th Annual IEEE International Conference on Pervasive Computing and Communications(PerCom).Hong Kong,China,2008:179-184 [15] Groat M M,He W B,Forrest S.KIPDA:k-indistinguishable privacy-preserving data aggregation in wireless sensor networks[C]∥Proceedings of the 30th IEEE International Conference on Computer Communications(INFOCOM).Shanghai,China,2011:2024-2032 [16] Przydatek B,Song D,Perrig A.SIA:Secure information aggregation in sensor networks[C]∥Proc.of the 1st Int’l Conf.on Embedded Networked Sensor Systems.New York:ACM Press,2003:255-265 [17] Yang Yi,Wang Xin-ran,Zhu Sen-cun,et al.SDAP:A SecureHop-by-Hop Data Aggregation Protocol for Sensor Networks[C]∥ACM Int.l Symp on Mobile Ad Hoc Networking and Computing(MOBIHOC 2006).Florence,Italy,2006:356-367 [18] He W,Liu X,Nguyen H,et al.A cluster-based protocol to enforce integrity and preserve privacy in data aggregation[C]∥Proceedings of the 29th IEEE International Conference on Distributed Computing Systems Workshops.Montreal,QC,Canada,2009:14-19 |
No related articles found! |
|