计算机科学 ›› 2013, Vol. 40 ›› Issue (11): 197-202.

• 软件与数据库技术 • 上一篇    下一篇

一种带完整性验证的数据聚集隐私保护算法

石鲁生,秦小麟   

  1. 南京航空航天大学计算机科学与技术学院 南京210016;南京航空航天大学计算机科学与技术学院 南京210016
  • 出版日期:2018-11-16 发布日期:2018-11-16
  • 基金资助:
    本文受国家自然科学基金项目:具有可生存能力的安全DBMS关键技术研究(60673127),国家高技术研究发展计划(863计划)基金项目:基于网格的数据可靠存储与容侵关键技术(2007AA01Z404),江苏高校优势学科建设工程项目物联网与控制技术,江苏省宿迁学院重点科研基金项目:无线传感器网络中数据隐私保护技术的研究(2012KY14)资助

Privacy-preserving Data Aggregation Algorithm with Integrity Verification

SHI Lu-sheng and QIN Xiao-lin   

  • Online:2018-11-16 Published:2018-11-16

摘要: 为使无线传感器网络可以真正满足大规模应用的需求,提出了一种既能保护数据隐私又能验证数据完整性的聚集算法。算法首先构造不相交聚集树,然后让节点在各自对应的时间片内,按不同度数将自身数据分解为数个切片,并将切片分别加密传输至各聚集树中,达到保护节点数据隐私和获取冗余数据的目的,最后采用基于路由树的网内聚集将各聚集树的聚集结果传送至基站,由基站验证最终结果的完整性。仿真实验表明,在资源受限特征突出的无线传感器网络中,算法能够以较低的通信开销获得较高准确度的聚集结果,并具备较好的隐私保护性能和鉴别聚集结果完整性的能力。

关键词: 无线传感器网络,数据聚集,隐私保护,完整性

Abstract: In order to satisfy the needs of large-scale applications for wireless sensor networks,this paper proposed an aggregation algorithm which can protect the data privacy and verify integrity.First,the algorithm constructs disjoint aggregation trees,and the nodes divides their own data into several slices in each corresponding time slices according to their different degrees,and then the data slices are encrypted and transmitted in every aggregation trees,so privacy-preserving and data integrity can be addressed.Finally,using in-network aggregation based routing tree,the final result of each tree is sent to the base station,and the integrity of the final result is verified by the base station.Simulation results show that the algorithm can obtain higher data aggregation accuracy with lower communication overhead,has better privacy-preserving performance and the aggregation results integrity.

Key words: WSN,Data aggregation,Privacy-preserving,Integrity

[1] He W,Nguyen H,Liu X,et al.iPDA:Anintegrity-protectingprivate data aggregation scheme for wireless sensor networcks[C]∥Proceedings of the Military Communications Conference.SanDiego,CA,USA,2008:1-7
[2] Madden S,Franklin M J,Hellerstein J M.TAG:A Tiny Aggregation Service for Ad hoc Sensor Networks[C]∥Proceedings of the 5th Symposium on Operating Systems Design and Implementation.NewYork,USA,2002:131-146
[3] Deshpande A,Nath S,Gibbons P B,et al.Cache-and-query for wide area sensor databases [C]∥Proceedings of the 2003ACM SIGMOD International Conference on Management of Data.SanDiego,CA,USA,2003:503-514
[4] Tang X,Xu J.Extending network lifetime forprecision con-strained data aggregation in wireless sensor networks[C]∥Proceedings of the IEEE INFOCOM.Barcelona,Catalunya,Spain,2006:755-766
[5] 范永健,陈红,张晓莹.无线传感器网络数据隐私保护技术[J].计算机学报,2012,5(6):1131-1146
[6] He W,Liu X,Nguyen H,et al.PDA:Privacy-preserving dataaggregation in wireless sensor networks[C]∥Proceedings of the 26th IEEE International Conference on Computer Communications(INFOCOM).Anchorage,USA,2007:2045-2053
[7] Yao Jian-bo,Wen Guang-jum.Protecting classification priracydata aggregation in wireless sensor networks[C]∥Proceedings of the 4th International Conference on Wireless Communication.Networking and Mobile Computing(WiCOM).Dalian,China,2008:1-5
[8] 杨庚,王安琪,陈正宇,等.一种低耗能的数据融合隐私保护算法[J].计算机学报,2011,34(5):792-800
[9] Joao G,Dirk W,Markns S.CDA:Concealed data aggregation for reverse muhicastt raffic in wireleass sensor networks[C]∥Proceedings of the IEEE International Conference on Communications(ICC).Seoul,Korea,2005:3044-3049
[10] Castelluceia C,Mykletun E,Tsudik G.Efficient aggregation ofencrypted data in wireless sensor networks[C]∥Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems:Computing,Networking and Services(MobiQuitoue).SanDiego,CA,USA,2005:109-117
[11] Feng Tai-ming,Wang Chnang,Zhang Wen-shang,et al.Confi-dentiality protection for distributed sensor data aggregation[C]∥Proceedings of the 27th IEEE International Conference on Computer Communications(INFOCOM).Phoenix,USA,2008:56-60
[12] Ozdemir S,Yang Xiao.Integrity protecting hierarchical con-cealed data aggregation for wireless sensor networks[J].Computer Networks,2011,55(8):1735-1746
[13] Papadopoulos S,Kiayias A,Papadias D.Secure and efficient in-network processing of exact SUM queries[C]∥Proceedings of the 27th International Conference on Data Engineering(ICDE).Hannover,Germany,2011:517-528
[14] Zhang W S,Wang C,Feng T M.GP2S:Generic privacy-preserving solutions for approximate aggregation of sensor data[C]∥Proceedings of the 6th Annual IEEE International Conference on Pervasive Computing and Communications(PerCom).Hong Kong,China,2008:179-184
[15] Groat M M,He W B,Forrest S.KIPDA:k-indistinguishable privacy-preserving data aggregation in wireless sensor networks[C]∥Proceedings of the 30th IEEE International Conference on Computer Communications(INFOCOM).Shanghai,China,2011:2024-2032
[16] Przydatek B,Song D,Perrig A.SIA:Secure information aggregation in sensor networks[C]∥Proc.of the 1st Int’l Conf.on Embedded Networked Sensor Systems.New York:ACM Press,2003:255-265
[17] Yang Yi,Wang Xin-ran,Zhu Sen-cun,et al.SDAP:A SecureHop-by-Hop Data Aggregation Protocol for Sensor Networks[C]∥ACM Int.l Symp on Mobile Ad Hoc Networking and Computing(MOBIHOC 2006).Florence,Italy,2006:356-367
[18] He W,Liu X,Nguyen H,et al.A cluster-based protocol to enforce integrity and preserve privacy in data aggregation[C]∥Proceedings of the 29th IEEE International Conference on Distributed Computing Systems Workshops.Montreal,QC,Canada,2009:14-19

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!