ISSN 1000-1239 CN 11-1777/TP

计算机研究与发展 ›› 2016, Vol. 53 ›› Issue (9): 2030-2038.doi: 10.7544/issn1000-1239.2016.20150456

• 信息安全 • 上一篇    下一篇

一种无线传感器网络隐私保护数据聚合方案

付帅1,2,姜奇2,马建峰2   

  1. 1(北京电子科技职业学院电信工程学院 北京 100176); 2(西安电子科技大学计算机学院 西安 710071) (ljhfs0803@126.com)
  • 出版日期: 2016-09-01
  • 基金资助: 
    长江学者和创新团队发展计划基金项目(IRT1078);国家自然基金委员会-广东联合基金重点基金项目(U1135002);国家自然科学基金项目(61272541,61202389);中央高校基本科研业务费专项资金(JY10000903001);陕西省自然科学基础研究计划基金项目(2012JQ8043);北京市教委教改课题(PXM2015_014306_000017)

A Privacy-Preserving Data Aggregation Scheme in Wireless Sensor Networks

Fu Shuai1,2, Jiang Qi2, Ma Jianfeng2   

  1. 1(School of Electronic and Information Engineering, Beijing Polytechnic, Beijing 100176);2(School of Computer Science and Technology, Xidian University, Xi'an 710071)
  • Online: 2016-09-01

摘要: 隐私保护是基于无线传感器网络(wireless sensor networks, WSNs)的数据聚合技术中最具挑战性的安全问题之一.在WSNs环境中,现有的隐私保护数据聚合机制不能同时满足安全性及节能性要求,存在计算复杂、通信量大及安全性低等缺点.提出一种能量有效的、抗数据丢失的隐私保护数据聚合方案,该方案利用2次不同形式的数据扰动同时实现了数据对基站及网内其他节点的隐私保护.首先,从防止基站入侵角度,给出了初次扰动数据设计方法;在此基础上,为实现对邻居节点的隐私保护,提出二次扰动数据的构造方法,并给出中间聚合节点及基站的聚合验证操作流程.通过引入消息认证码技术,有效抵御了多种外部攻击.安全及性能分析表明,该方案可在不过多消耗节点能量的前提下保证节点的安全性,且具有较好的抗数据丢失能力,安全性及能效性均优于现有方案.

关键词: 无线传感器网络, 数据聚合, 隐私保护, 数据扰动, 能量有效

Abstract: Privacy preservation is one of the most challenging problems on secure data aggregation in wireless sensor networks (WSNs). In WSNs, current data aggregation schemes with privacy preservation cannot meet the requirements of security and energy saving, and have several disadvantages such as complex computation, considerable communication load or low-security. An energy-efficient and data-loss resilient data aggregation scheme with privacy preservation is proposed in this paper. Two different forms of perturbation data are adopted to protect the data privacy of each node from being disclosed to the sink and any other nodes in the network. Firstly, from the point of view of sink intrusion, we describe the design scheme of initial perturbation data. On the basis of it, we present the construction method of second data perturbation and the operation procedures of aggregation validation for intermediate aggregators and the sink. To resist various external attacks efficiently, the technique of message authentication code is introduced. Security and property analysis show that the proposed scheme can ensure the security of nodes on the premise of lower energy power. In addition, it has a strong ability against data-loss, and both its security and energy efficiency perform better than current works.

Key words: wireless sensor networks (WSNs), data aggregation, privacy preserving, data perturbation, energy efficient

中图分类号: