高级检索
    付帅, 姜奇, 马建峰. 一种无线传感器网络隐私保护数据聚合方案[J]. 计算机研究与发展, 2016, 53(9): 2030-2038. DOI: 10.7544/issn1000-1239.2016.20150456
    引用本文: 付帅, 姜奇, 马建峰. 一种无线传感器网络隐私保护数据聚合方案[J]. 计算机研究与发展, 2016, 53(9): 2030-2038. DOI: 10.7544/issn1000-1239.2016.20150456
    Fu Shuai, Jiang Qi, Ma Jianfeng. A Privacy-Preserving Data Aggregation Scheme in Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2016, 53(9): 2030-2038. DOI: 10.7544/issn1000-1239.2016.20150456
    Citation: Fu Shuai, Jiang Qi, Ma Jianfeng. A Privacy-Preserving Data Aggregation Scheme in Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2016, 53(9): 2030-2038. DOI: 10.7544/issn1000-1239.2016.20150456

    一种无线传感器网络隐私保护数据聚合方案

    A Privacy-Preserving Data Aggregation Scheme in Wireless Sensor Networks

    • 摘要: 隐私保护是基于无线传感器网络(wireless sensor networks, WSNs)的数据聚合技术中最具挑战性的安全问题之一.在WSNs环境中,现有的隐私保护数据聚合机制不能同时满足安全性及节能性要求,存在计算复杂、通信量大及安全性低等缺点.提出一种能量有效的、抗数据丢失的隐私保护数据聚合方案,该方案利用2次不同形式的数据扰动同时实现了数据对基站及网内其他节点的隐私保护.首先,从防止基站入侵角度,给出了初次扰动数据设计方法;在此基础上,为实现对邻居节点的隐私保护,提出二次扰动数据的构造方法,并给出中间聚合节点及基站的聚合验证操作流程.通过引入消息认证码技术,有效抵御了多种外部攻击.安全及性能分析表明,该方案可在不过多消耗节点能量的前提下保证节点的安全性,且具有较好的抗数据丢失能力,安全性及能效性均优于现有方案.

       

      Abstract: Privacy preservation is one of the most challenging problems on secure data aggregation in wireless sensor networks (WSNs). In WSNs, current data aggregation schemes with privacy preservation cannot meet the requirements of security and energy saving, and have several disadvantages such as complex computation, considerable communication load or low-security. An energy-efficient and data-loss resilient data aggregation scheme with privacy preservation is proposed in this paper. Two different forms of perturbation data are adopted to protect the data privacy of each node from being disclosed to the sink and any other nodes in the network. Firstly, from the point of view of sink intrusion, we describe the design scheme of initial perturbation data. On the basis of it, we present the construction method of second data perturbation and the operation procedures of aggregation validation for intermediate aggregators and the sink. To resist various external attacks efficiently, the technique of message authentication code is introduced. Security and property analysis show that the proposed scheme can ensure the security of nodes on the premise of lower energy power. In addition, it has a strong ability against data-loss, and both its security and energy efficiency perform better than current works.

       

    /

    返回文章
    返回