计算机工程与应用 ›› 2017, Vol. 53 ›› Issue (5): 116-120.DOI: 10.3778/j.issn.1002-8331.1508-0125

• 网络、通信与安全 • 上一篇    下一篇

低耗能的支持完整性验证的隐私保护融合方案

贾宗璞,王冠琼,彭维平,郭海儒   

  1. 河南理工大学 计算机科学与技术学院,河南 焦作  454000
  • 出版日期:2017-03-01 发布日期:2017-03-03

Energy-saving privacy preserving aggregation scheme with integrity verification support

JIA Zongpu, WANG Guanqiong, PENG Weiping, GUO Hairu   

  1. College of Computer Science and Technology, Henan University of Science and Technology, Jiaozuo, Henan 454000, China
  • Online:2017-03-01 Published:2017-03-03

摘要: 针对无线传感器网络中隐私暴露、信息篡改、虚假注入等安全问题,提出了一种支持完整性验证的隐私保护融合方案ESIPPA,它可以在实现数据隐私保护和ID隐私保护的基础上侦测到信息的非法篡改。ESIPPA用加权的方式对ID进行隐性传送,同时将ID号作为干扰因子引入对数据进行干扰的干扰公式中,提高隐私保护的安全性;通过构建双融合树模型,充分利用基站能量多的因素,减少节点负担,同时能够验证数据完整性。仿真实验结果显示,ESIPPA方案比已有的基于分布式认证的完整性保护数据融合方案在通信量方面下降了约7.5%,比DCSA方案下降了约15.4%,同时也更好地保护了数据的完整性和隐私性。

关键词: 无线传感器网络, 数据融合, 隐私保护, 完整性验证

Abstract: In order to solve the security problems existing in wireless sensor networks, such as privacy exposure, information tampering and false data injection, an energy-saving privacy protection integration scheme ESIPPA is proposed, which supports integrity verification. The ESIPPA scheme can detect unauthorized tampering of information on the basis of data privacy protection and ID privacy protection. It sends recessive ID number by the way of weighting, and makes ID number as a factor of interference formula which is used to implement interference for data, to improve the security of privacy protection. By constructing a model of double integration trees and making full use of base station with high energy, the ESIPPA can reduce the burden of nodes and validate data integrity. The simulation results show that the ESIPPA scheme respectively reduces 7. 5% and 15. 4% in the aspect of communication traffic compared with that of integration-preservation data aggregation scheme based on distributed authentication and DCSA scheme and it also better protects the integrity and privacy of data.

Key words: wireless sensor network, data aggregation, privacy preserving, integrity verification