Integrity verification protocol based on privacy homomorphism data aggregation

被引:0
作者
Li, Xing [1 ]
Li, Chun-Yan [1 ]
Wang, Liang-Min [1 ]
机构
[1] School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang
来源
Tongxin Xuebao/Journal on Communications | 2014年 / 35卷
基金
中国国家自然科学基金;
关键词
Data aggregation; Data integrity; Detection node; Homomorphism encryption;
D O I
10.3969/j.issn.1000-436x.2014.z2.036
中图分类号
学科分类号
摘要
Secure data aggregation in wireless sensor networks can effectively prevent privacy leakage, data tampering and other issues, it also achieves efficient data transmission. An integrity verification protocol based on privacy homomorphism data aggregation (IV-PHDA) was presented. The protocol uses homomorphism encryption to ensure data privacy, then it used random detection nodes to detect the integrity of the aggregated results to verify whether the aggregation node faithfully transmit each data packet. The theoretical analysis and simulation comparison verify the performance of the algorithm, the results show that this protocol can detect data integrity through transmission, and achieve better privacy protection and higher data accuracy. ©, 2014, Editorial Board of Journal on Communications. All right reserved.
引用
收藏
页码:256 / 260
页数:4
相关论文
共 11 条
[1]  
Ramesh R., Varshney P.K., Data aggregation techniques in sensor networks: A survey, Communications Surveys & Tutorials, 8, 4, pp. 48-63, (2006)
[2]  
Ozdemir S., Yang X., Secure data aggregation in wireless sensor networks: A comprehensive overview, Computer Networks, 53, 12, pp. 2022-2037, (2009)
[3]  
Guo J., Fang J.A., Chen X.M., Survey on secure data aggregation for wireless sensor networks, IEEE Internaional Conference on SOLI, 7, pp. 138-143, (2011)
[4]  
Przydatek B., Song D., Perrig A., SIA: Secure information aggregation in sensor networks, Proc of 1st Conference on Em-Bedded Networked Sensor Systems, pp. 255-265, (2003)
[5]  
He W., Liu X., Nguyen H., PDA: Privacy-preserving data aggregation in wireless sensor networks, Proceedings of the 26th IEEE International Conference on Computer Communications (INFO-COM), pp. 2045-2053, (2007)
[6]  
Westhoff D., Girao J., Acharya M., Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distri-bution, and routing adaptation, IEEE Transactions on Mobile Computing, 5, 10, pp. 1417-1431, (2006)
[7]  
Chen C.M., Lin Y.H., Lin Y.C., RCDA: Recoverable concealed data aggregation for data integrity in wireless sensor networks, IEEE Transactions on Parallel and Distributed Systems, 23, 4, pp. 727-734, (2012)
[8]  
Eschenauer L., Gligor V.D., A key-management scheme for distributed sensor networks, Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41-47, (2002)
[9]  
Madden S., Franklin M.J., Hellerstein J.M., TAG: A tiny aggregation service for ad-hoc sensor networks, Proceedings of the 5th symposium on Operating systems design and implementation, pp. 131-146, (2002)
[10]  
Domingo-Ferrer J., A provably secure additive and multi-plicative privacy homomorphism, Proceedings of the Information Security Conference, pp. 471-483, (2002)