可保护数据隐私性和完整性的安全数据融合算法分析

合集下载
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

摘 要 ........................................................................................................................... I ABSTRACT............................................................................................................... III 1 绪论 .........................................................................................................................1
1.1 课题的背景及意义 ......................................................................................................... 1 1.2 无线传感器网络概述 ..................................................................................................... 2
1.2.1 无线传感器网络安全数据融合概述 ....................................................................... 4 1.2.2 数据融合面临的安全威胁概述 ............................................................................... 5 1.3 本文主要研究内容 ......................................................................................................... 6 1.4 章节安排 ......................................................................................................................... 7 1.5 本章小结 ......................................................................................................................... 7 2 相关研究...................................................................................................................9 2.1 无线传感器网络安全数据融合协议研究 ..................................................................... 9 2.1.1 基于同态加密机制的安全数据融合算法 ............................................................... 9 2.1.2 基于扰动和切片重组机制的安全数据融合算法 ................................................. 11 2.1.3 基于模式识别码的安全数据融合算法 ................................................................. 14 2.1.4 基于 Merkle-hash 树的安全数据融合算法........................................................... 14 2.1.5 基于监督机制的安全数据融合算法 ..................................................................... 15 2.1.6 基于数字签名的安全数据融合算法 ..................................................................... 16 2.2 协议性能比较 ............................................................................................................... 17 2.3 本章小结 ....................................................................................................................... 18 3 基于分簇的可保护数据隐私性和完整性的数据融合算法 ......................................... 19 3.1 算法简介 ....................................................................................................................... 19 3.1.1 网络模型 ................................................................................................................. 19 3.1.2 安全假设 ................................................................................................................. 20 3.1.3 网络攻击方式 ......................................................................................................... 20 3.2 算法原理 ....................................................................................................................... 21 3.2.1 加解密机制 ............................................................................................................. 21 3.2.2 分簇方式 ................................................................................................................. 21 3.2.3 同态消息验证码机制 ............................................................................................. 22 3.3 ILCCPDA 算法介绍 ...................................................................................................... 22 3.3.1 算法准备阶段 ......................................................................................................... 23 3.3.2 簇的建立阶段 ......................................................................................................... 24 3.3.3 簇内数据串通阶段 ................................................................................................. 25 3.3.4 数据融合阶段 ......................................................................................................... 25 3.3.5 完整性检测阶段 ..................................................................................................... 26 3.4 本章小结 ....................................................................................................................... 26 4 模拟仿真与性能分析............................................................................................... 27 4.1 仿真环境 ....................................................................................................................... 27 4.2 仿真结果与性能分析 ................................................................................................... 27
3. Algorithm analysis, this research compared analysis with other algorithms from three aspects, including data privacy, integrity and energy consumption during data communication. This research concluded that this algorithm can protect privacy, keep integrity of the data and reduce energy consumption. KEY WORDS: Wireless Sensor Network (WSN), data fusion, privacy protection, integrity protection
To solve the security problem in data fusion process of WSN, a lot of researches have been done around the world. Firstly, this research classified domestic and foreign issues related to security data fusion and gave relevant analysis of them. Then an improved WSN data fusion algorithm was proposed. The main contents of this paper include the three aspects.
与其他算法进行比较分析,得出此算法在降低网络通信量的同时可以完成对数据的隐私 性和完整性的保护。 关键词:无线传感器网络,数据融合,隐私保护,完整性保护
II
ABSTRACT
WSN (Wireless Sensor Network) is widely used and of great influence to today’s society. In recent years, with the continuous progress of science and technology, the application of WSN has gradually been expanded to nearly all areas of human life, such as home life, financial business, aerospace industry and marine monitoring. WSN is composed of a large number of tiny sensor nodes, which are deployed in corresponding monitored areas in order to collect users’ useful information. Since the sensor nodes are small processors with simple structures and limited resources, these nodes use data fusion techniques to transfer information in practical applications. With the increasing demand for information security, information safety has caught people’s attention in the data fusion process of WSN. For example, some areas, such as medical fields, financial industries and military fields, have serious requirements of information safety in collection and transmission processes of information. Since resources of sensor nodes are limited, the nodes are more vulnerable to be attacked or captured by the illegal, which can cause the disclosure of sensitive information and lead to serious damage. Therefore, this research on information safety issues in data fusion process of WSN is of significance.
2. This research proposed an improved data fusion algorithm (ILCCPDA) in WSN, which made improvements on the basic of the cluster-based data integration of privacy protection algorithms (CPDA). ILCCPDA used LEACH clustering protocol to form clusters and used a simple slice mixing operation within the cluster to reduce the data transmission, thus reducing energy consumption. The homomorphic message authentication code was added to the algorithm to test data integrity. Meanwhile, the random key
相关文档
最新文档