首页 | 本学科首页   官方微博 | 高级检索  
     

传感器网络中可扩展性好的数据汇聚与认证协议
引用本文:张建明,廖建勇,周四望,欧阳竟成.传感器网络中可扩展性好的数据汇聚与认证协议[J].计算机工程与应用,2006,42(20):108-112.
作者姓名:张建明  廖建勇  周四望  欧阳竟成
作者单位:1. 湖南大学计算机与通信学院,长沙,410082;湖南城市学院计算机科学系,湖南,益阳,413049
2. 湖南城市学院计算机科学系,湖南,益阳,413049
3. 湖南大学计算机与通信学院,长沙,410082
基金项目:湖南省自然科学基金;湖南省教育厅科研项目;湖南城市学院校科研和教改项目
摘    要:无线传感器网络的能量资源有限,数据汇聚是减少能耗最重要的技术之一,但数据汇聚可能导致信息泄露。文章提出了一种名为SSDAA的可扩展性好的安全的数据汇聚和认证协议。将采集的数据映射成无物理意义的模式码,根据模式码进行数据汇聚,再将被选中的采集数据以加密形式传输,保证了数据的机密性;采用本地逐步公布用于认证的!TESLA密钥,认证不必等到汇聚完成,使网络时延小,适应于大规模网络;采用延迟汇聚和延迟认证,保证了数据的完整性和真实性;采用!TESLA密钥链保证了数据的鲜活性。SSDDA可以抵御植入节点攻击和重放攻击,可部分解决妥协节点攻击。

关 键 词:数据汇聚  认证  可扩展  模式码  无线传感器网络
文章编号:1002-8331-(2006)20-0108-05
收稿时间:2005-12
修稿时间:2005-12

A Scalable Data Aggregation and Authentication Protocol for Sensor Networks
Zhang Jianming,Liao Jianyong,Zhou Siwang,Ouyang Jingcheng.A Scalable Data Aggregation and Authentication Protocol for Sensor Networks[J].Computer Engineering and Applications,2006,42(20):108-112.
Authors:Zhang Jianming  Liao Jianyong  Zhou Siwang  Ouyang Jingcheng
Affiliation:1.College of Computer and Communications, Hunan University, Changsha 410082;2.Department of Computer Science,Hunan City University,Yiyang,Hunan 413049
Abstract:Data aggregation techniques can greatly help conserve the scarce energy resources in sensor networks by minimizing the number of data transmissions.Conventional data aggregation methods are vulnerable,as cluster-heads receive all the data from sensor nodes and then eliminate the redundancy by checking the contents of the data.A Scalable Secure Data Aggregation and Authentication Protocol called SSDAA is presented.Intermediate nodes,i.e.cluster-heads in each levels,implement data aggregation based on pattern codes without leaking the contents of the raw data and only distinct data in encrypted form is transmitted from sensor nodes to the base station,so SSDAA is confidential.The ?滋TESLA key chains are used to reveal and authenticate keys locally.At every round,authentication need not wait until aggregation has been completed,so it can be applied to large scale WSN with a little delayed time.Data integrity and authentication exploit two main ideas:delayed aggregation and delayed authentication.Instead of aggregation messages at the immediate next hop,messages are forwarded unchanged over the first hop and then aggregated at the second hop.Data freshness is gained by using ?滋TESLA key chains.SSDAA can defend against intruder node attacks and replay attacks,and can limit the effectiveness of compromised node attacks.
Keywords:data aggregation  authentication  scalable  pattern codes  wireless sensor networks
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号